Dropped Files | ZeroBOX
Name fc3a22553b0b9c52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3024 (WINWORD.EXE)
Type data
MD5 4a1f4ab6408b7fdf10667af524456e21
SHA1 d967089a53ebfd34144d41b4163c08adf2401df7
SHA256 fc3a22553b0b9c52f3c622d5934a5b1793b2be06c92aa7cbb1b6c988ab4739fb
CRC32 13DE48BD
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt7mk/tyXhllFrll:y1lWnlxK7ghq7T/tyxdj
Yara None matched
VirusTotal Search for analysis
Name ab07a5d94b25cd23_~$tracted_at_0x21aa3.rtf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$tracted_at_0x21aa3.rtf
Size 162.0B
Processes 3024 (WINWORD.EXE)
Type data
MD5 e0819018167d03e74ac9726a2bac46a9
SHA1 96c8df33bc6893969b00ac93c873004821cac0c3
SHA256 ab07a5d94b25cd23a060445a7a48e6088f970ba9478ab7b7195321e4afb83f34
CRC32 1E6B0777
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItp2IXhllFrll:y1lWnlxK7ghqp2Ixdj
Yara None matched
VirusTotal Search for analysis
Name b38598708e92041b_~wrs{172a383b-ab99-4000-9131-d6f0269dc457}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{172A383B-AB99-4000-9131-D6F0269DC457}.tmp
Size 30.0B
Processes 3024 (WINWORD.EXE)
Type data
MD5 13c9d26b404df4986dc6dd25e6de469d
SHA1 29c25085c31392daa94299e7156a8fe91625a16c
SHA256 b38598708e92041b5c336210bb422a676c092eb5d25ac4a2ebf3f1837de0fc54
CRC32 D8CA36A4
ssdeep 3:ylTY5Rl:2Te
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{51855b4b-c32f-4ba8-9a90-7799dc0d8504}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{51855B4B-C32F-4BA8-9A90-7799DC0D8504}.tmp
Size 1.0KB
Processes 3024 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis