Dropped Files | ZeroBOX
Name edeb497400fb5dba_~$agram-170.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$agram-170.doc
Size 162.0B
Processes 2508 (WINWORD.EXE)
Type data
MD5 b4754dc8cbeb321b393676567e85fe6f
SHA1 1d5a53731fcd4fcd452717646a61ee5f56ee456c
SHA256 edeb497400fb5dbaa3b068d335c808880e9a8b64de2420b465c3ad4072334f25
CRC32 C347184C
ssdeep 3:yW2lWRdDW6L725JK71haItTWllMVNSlll:y1lWvWm63K7ZTW/MVNSt
Yara None matched
VirusTotal Search for analysis
Name 27a51fbae8885de5_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\VBE\MSForms.exd
Size 143.8KB
Processes 2508 (WINWORD.EXE)
Type data
MD5 de751368f2b4dacd6f9816c16262babb
SHA1 95628f5ac35abe336d18e8c0a92e77c7558a0fc8
SHA256 27a51fbae8885de5e24be13b35ce302a4e91ccd1943b71f5f07e06305a87f817
CRC32 448D65FC
ssdeep 1536:CkrL3FNSc8SetKB96vQVCjumVMOej6mXmYarrJQcd1FaLcmB:CQJNSc83tKBAvQVCGOtmXmLpLmB
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{ffa4eb17-500d-4e08-97ac-acbe38158211}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FFA4EB17-500D-4E08-97AC-ACBE38158211}.tmp
Size 1.0KB
Processes 2508 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name cfadbb4478a089bf_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2508 (WINWORD.EXE)
Type data
MD5 6bc7a5402512b767f72ef9902f846e54
SHA1 918be458f36d90198db229bff81cdc014d93a50f
SHA256 cfadbb4478a089bf69267be062a30e43b6f28161d7901b8a2a5e3653eebebd41
CRC32 66A3ED3B
ssdeep 3:yW2lWRdDW6L725JK71haItTWllM5Hmlt:y1lWvWm63K7ZTW/M5Hmlt
Yara None matched
VirusTotal Search for analysis