Dropped Files | ZeroBOX
Name 8c5bfbabba2cc5da_~$mplate-jn02b3.dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$mplate-jn02b3.dot
Size 162.0B
Processes 2952 (WINWORD.EXE)
Type data
MD5 aabfdd49a0674b86f76131e2edf0b4d3
SHA1 59a75ff745232432ac133044f705fa4f3c193310
SHA256 8c5bfbabba2cc5da7d21a18ebdf12a6a0fb27edc1dc40a73d9fd6b5496213d2a
CRC32 D6422F33
ssdeep 3:yW2lWRdvL7YMlbK7lauk:y1lWnlxK7hk
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{f4f910bc-5b2e-4157-82b9-95ec742c9cdf}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F4F910BC-5B2E-4157-82B9-95EC742C9CDF}.tmp
Size 1.0KB
Processes 2952 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 0a4d950191e1fc44_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2952 (WINWORD.EXE)
Type data
MD5 f95e94c1ea3257be40e88379abf8fae4
SHA1 8be44964c7da48b2337f50f6a0655d966787d50e
SHA256 0a4d950191e1fc44e50e008aa7fb5f583086ee144a5aa6ec5a3d22d9046be57f
CRC32 14D12E45
ssdeep 3:yW2lWRdvL7YMlbK7lInl:y1lWnlxK7qn
Yara None matched
VirusTotal Search for analysis