Dropped Files | ZeroBOX
Name 51ee687f9b6ab18f_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2304 (WINWORD.EXE)
Type data
MD5 49ed437d04b37f7ad165bb434c9e5597
SHA1 8d029ffa39361f05bb7e0086b88d9d707876b053
SHA256 51ee687f9b6ab18f43d6ad3058ecacd10459db3a4ef2240c135e687acb1fd6a9
CRC32 91AAFD8F
ssdeep 3:yW2lWRdD+oW6L70K7M6XliItiXtm+lbltn:y1lW3+oWmIK7M6XlBi9m+Jlt
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{46cca5d7-4de0-433f-8034-c05181a1c22b}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{46CCA5D7-4DE0-433F-8034-C05181A1C22B}.tmp
Size 1.0KB
Processes 2304 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 25acf83f7aa43afa_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\VBE\MSForms.exd
Size 143.8KB
Processes 2304 (WINWORD.EXE)
Type data
MD5 932dfff7d687a5579189175c65db6669
SHA1 a94a10e907caff8bd3cab57ff7cb5d7dc8b6dba4
SHA256 25acf83f7aa43afa377d71dbe0e031fcc8d1c139eb55c2a2a33073ee37cc62aa
CRC32 0D878E78
ssdeep 1536:CkiL3FNSc8SetKB96vQVCjumVMOej6mXmYarrJQcd1FaLcmB:CZJNSc83tKBAvQVCGOtmXmLpLmB
Yara None matched
VirusTotal Search for analysis
Name a07772578c72a86d_~$agram-125.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$agram-125.doc
Size 162.0B
Processes 2304 (WINWORD.EXE)
Type data
MD5 2950861b1d2cd1ef94475284c00e1aa0
SHA1 bef11e7826bd7521937d73e55729e9d838225afb
SHA256 a07772578c72a86ddde38bc6b4f2573d0f3881887920adedf6ee5c76f4e6d0c9
CRC32 DBA8B389
ssdeep 3:yW2lWRdD+oW6L70K7M6XliItiXtm+etn:y1lW3+oWmIK7M6XlBi9m+K
Yara None matched
VirusTotal Search for analysis