Dropped Files | ZeroBOX
Name c2201ccd6697aa17_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2300 (WINWORD.EXE)
Type data
MD5 e1e071edfedbbba00fbbb8fb83627c43
SHA1 c0e86d5b47172a191c10d87b533de5782ab63b6c
SHA256 c2201ccd6697aa1714bfaae0f3c72635db8e14d6b4b1914f5830fdb17b402bf9
CRC32 6F7D1267
ssdeep 3:yW2lWRd3cllt/W6L780/1ZJK7aiUlpuIta0/3Ft:y1lWzUvWmo4K7aiUBa0Nt
Yara None matched
VirusTotal Search for analysis
Name 296dc1104135e53b_~$court.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$court.docx
Size 162.0B
Processes 2300 (WINWORD.EXE)
Type data
MD5 4c36175f5592a7a0e201304cbb6ce855
SHA1 301d66512e424b03856913cede4712fd4a70131a
SHA256 296dc1104135e53b807e2be891fd6029e14eed9cdfb5b3a454adde5bf87e67cf
CRC32 4F83C25E
ssdeep 3:yW2lWRd3cllt/W6L780/1ZJK7aiUlpuIta0/3jlt:y1lWzUvWmo4K7aiUBa07
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{5d8c4aac-a44c-400c-91d8-c5906f0b55c7}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5D8C4AAC-A44C-400C-91D8-C5906F0B55C7}.tmp
Size 1.0KB
Processes 2300 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis