Dropped Files | ZeroBOX
Name a2ab375a7a7a84e9_~$.............dot
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$.............dot
Size 162.0B
Processes 3016 (WINWORD.EXE)
Type data
MD5 90c09f8daf0047ae5487cc5df809e17f
SHA1 8ceb80a052ac121e17610e496fd2d66df4eca8b0
SHA256 a2ab375a7a7a84e9ebe0add212bb9c980eff2bbb5ded7283368684d1b2084df1
CRC32 E5F857D3
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtGiXhn:y1lWnlxK7ghqqFGixn
Yara None matched
VirusTotal Search for analysis
Name a42a433a750850a2_~wrs{f0346b54-4df7-47b7-8f1c-0194df34e5de}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F0346B54-4DF7-47B7-8F1C-0194DF34E5DE}.tmp
Size 9.5KB
Processes 3016 (WINWORD.EXE)
Type data
MD5 4003a8e88e5eae0d652bc6c1c2f08bff
SHA1 de272a370a1c0aa38fdb78eafcdac59b297a844a
SHA256 a42a433a750850a2bfd2c2eb2191504167ac287ddf2482f27f44ef1889ebd6ab
CRC32 DD78E43A
ssdeep 192:pl9qhkYGrpqNOaoiYjhBthE70LFgr1Uapubm/xbjQUtInl:pl4hkYwUPoiYtru70Krmuxbkjl
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3016 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{50048bc1-dbe6-4353-8233-549c872ed411}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{50048BC1-DBE6-4353-8233-549C872ED411}.tmp
Size 1.0KB
Processes 3016 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis