Dropped Files | ZeroBOX
Name a4a56fd6263669ad_d5647c05.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D5647C05.emf
Size 4.9KB
Processes 1092 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 aacdecc6f5c6c851000eef4c49618a08
SHA1 9b77caf2467fad5dda8b6c84d5ea2d3594209fec
SHA256 a4a56fd6263669ad315cf9d20f9142b43e3a857c737da519e7e4f8e215798bb0
CRC32 A7F7F4E9
ssdeep 48:FXNFqrsdBg6qjpLkwOEG6kpYjdHkLWaKLLN:3Fq2BFq9gVU5EL6N
Yara None matched
VirusTotal Search for analysis
Name 55d6f08299aa78e2_~$08_1433632206833.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$08_1433632206833.doc
Size 162.0B
Processes 1092 (WINWORD.EXE)
Type data
MD5 e62743d49a8d0c9414f3e08ca2e8c352
SHA1 1931641fea03b4922d5d12ce3651c168b75674ca
SHA256 55d6f08299aa78e2d171732b9f251106e745c1663df39b6179542967b45e92c9
CRC32 3D3F00AF
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItRm/l2tjgWIart/:y1lWnlxK7ghqAYOWIet
Yara None matched
VirusTotal Search for analysis
Name cc6214d67b6c9c45_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1092 (WINWORD.EXE)
Type data
MD5 57c528817382a3538ec35dd5cf4be558
SHA1 5d8a2dd5b3b1ffa58c0f40b541058090be2d3caa
SHA256 cc6214d67b6c9c45c54102a97e49bb4c067e3fea454996ec098795d59c825f02
CRC32 CC573495
ssdeep 3:yW2lWRdvL7YMlbK7g7lxItO/OtjgWIart/:y1lWnlxK7ghqO2OWIet
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{1d5df1a5-d8b1-4c8e-8253-ac9d6d4a138b}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1D5DF1A5-D8B1-4C8E-8253-AC9D6D4A138B}.tmp
Size 1.0KB
Processes 1092 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis