Dropped Files | ZeroBOX
Name dc69be9e4c55d0af_~$-465514-180820.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$-465514-180820.doc
Size 162.0B
Processes 2996 (WINWORD.EXE)
Type data
MD5 7cf9628e25297df0fa6888bfff61ec79
SHA1 b915f8452504f4a92cda0db34038f2a968c9d43b
SHA256 dc69be9e4c55d0af4b7893154bebee9923b09fb736e6cc7567bdab505413997b
CRC32 496C0684
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtSll/4Xhn:y1lWnlxK7ghqqFSlt4xn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{0e41803d-c53e-4862-9c64-4b7e3a89cc76}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0E41803D-C53E-4862-9C64-4B7E3A89CC76}.tmp
Size 1.0KB
Processes 2996 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d8650f1942634f34_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\VBE\MSForms.exd
Size 143.8KB
Processes 2996 (WINWORD.EXE)
Type data
MD5 c1afd683113088e635d01c3aab105f49
SHA1 566ca0321bbf8ec642835b59c26820c0905dcb72
SHA256 d8650f1942634f34bd64e39e543c83f62b7ef1aba314305794d37f75cd151a3e
CRC32 DF36917C
ssdeep 1536:CkbL3FNSc8SetKB96vQVCjumVMOej6mXmYarrJQcd1FaLcmB:CQJNSc83tKBAvQVCGOtmXmLpLmB
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2996 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis