Dropped Files | ZeroBOX
Name 1923c4407047787f_~$b.dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$b.dot
Size 162.0B
Processes 2076 (WINWORD.EXE)
Type data
MD5 a3314eab9c1da79c190ecc6a62e88bf9
SHA1 7ab320f650ebecbe4babe231b17fcb82ed492fd2
SHA256 1923c4407047787f54390daf3b920aaed46914a0fdae8eaea2ae3b03b3b40a4f
CRC32 180C04C7
ssdeep 3:yW2lWRdvL7YMlbK7lZfnOS:y1lWnlxK73
Yara None matched
VirusTotal Search for analysis
Name 61eae3491ff7cd98_~wrs{f16ac57e-561d-4c12-89c0-e3aaec389c46}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F16AC57E-561D-4C12-89C0-E3AAEC389C46}.tmp
Size 3.5KB
Processes 2076 (WINWORD.EXE)
Type data
MD5 d5deea9d42d958bbf962e679e5096df2
SHA1 897e98a49e2fb9a307426fbaf9a6bee789e63bff
SHA256 61eae3491ff7cd98cc8a84f2493f31b9ab0a74074a94bbc3093789bcc1321eea
CRC32 E74BD706
ssdeep 48:LHZhY+CDaJlA4BVIQxx6+iW+oq1jlcJNTAXrvil0Tli4Y0ZfUWp:rZhY+CWJlA4jLTiW9qaAbvBTli4YWfUk
Yara None matched
VirusTotal Search for analysis
Name b94d63d5a5bc4597_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2076 (WINWORD.EXE)
Type data
MD5 065071323ed6d1b6ea7980dc7d9d3f76
SHA1 600804b6debf471838f8a42c707fc73213bde375
SHA256 b94d63d5a5bc4597066cbc7843e863afbd601e75cde946ae5a59fe84b628ff95
CRC32 89F0E588
ssdeep 3:yW2lWRdvL7YMlbK7l:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{cdd192d3-0b12-4393-966b-e1ae4a03c10e}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CDD192D3-0B12-4393-966B-E1AE4A03C10E}.tmp
Size 1.0KB
Processes 2076 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis