Dropped Files | ZeroBOX
Name 02ceb04b9173f755_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\VBE\MSForms.exd
Size 143.8KB
Processes 2500 (WINWORD.EXE)
Type data
MD5 1a2a7e3d2ef6f60705530a122aa06dad
SHA1 2f9792d1a4fab1066a6a0e0528d2dd5e8a17bfbe
SHA256 02ceb04b9173f75574f166beb5d17c8a3bb3238bbebfe6707940473ef342e4c3
CRC32 79D42DE9
ssdeep 1536:CkaL3FNSc8SetKB96vQVCjumVMOej6mXmYarrJQcd1FaLcmB:CtJNSc83tKBAvQVCGOtmXmLpLmB
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{af01672b-ee7f-4b10-9a66-e5caa7ffb436}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AF01672B-EE7F-4B10-9A66-E5CAA7FFB436}.tmp
Size 1.0KB
Processes 2500 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 28a41d9280af1712_~$kul kumar.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$kul Kumar.doc
Size 162.0B
Processes 2500 (WINWORD.EXE)
Type data
MD5 28f23d8a41e82adaff53f2c72505b5d1
SHA1 0525ec4f45d44991f37057db94f2a60fdb536c18
SHA256 28a41d9280af1712eb4ef9ebb67446b9afab24406e4252a861bdaf3573c46669
CRC32 9292BA36
ssdeep 3:yW2lWRd57/woW6L7aVK7fbaIt5Kllsl:y1lWB/woWmOVK7DJc/sl
Yara None matched
VirusTotal Search for analysis
Name 497d59692f42d0a4_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2500 (WINWORD.EXE)
Type data
MD5 09e837c2608fe821e8cdfdc1c21b77d4
SHA1 296a90306452fd8b6d3ca79d3690c69aadf5f8c9
SHA256 497d59692f42d0a45f1b570ce4c180d743b64236b8b1be633119a4aa5653150c
CRC32 E0A94207
ssdeep 3:yW2lWRd57/woW6L7aVK7fbaIt5KllsZRmll/n:y1lWB/woWmOVK7DJc/s6ll/n
Yara None matched
VirusTotal Search for analysis