Dropped Files | ZeroBOX
Name 835502196f615483_~$nverter.dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$nverter.dot
Size 162.0B
Processes 2020 (WINWORD.EXE)
Type data
MD5 9e22f77d322d13677ace3f5846f44910
SHA1 52fbae3fff5dd74b322d4fbe0cb2326b18ea484b
SHA256 835502196f6154837f3ed7f93ba7f7cc803732e8d439265475be0e45c511ebf7
CRC32 955B96A6
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItY+tjgWIart/:y1lWnlxK7ghqY+OWIet
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{d0f010b3-d030-4d18-85d8-cc3d9f846984}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D0F010B3-D030-4D18-85D8-CC3D9F846984}.tmp
Size 1.0KB
Processes 2020 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name cc6214d67b6c9c45_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2020 (WINWORD.EXE)
Type data
MD5 57c528817382a3538ec35dd5cf4be558
SHA1 5d8a2dd5b3b1ffa58c0f40b541058090be2d3caa
SHA256 cc6214d67b6c9c45c54102a97e49bb4c067e3fea454996ec098795d59c825f02
CRC32 CC573495
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItO/OtjgWIart/:y1lWnlxK7ghqO2OWIet
Yara None matched
VirusTotal Search for analysis