Dropped Files | ZeroBOX
Name 10267d12f0119a92_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2300 (WINWORD.EXE)
Type data
MD5 6b42bcf8409d1d4a40ebcbf9b40e9687
SHA1 94560a0b988808f450c67dde09c1f9d3c4703e56
SHA256 10267d12f0119a924b423464bcd7060b0fc01d2fe3dfdf91c5545a2ffaa55f45
CRC32 D3582A9E
ssdeep 3:yW2lWRdCYlldW6L7ivK7VHCFItcPl:y1lWuSWm6K7MW8
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{b6fff041-38f1-40bd-8e9d-f878657db5fa}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6FFF041-38F1-40BD-8E9D-F878657DB5FA}.tmp
Size 1.0KB
Processes 2300 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name ad0d2c62549d494f_~$voice_0098330000.wbk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$voice_0098330000.wbk
Size 162.0B
Processes 2300 (WINWORD.EXE)
Type data
MD5 5054e6241dced11cd74269b85f50100a
SHA1 0751e43410d6edbc335ebc10d1857c8e8ebbd74d
SHA256 ad0d2c62549d494fe419906b630c59c12fbf50b6246bc74e19b1944356989a1d
CRC32 3810E0E0
ssdeep 3:yW2lWRdCYlldW6L7ivK7VHCFItc8mlt:y1lWuSWm6K7MWjmlt
Yara None matched
VirusTotal Search for analysis
Name 0fd916e9f6695a5e_~wrs{a6eb3ecd-73e3-4ed5-a4b0-cf830b5ad9ef}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A6EB3ECD-73E3-4ED5-A4B0-CF830B5AD9EF}.tmp
Size 11.5KB
Processes 2300 (WINWORD.EXE)
Type data
MD5 e62c583f74edf7321a32dd494a7bb8df
SHA1 633b7db884cc3ab9bca55202527126f893aba97a
SHA256 0fd916e9f6695a5ec19832350dd2e19eb1b00f040a2be6d2e57f12935022c166
CRC32 63E949A7
ssdeep 192:56pVFIswi7gvjUjx4DTaLbb/HqbMWtsNseyykwXsamhG//yDpWsuZAlaf27:6hpAQeDkj6tasF1uiU/EpWLW7
Yara None matched
VirusTotal Search for analysis