Dropped Files | ZeroBOX
Name d2cbdaba96aefaf6_c1ec2d34.emf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C1EC2D34.emf
Size 5.1KB
Processes 2768 (WINWORD.EXE)
Type Windows Enhanced Metafile (EMF) image data version 0x10000
MD5 f8aaeef2a8f6eb2674d107878a16ad43
SHA1 9c5399306f64ae306b966db6c35e10dadc93975e
SHA256 d2cbdaba96aefaf619bd3fa5825669cae0cda338b48925369186f4ced8d80b76
CRC32 C93FD959
ssdeep 48:F35g2OkzjQVUlBcu3xIBcE/U4lXDASl9RQdXXX4YbcUMgzOxMQbAWy25wtN1z:FJhOk7c2bpXXX4vLnwtz
Yara None matched
VirusTotal Search for analysis
Name 05e5ab5b15dea308_~$wbsplink document.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$wBSPlink Document.doc
Size 162.0B
Processes 2768 (WINWORD.EXE)
Type data
MD5 0609eff33702c92eb8612395adc63a87
SHA1 6830ea83c9e1e7b294237c0150a20526584c48e2
SHA256 05e5ab5b15dea308013af5c92b79b291ba45c4e192c870ae2af2cbf3c16a4349
CRC32 B8EDFCDA
ssdeep 3:yW2lWRdvL7YMlbK7lZqngZJl:y1lWnlxK73dZ
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{49f0111d-868e-4fa0-b0e0-7477ab9be03f}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{49F0111D-868E-4FA0-B0E0-7477AB9BE03F}.tmp
Size 1.0KB
Processes 2768 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 8a6976db8aad8dda_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2768 (WINWORD.EXE)
Type data
MD5 d4e62d4bd463157e2c0182c51f4f057a
SHA1 beffe6ebab39146aac9a18c971df9691904521e9
SHA256 8a6976db8aad8dda6eaa6e466045624cc0ff3d0857aefe75e15c76000c62cca4
CRC32 68B7329C
ssdeep 3:yW2lWRdvL7YMlbK7lPn/l:y1lWnlxK7
Yara None matched
VirusTotal Search for analysis