Dropped Files | ZeroBOX
Name a532038b184fcc6e_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1156 (WINWORD.EXE)
Type data
MD5 331760480b61dfd21f46cd6f5b47ffeb
SHA1 4074770a5068aa0562656f58258bca365448a20c
SHA256 a532038b184fcc6e8daa818aebef9e9577ec095442f2c1a1b4018c6ec673d37d
CRC32 B40D4492
ssdeep 3:yW2lWRduYf/W6L7ilvXK7enUgFItcfqdYltn:y1lWzf/Wme1XK7eUgWUmIt
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{31d3550c-5cdc-4ae5-9630-1138e3515487}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31D3550C-5CDC-4AE5-9630-1138E3515487}.tmp
Size 1.0KB
Processes 1156 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name baff5611f37e2a13_~$.x.x.x.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$.x.x.x.doc
Size 162.0B
Processes 1156 (WINWORD.EXE)
Type data
MD5 5a65de6093982dbef1d65fa1e3d223d5
SHA1 cffc5dd79db6953fbb243cbd9cc257d87c13d9c8
SHA256 baff5611f37e2a13f90649a07d1691188d0abcd24b8c8f6d1af66b04ab85d021
CRC32 32ADA8FD
ssdeep 3:yW2lWRduYf/W6L7ilvXK7enUgFItcfqKthltn:y1lWzf/Wme1XK7eUgWUvpt
Yara None matched
VirusTotal Search for analysis
Name 213cf38ed76cea2b_~wrs{1786e930-ac7b-404f-a55a-16203f2e5367}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1786E930-AC7B-404F-A55A-16203F2E5367}.tmp
Size 6.5KB
Processes 1156 (WINWORD.EXE)
Type data
MD5 79eb5099941aa1838116d21f02ab7cf8
SHA1 23123f1d579e3e093ef93b33b247a2c34a04c7dc
SHA256 213cf38ed76cea2bd7ca80c3a7a71bd6adb6152b74bb2919e9a75204eb3e3f1b
CRC32 33DD82FA
ssdeep 96:h4bKKGL6riGJM/oxGidCDtKTVL9ljqzKRgBQ0VSUlWpf/KWecPBxtYUmDuW1:6fWGNwDtKTVL9gEgGGlu6Mwd1
Yara None matched
VirusTotal Search for analysis