Dropped Files | ZeroBOX
Name 24e70343a36717ba_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2332 (WINWORD.EXE)
Type data
MD5 fe9ba1b49d2c20221543a35734a43622
SHA1 a3bd6cff411dfb6e3275a257d345ce67ba302996
SHA256 24e70343a36717bac7358b364f7973e0a1e7f6bd7d3548345ecb19a8b25d4ca4
CRC32 C5F34786
ssdeep 3:yW2lWRd63iloW6L7njTK7gnlhgHItXZN13yS/l:y1lWuSloWmDK7gnE4gil
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{3e338b5a-2308-4e15-bc4e-b7b5102e63a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3E338B5A-2308-4E15-BC4E-B7B5102E63A4}.tmp
Size 1.0KB
Processes 2332 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 98522b604823af65_3e92b0af.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E92B0AF.emf
Size 4.9KB
Processes 2332 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 e0977da9bd2a0a573edcddbaabc5f8fd
SHA1 ca30c68b13d2bb2ae15ece40a126adb8bd95ed7d
SHA256 98522b604823af653546ad5af0a67729530928ff868291dd2b9dc48967052172
CRC32 E630284F
ssdeep 48:mHyNR4vQHsWBg6qjpLkwOEG6AFdHknD53:m+/RBFq9gVJEnl3
Yara None matched
VirusTotal Search for analysis
Name 23401d99aa052b6a_~$ers-progress-072021-1.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$ers-Progress-072021-1.doc
Size 162.0B
Processes 2332 (WINWORD.EXE)
Type data
MD5 ce07be5e80b2b3353e189460c17ed3ec
SHA1 980d61a1235748373ba5e13b106b3d53b045be66
SHA256 23401d99aa052b6ad5dca9aa88abc8a40d360617912a94f1c065c06e52caeded
CRC32 F6738425
ssdeep 3:yW2lWRd63iloW6L7njTK7gnlhgHItXZN13Sl/:y1lWuSloWmDK7gnE44t
Yara None matched
VirusTotal Search for analysis