Dropped Files | ZeroBOX
Name b13c97e10a3d2052_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 872 (WINWORD.EXE)
Type data
MD5 fc296414ca964d520d748d1acc5b2a3a
SHA1 cf33318f3e519c638da037ea538cd2255e10db75
SHA256 b13c97e10a3d2052b0f92bccfb640c65ab200b951037dc3310a827a315b57752
CRC32 A1B0558F
ssdeep 3:yW2lWRdAtdW6L7EW/hJK7xvWkIt+WhmStln:y1lWEtdWml/vK7UDXwStl
Yara None matched
VirusTotal Search for analysis
Name 10ab6f4633436f1e_~$.31.31.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$.31.31.doc
Size 162.0B
Processes 872 (WINWORD.EXE)
Type data
MD5 24d7f5e847df947defa6bee8c4dbbcb2
SHA1 41df260017a085cdeff2915be1d4eb2807a2a3ae
SHA256 10ab6f4633436f1e3e176c9ee3317c4654f9d6163b6e8a7cfdf62f4ff6679068
CRC32 1F3BAA93
ssdeep 3:yW2lWRdAtdW6L7EW/hJK7xvWkIt+WhmjZJ/:y1lWEtdWml/vK7UDXwlx
Yara None matched
VirusTotal Search for analysis
Name 704e4ba273cfb41a_~wrs{44d1fa15-4c11-44fe-af0c-867892c08f96}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{44D1FA15-4C11-44FE-AF0C-867892C08F96}.tmp
Size 7.5KB
Processes 872 (WINWORD.EXE)
Type data
MD5 373c6117579637886ce46fb0d72768b1
SHA1 195cea439eb6fd9c0bb8c4348c1c34957c8c8773
SHA256 704e4ba273cfb41a0438d3bd6094eed147cc6d990a07953bca9916acc64c79c5
CRC32 288146B4
ssdeep 192:sVBl89wQJwqK6V5DRUamlqqAWJKtGlTzQlYwiElRRuUlTRLuY0:+XmN+amlyoKtGlTyVuOD0
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{52befe5a-668f-453f-bd6b-8ae9e8e42ec9}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{52BEFE5A-668F-453F-BD6B-8AE9E8E42EC9}.tmp
Size 1.0KB
Processes 872 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis