Dropped Files | ZeroBOX
Name cc6214d67b6c9c45_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2140 (WINWORD.EXE)
Type data
MD5 57c528817382a3538ec35dd5cf4be558
SHA1 5d8a2dd5b3b1ffa58c0f40b541058090be2d3caa
SHA256 cc6214d67b6c9c45c54102a97e49bb4c067e3fea454996ec098795d59c825f02
CRC32 CC573495
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItO/OtjgWIart/:y1lWnlxK7ghqO2OWIet
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{d722c903-99cc-4a42-a38f-92b99f4e9d67}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D722C903-99CC-4A42-A38F-92B99F4E9D67}.tmp
Size 1.0KB
Processes 2140 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name e7769f830ef87e9b_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\VBE\MSForms.exd
Size 143.8KB
Processes 2140 (WINWORD.EXE)
Type data
MD5 0e29310be41af5f6b0f0fff8746ed1b1
SHA1 04b21d863e47df1155683eb4a5c00c49f18a8b72
SHA256 e7769f830ef87e9b3256c54c7744832a2b3f314a118bf915fcf07ce747df022b
CRC32 1E8B7E4A
ssdeep 1536:CksLrFNSc8SetKB96vQVCjumVMOej6mXmYarrJQcd1FaLcmB:C3NNSc83tKBAvQVCGOtmXmLpLmB
Yara None matched
VirusTotal Search for analysis
Name 4a8285dc783fd5fb_~$agram-308.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$agram-308.doc
Size 162.0B
Processes 2140 (WINWORD.EXE)
Type data
MD5 133dc96acce788b626095631afa4016a
SHA1 103310a7d2cd4f92434dc1f04160a78451e76777
SHA256 4a8285dc783fd5fb08dbf9e5bb9bc156fd296953509acf58bd0025dc8203445a
CRC32 22E41486
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItt+l2tjgWIart/:y1lWnlxK7ghqtZOWIet
Yara None matched
VirusTotal Search for analysis