Dropped Files | ZeroBOX
Name 4c92c2b4b537d1de_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 6204 (WINWORD.EXE)
Type data
MD5 61d42bf36a22da2364947427f74f72bd
SHA1 19f4e5568bc8078c8d1cf9cc611d89a09f98fdf2
SHA256 4c92c2b4b537d1de1a35650afc10189d665e0786895d461183144ebc3465d4ac
CRC32 1E8D8017
ssdeep 3:yW2lWRdvL7YMlbK7lxnlX:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 2b0d51dc625f14f5_~wrs{2ed20ffd-e6f5-4cae-833c-a4c789a7fedc}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2ED20FFD-E6F5-4CAE-833C-A4C789A7FEDC}.tmp
Size 3.5KB
Processes 6204 (WINWORD.EXE)
Type data
MD5 d0db2f57f1028aa11fee73ec32c49c30
SHA1 36f4245e41fb0e7c0fa2f29ea75979f1e77fc10c
SHA256 2b0d51dc625f14f53f51e40bd0d4c73650fa48bb07693447aac7f8812137dff1
CRC32 EFBFFA83
ssdeep 96:PfMmY737Nq7AyH2aX7qedLzSJPY4I9RWUt:Pn23Jq7Ac24qedL+uNB
Yara None matched
VirusTotal Search for analysis
Name ed2914a6a2770ce0_~$m.dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$m.dot
Size 162.0B
Processes 6204 (WINWORD.EXE)
Type data
MD5 34d8afa94e81b09f043a2924c8844f50
SHA1 6fb0f71f7622e5cb02d8cb3aec74eeb5a4d6bd23
SHA256 ed2914a6a2770ce0d8c353e6d429f1f86a63a827acfa095e80e32ce54cd98b1f
CRC32 C980D9B4
ssdeep 3:yW2lWRdvL7YMlbK7lDckDX:y1lWnlxK75c
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{4ec1eb67-4bc6-4c94-9543-e2babcb0cb29}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4EC1EB67-4BC6-4C94-9543-E2BABCB0CB29}.tmp
Size 1.0KB
Processes 6204 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis