Dropped Files | ZeroBOX
Name 4b36592ffa0d7310_~$agram-303.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$agram-303.doc
Size 162.0B
Processes 1940 (WINWORD.EXE)
Type data
MD5 d9d3eafec1be73b804273ac6dd284b76
SHA1 5a8375dace8611daaf2ee77dff34dbde5e6fe7ee
SHA256 4b36592ffa0d7310095e2421aeb66ba3f8fba447152ceef1e47f2f1d5d8b62ef
CRC32 E16A540B
ssdeep 3:yW2lWRdHd/dW6L7kLJK7wCllcItOu1umt:y1lWx/dWmkK7wCllrvLt
Yara None matched
VirusTotal Search for analysis
Name 87fdd5a2bbafbb2c_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1940 (WINWORD.EXE)
Type data
MD5 85459624ba4cbf3f652019f46b213422
SHA1 be609a54520ce2076697457bd88b5b628f3de0ed
SHA256 87fdd5a2bbafbb2c68353ecb43132bf06a01122c21478d6dde5ddfff417352cf
CRC32 9E0BA88C
ssdeep 3:yW2lWRdHd/dW6L7kLJK7wCllcItOuell/:y1lWx/dWmkK7wCllrvO/
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{34551b17-0c14-4ab4-89ee-d93bc774473d}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{34551B17-0C14-4AB4-89EE-D93BC774473D}.tmp
Size 1.0KB
Processes 1940 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 2a83eb4aed93de05_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\VBE\MSForms.exd
Size 143.8KB
Processes 1940 (WINWORD.EXE)
Type data
MD5 213fa8b24fd5be945d311ec68d8e18e8
SHA1 ea22dc3594d4c4c939a1ea35f1a0e0e8d6738367
SHA256 2a83eb4aed93de05acb4be69116e99a16bb4ecb07971387364bff0a0dd3a86cd
CRC32 1F1BF184
ssdeep 1536:CkOL3FNSc8SetKB96vQVCjumVMOej6mXmYarrJQcd1FaLcmB:C5JNSc83tKBAvQVCGOtmXmLpLmB
Yara None matched
VirusTotal Search for analysis