Dropped Files | ZeroBOX
Name 44f67ffdfb1c1f6b_~$v6yaywopeki61y.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$V6YAYWOPEKI61Y.docx
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 471fff4da39fdd12ae688c0f1fc18c21
SHA1 78b25f98e6ddd215451e9bbac961ff457af76e0b
SHA256 44f67ffdfb1c1f6bc009d3e8a79d38275d02ecea321dd1ce5e8a709baed1eb1b
CRC32 1A98C16E
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtUPll/4Xhn:y1lWnlxK7ghqqFWlt4xn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{c7b62566-9eab-4aa6-b0fd-dba43aa59b82}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C7B62566-9EAB-4AA6-B0FD-DBA43AA59B82}.tmp
Size 1.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis