Dropped Files | ZeroBOX
Name 05c700d26214a7f8_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 316 (WINWORD.EXE)
Type data
MD5 f328f8f105cd9946b7cf851b5e79a1d6
SHA1 5bbdacde2ea9f564f0654d26f7ccb744cf27d262
SHA256 05c700d26214a7f8f8847d851b6cb34c8707564c14b5196754aeefcb3affd4c7
CRC32 51A5F0A2
ssdeep 3:yW2lWRd0GoW6L7zvXK7MQMllpuIt73U4hhzt:y1lWwGoWmXvXK7MQM/pVDUshzt
Yara None matched
VirusTotal Search for analysis
Name 86b6760a5094d361_~$irdagodzx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$irdagodzx.doc
Size 162.0B
Processes 316 (WINWORD.EXE)
Type data
MD5 85316d9a475166f3802581a43b98260a
SHA1 95390843e17729d3d1f07bb43b2e8c2cbef20070
SHA256 86b6760a5094d3613c78315a12d5c5a0f5286f5ca840f232d71e6028be94ee3b
CRC32 E5C75192
ssdeep 3:yW2lWRd0GoW6L7zvXK7MQMllpuIt73U4hqztn:y1lWwGoWmXvXK7MQM/pVDUsut
Yara None matched
VirusTotal Search for analysis
Name ef947a68b8ec72dd_~wrs{1786e930-ac84-404f-a55a-1620c02e5367}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1786E930-AC84-404F-A55A-1620C02E5367}.tmp
Size 34.0KB
Processes 316 (WINWORD.EXE)
Type data
MD5 3e338cf92a57956337148d02141e72e0
SHA1 a62c4867f8e71c53c86b72efa7bea25529013c41
SHA256 ef947a68b8ec72dd5e495a724158d23458dddcb7d88f4ac932933c66f8269c23
CRC32 A364BC9D
ssdeep 768:ys0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsfxog3:6DvwxKrK2fxr
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{72763bb8-0e0a-41b1-864a-520e8118be39}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{72763BB8-0E0A-41B1-864A-520E8118BE39}.tmp
Size 1.0KB
Processes 316 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis