Dropped Files | ZeroBOX
Name f8fe98231787950f_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1792 (WINWORD.EXE)
Type data
MD5 d99e6dd2e5cf43e64cfaddcbd352d651
SHA1 1de232e06eab9d7a95e4da73f23b02171a9e29e9
SHA256 f8fe98231787950fccce1fd39c3825043887c2f8d1d32ab8b14d8bc24dbfdb04
CRC32 A67DE97A
ssdeep 3:yW2lWRdOtt/W6L7sglvZJK7Zzg/zuItBog/3UKO1mX:y1lWC/WmHXK72zV/fUV1mX
Yara None matched
VirusTotal Search for analysis
Name 97b76ede2cf3b469_~$mlcache8.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$MLcache8.dOC
Size 162.0B
Processes 1792 (WINWORD.EXE)
Type data
MD5 ae287f81bd266cccd40d642da0a266b2
SHA1 f977203d17530d2208e3e50225180837cc71bf2f
SHA256 97b76ede2cf3b469f80a981dc749e9bc1675606f575c907447ec192efb7e0e66
CRC32 D972529D
ssdeep 3:yW2lWRdOtt/W6L7sglvZJK7Zzg/zuItBog/3UCIrl/n:y1lWC/WmHXK72zV/fULZ
Yara None matched
VirusTotal Search for analysis
Name ddc93446afb73cb3_~wrs{b7493160-599c-4a1f-a29b-7f9cc2a533c9}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B7493160-599C-4A1F-A29B-7F9CC2A533C9}.tmp
Size 9.1KB
Processes 1792 (WINWORD.EXE)
Type data
MD5 0a0de00c739acf3bc98f0dd97f09df76
SHA1 c30f2a65f06bad78b3564bffc28e1fd2e90d5f9e
SHA256 ddc93446afb73cb399eb2527fde8bb9445a50a983a68017b5fa5cb24408d1863
CRC32 520512A7
ssdeep 192:0Z3DrpwQYhuOTGesyvaabdX6Aw8GX9KuGcEI28P4fuLeU1:09r+QEu7eskPblnw5xfEIJ42Le0
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{be4cde85-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDE85-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 1792 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis