Dropped Files | ZeroBOX
Name 408482f7eb28e557_~$a.dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$a.dot
Size 162.0B
Processes 2244 (WINWORD.EXE)
Type data
MD5 1526d65a7fbb71cedeb4b4ea741083ec
SHA1 4a8fa5388381f4af9acb0fde47209c4004d56a80
SHA256 408482f7eb28e5572719e2b071db2bee1b550d32cdba425152cb522cc637dff0
CRC32 6B05930D
ssdeep 3:yW2lWRdvL7YMlbK7lZznNWckA:y1lWnlxK73znEc
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{1bcc3581-0bee-4026-8aa3-46b12efbf6c9}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1BCC3581-0BEE-4026-8AA3-46B12EFBF6C9}.tmp
Size 1.0KB
Processes 2244 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name fa7dd8045b475352_~wrs{f71e81b5-1b12-4928-be11-eb40b84d7c26}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F71E81B5-1B12-4928-BE11-EB40B84D7C26}.tmp
Size 4.0KB
Processes 2244 (WINWORD.EXE)
Type data
MD5 fddfacad5324e3b3ff838357cc60cc80
SHA1 8def3d39e3876acfcc613363ff96cbb9d97062c3
SHA256 fa7dd8045b475352ae7597ee6a232f4568fd6ed64e3baf8c0f853f359d86e0f7
CRC32 B16DF887
ssdeep 48:Ibashk0aipcikdQyIul+ZGoOTleuZzVHALEAlrxrzwD5lUK+MlNyJo2PUr:Iba7iwTIuE50wuJHufxrzwdln+yuUr
Yara None matched
VirusTotal Search for analysis
Name b94d63d5a5bc4597_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2244 (WINWORD.EXE)
Type data
MD5 065071323ed6d1b6ea7980dc7d9d3f76
SHA1 600804b6debf471838f8a42c707fc73213bde375
SHA256 b94d63d5a5bc4597066cbc7843e863afbd601e75cde946ae5a59fe84b628ff95
CRC32 89F0E588
ssdeep 3:yW2lWRdvL7YMlbK7l:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis