Dropped Files | ZeroBOX
Name 6796ffcdade62911_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2284 (WINWORD.EXE)
Type data
MD5 e8390de6c9b054dde1b4d7ce62bf16e2
SHA1 9c93c542c75a869c8ff646cb0203f1215dcbceb8
SHA256 6796ffcdade629112f59643260e29e6417a160718e5709e5a4e5e9e42a05db87
CRC32 DF6865CA
ssdeep 3:yW2lWRdRiyW6L7OpvjTK7fzNHglFItGl/tFgAt:y1lWIyWmkK7ulWG+At
Yara None matched
VirusTotal Search for analysis
Name 647866a78e156555_~$w profits distributions.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$w Profits Distributions.docx
Size 162.0B
Processes 2284 (WINWORD.EXE)
Type data
MD5 15519cf2134cb52bfee04f2d9752bf48
SHA1 bd13fe92b94328667c5103e09a24efdbed35b056
SHA256 647866a78e156555ae6822a03095b61c8c04e5d18ddeb87cf693bf30a3980a18
CRC32 1841FDDB
ssdeep 3:yW2lWRdRiyW6L7OpvjTK7fzNHglFItGl/tFwc//:y1lWIyWmkK7ulWGuc
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{52d65e84-5612-47c0-b0e0-701f6a3403f8}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{52D65E84-5612-47C0-B0E0-701F6A3403F8}.tmp
Size 1.0KB
Processes 2284 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis