Dropped Files | ZeroBOX
Name 6e5a16651462f354_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 792 (WINWORD.EXE)
Type data
MD5 a956ae0d4801dba99ce4e9c2a54c7f00
SHA1 16fad3f4a54c42b330e4043404eb5e3e546dedc9
SHA256 6e5a16651462f3540026ef9985bca960067cc6eeec1838f9557fa9e73f64d80f
CRC32 1EF33F03
ssdeep 3:yW2lWRdclt/W6L7VnXK7oJbgFItZ/ltKg:y1lWAt/Wm5nXK7oVgWZ/ltKg
Yara None matched
VirusTotal Search for analysis
Name 0a2d96c2567a9dfe_~$vincizx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$vincizx.doc
Size 162.0B
Processes 792 (WINWORD.EXE)
Type data
MD5 5b2deb9236e7c3a57f0360706a190b63
SHA1 726c307c383887fb6c741ee01c881f07f56cf77e
SHA256 0a2d96c2567a9dfe53ac9b2984083b41903afd526f4bbdd9969779cdff44a5b8
CRC32 0109EA7B
ssdeep 3:yW2lWRdclt/W6L7VnXK7oJbgFItZ/ltK54l:y1lWAt/Wm5nXK7oVgWZ/ltKW
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{be4cdff3-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDFF3-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 792 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 558132a4982c0152_~wrs{c4e2f51f-dac9-49fc-b9d5-108c335c54a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C4E2F51F-DAC9-49FC-B9D5-108C335C54A4}.tmp
Size 40.5KB
Processes 792 (WINWORD.EXE)
Type data
MD5 370e9d4661c429f06ee96cbbd6d2e732
SHA1 f84eeced7eb43e80d4d9c8ca0dc6c2df0949a65d
SHA256 558132a4982c0152ee9251010ca2de44d4869ff7851bbd52ee4fb3e31a4ac1f8
CRC32 F0A217A6
ssdeep 768:Gs0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsfJwiZrlcEcA/T9Z:ODvwxKrK2fFZrOEcA/L
Yara None matched
VirusTotal Search for analysis