Dropped Files | ZeroBOX
Name e9f11a132b36581c_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2648 (WINWORD.EXE)
Type data
MD5 8e7224228ae4194fddfed35e95b5465b
SHA1 b6c896ba3c2ebffb9d5941fe83a68dd11df6cd4a
SHA256 e9f11a132b36581cd146e55975ee543e2d9783fc84c2c18d8ded5f57d73aef89
CRC32 B44E46AB
ssdeep 3:yW2lWRdvL7YMlbK7lpnX:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis
Name 5f2959be233d4882_99dea463.wmf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\99DEA463.wmf
Size 172.0B
Processes 2648 (WINWORD.EXE)
Type Targa image data - Map - RLE 9 x 65536 x 0 +2 "\003"
MD5 a4f03acb61a495499ba3b32049a6117c
SHA1 cb963ac4e6b5a65fcf56d775f2526fe52b2debfc
SHA256 5f2959be233d4882755741de02d4981af80b4d3533a9b756ca39fd7ebcfeedb1
CRC32 696711D9
ssdeep 3:VmJv2lVlog/lcBhl/llt+nllaaezAklC5dl///+nllaaezAkk7nkl+No/lCol6/8:MJv2lPogtcX4S/AssQS/Axkl+N4ROKzX
Yara None matched
VirusTotal Search for analysis
Name b3d510ef04275ca8_excludedictionaryen1c09.lex
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN1c09.lex
Size 2.0B
Processes 2648 (WINWORD.EXE)
Type Little-endian UTF-16 Unicode text, with no line terminators
MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
CRC32 88F83096
ssdeep 3:Qn:Qn
Yara None matched
VirusTotal Search for analysis
Name feebc5ac2b3147d1_~$de_of_conduct_2021.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$de_of_Conduct_2021.doc
Size 162.0B
Processes 2648 (WINWORD.EXE)
Type data
MD5 38a78254cf0d7816e664695551a9874e
SHA1 d88c4d1cdbcf645704df89c91ebe0c481f07239b
SHA256 feebc5ac2b3147d19db117a7ebc27e013c1a61fbde3f7dc7a59616a9aadbe83a
CRC32 AB03ACC0
ssdeep 3:yW2lWRdvL7YMlbK7lZmnIFnX:y1lWnlxK73lFn
Yara None matched
VirusTotal Search for analysis
Name 44d08c056bd13ff1_~wrs{dec62c14-174f-41eb-a0d1-710939b9bf83}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DEC62C14-174F-41EB-A0D1-710939B9BF83}.tmp
Size 1.5KB
Processes 2648 (WINWORD.EXE)
Type data
MD5 3db51ffc8fe61f34a4174afc672c1172
SHA1 9fa3d17f6495961fa5d5eb361d3fe8d42984462a
SHA256 44d08c056bd13ff13f7f30a3903a44b5a5f697951773405d9f019aabba7836a9
CRC32 CE72E02E
ssdeep 6:IiiiiiiiiiE/bYflo3dc8++ZYSySkssqA1+tKHqW9n:S/XtG+aSpk1j1+tKHnn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{49f0111d-868e-4fa0-b0e0-7477ab9be03f}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{49F0111D-868E-4FA0-B0E0-7477AB9BE03F}.tmp
Size 1.0KB
Processes 2648 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis