Dropped Files | ZeroBOX
Name f19ce0fae344cc2d_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1256 (WINWORD.EXE)
Type data
MD5 481e2a92280252f01a7bb3617a3afc5b
SHA1 240d8079555ca911a7ee0e8368646fee2017dd2a
SHA256 f19ce0fae344cc2d7ddbd5742a92fed73bb18e4f6686c1a1b892be56660f027d
CRC32 F71D3BB0
ssdeep 3:yW2lWRdell3/W6L7uMnXK7mllllpgFItqwXn:y1lWivWmaoK7mtkWqw
Yara None matched
VirusTotal Search for analysis
Name 06521aa96d8fa9ae_~$kakazx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$kakazx.doc
Size 162.0B
Processes 1256 (WINWORD.EXE)
Type data
MD5 78bb94b91ad60cd60c60cba52de79d27
SHA1 3854ef2042f63f9ab7e56ef4c982aac1a7e59f24
SHA256 06521aa96d8fa9aeffa404a9ba0b8c85f37081a2148302fa8b7e7ebb1a9c7fb8
CRC32 9658D01B
ssdeep 3:yW2lWRdell3/W6L7uMnXK7mllllpgFItqw11:y1lWivWmaoK7mtkWq4
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{31d35293-5cdc-4ae5-9630-1138e3515487}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31D35293-5CDC-4AE5-9630-1138E3515487}.tmp
Size 1.0KB
Processes 1256 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 2fa2d476b2f59256_~wrs{f5717022-493d-4d0e-a626-6902a736dd8c}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F5717022-493D-4D0E-A626-6902A736DD8C}.tmp
Size 36.1KB
Processes 1256 (WINWORD.EXE)
Type data
MD5 d0ab2271dac479d1d3fdca9ac0657d42
SHA1 2138bab1e81f563542e3ab5d84657e052343ebc0
SHA256 2fa2d476b2f592560c279b23eae4d769cb937af98b09fb39797b8c2721ec2aaa
CRC32 43EE1C51
ssdeep 768:ys0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsf49885sFDam:6DvwxKrK2f4b1m
Yara None matched
VirusTotal Search for analysis