Dropped Files | ZeroBOX
Name 1f0fecdc013436b0_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2976 (WINWORD.EXE)
Type data
MD5 21b8e549490147d74f4e837a729f20fd
SHA1 964629e61fc5b1d02f2d7f75047aea4e6f626743
SHA256 1f0fecdc013436b0ce959d33b2f2a6ae021d4cc0bd60f83e5ccae5c36de64836
CRC32 30443F24
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItKlU5llFBjt:y1lWnlxK7ghqKOhFF
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{73b63e4d-f4b6-4cb6-a303-c68438b87fdb}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{73B63E4D-F4B6-4CB6-A303-C68438B87FDB}.tmp
Size 1.0KB
Processes 2976 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name c9ea4b2071b2a785_~$19_7169909343268.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$19_7169909343268.doc
Size 162.0B
Processes 2976 (WINWORD.EXE)
Type data
MD5 c4e4bc99c82761dafcdbb5ab33424269
SHA1 243b46c13d977d694eb5a0b6e10ef433909c22c2
SHA256 c9ea4b2071b2a785566f4728c69c29266819847f88457c1d4c94b81292b55eff
CRC32 2357F642
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItgs2elU5llFBjt:y1lWnlxK7ghqgs2eOhFF
Yara None matched
VirusTotal Search for analysis
Name a1fa622b47a529e1_e4aa6957.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4AA6957.emf
Size 4.9KB
Processes 2976 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 bf2393dfe4576945d1f26d3595c5ef9f
SHA1 f9abbbcf4bad106e4f5c039082257357f4c28aef
SHA256 a1fa622b47a529e1064458aa0decd0c1ebc16efb621511c8cba545036ffeb00e
CRC32 71C49B27
ssdeep 24:Y6cOaHN87k0sqFjsdB3g6G7OdE5qOppcWfswKnZFwG6uvX51m0KZdHk1a/Uo:XQNikssdBg6qjpLkwOEG6kpnydHk1a/Z
Yara None matched
VirusTotal Search for analysis