Dropped Files | ZeroBOX
Name 74ee2cf0d853a0ee_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\Word8.0\MSForms.exd
Size 162.8KB
Processes 3020 (WINWORD.EXE)
Type data
MD5 38d180e42cae68d03379bb00cbe25d79
SHA1 dad7030398d6e7d3d6a0a178474d244ebdfaa8ec
SHA256 74ee2cf0d853a0ee3342fcd702dfa410c3061ecc9b04de6ba8eb1941098f7459
CRC32 69535AFF
ssdeep 1536:IQWudL6wNSc8SetKB4YuiMOqQ/WVMO+O9sOHK7K2xBmsqsDPza7vKp:I+djNSc83tKBduiMnWOXTK7K1Kp
Yara None matched
VirusTotal Search for analysis
Name ece13160ae14949b_52c0fe9e.wmf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\52C0FE9E.wmf
Size 338.0B
Processes 3020 (WINWORD.EXE)
Type Targa image data - Map - RLE 9 x 65536 x 0 +5 "\004"
MD5 21c023242d948f7a23f7a24e9bb9567a
SHA1 8095738d4cb2c6cd77d02b3d4cd2609196cfc354
SHA256 ece13160ae14949b4b92b3a5e7048af2e9e3129ca8e2de972e160c313822bac1
CRC32 92F9DB8A
ssdeep 6:MEpYkK0Xgtql8EbAsl+1v1AS/AczS5fcub0RcdO576KWak+5ZMoml4J+1Wztl:M/p058E0NAQjzSxNb0R4stHKlxWztl
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{131e5f34-79a5-48d2-978c-e9d1b5c8c162}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{131E5F34-79A5-48D2-978C-E9D1B5C8C162}.tmp
Size 1.0KB
Processes 3020 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 26778ce0eafb9c81_~$r payment summary.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$R Payment Summary.doc
Size 162.0B
Processes 3020 (WINWORD.EXE)
Type data
MD5 4ae1632361a4018f2425582ea4db5fef
SHA1 97b96a61d123c98ffd52e852e007a64a924f3544
SHA256 26778ce0eafb9c8134840821335527cdba350cbdde5fd6e11035760a73604e9b
CRC32 41930408
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtYswXhn:y1lWnlxK7ghqqFYswxn
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3020 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis