Dropped Files | ZeroBOX
Name 13eacdd5c0e90c39_901ca86.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\901CA86.emf
Size 7.1KB
Processes 2380 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 24404363b03a609b60d72e08ceb56742
SHA1 ce160fcd91f7c40fabaddc4084cfebb0f204bfa0
SHA256 13eacdd5c0e90c390c58c4b334662e0bb834ad654fc2e928d6a36e31f9e54ca8
CRC32 D470C7E9
ssdeep 96:aENEtbJZat2e+TArXuQvQYQQlQflllFllSQeMbRmi9MMO51qOCi5:aEXt2AXSb7KfqOCk
Yara None matched
VirusTotal Search for analysis
Name 8b60e3253b5331a6_~$e-in-word-97-2003.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$e-in-word-97-2003.doc
Size 162.0B
Processes 2380 (WINWORD.EXE)
Type data
MD5 89fbc97dca70e09986a1a659580a616a
SHA1 83606bd6ad233f749f2371280e0929d3cc604273
SHA256 8b60e3253b5331a65c4081704415cd39cbf7a84ef97c92832aae8ddc23ce2f2d
CRC32 0AF34F32
ssdeep 3:yW2lWRdU3/W6L7vHvXK7d6zgFItd9lt8PVrl:y1lWKWmjvK7DWHli7
Yara None matched
VirusTotal Search for analysis
Name c50be3145706585a_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2380 (WINWORD.EXE)
Type data
MD5 8ce9600a4233332e50a97ece01ff947e
SHA1 00fe9bd0f1c1c2d2136faeee6239e258cafda7d8
SHA256 c50be3145706585a47c459e043a958c3e55b71aaf6dd2c2b2c9eb63489ef6633
CRC32 C65E8534
ssdeep 3:yW2lWRdU3/W6L7vHvXK7d6zgFItd9lt8KZl/l:y1lWKWmjvK7DWHl5lt
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{325695cb-0223-4cd8-9d77-4a0efb1b562d}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{325695CB-0223-4CD8-9D77-4A0EFB1B562D}.tmp
Size 1.0KB
Processes 2380 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis