Dropped Files | ZeroBOX
Name 5982a038102ea279_~$14 n 17st.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$14 N 17ST.doc
Size 162.0B
Processes 2996 (WINWORD.EXE)
Type data
MD5 8226cea3815c40a9fd348aec2ae65536
SHA1 567727c88b6ce8e906c510f56d59d2087a3004f0
SHA256 5982a038102ea2796336028ac19fa735a509063fcabc321fc9e55d0e508a9e9a
CRC32 B218CB0C
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtms24Xhn:y1lWnlxK7ghqqFms24xn
Yara None matched
VirusTotal Search for analysis
Name 21b75cda5b17bc21_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\VBE\MSForms.exd
Size 143.8KB
Processes 2996 (WINWORD.EXE)
Type data
MD5 674518fbcaca75e899f2a8b88b0594b9
SHA1 f5baf2d936d047be15507eb63dcb8597646a3556
SHA256 21b75cda5b17bc21003058e980e4f857f7e43f81d625de6627adffa58f721bbc
CRC32 E461BD2E
ssdeep 1536:CkGL3FNSc8SetKB96vQVCjumVMOej6mXmYarrJQcd1FaLcmB:CZJNSc83tKBAvQVCGOtmXmLpLmB
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{e062b778-9d91-480b-ab44-78d04a3ee2a5}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E062B778-9D91-480B-AB44-78D04A3EE2A5}.tmp
Size 1.0KB
Processes 2996 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2996 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis