Dropped Files | ZeroBOX
Name 5bd365bd32c0b1fe_~$llianozx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$llianozx.doc
Size 162.0B
Processes 2052 (WINWORD.EXE)
Type data
MD5 f2a06b629fcd35e6d2015abb3f4077dc
SHA1 ae7f5cf03ebb2ba537eb4938f456a0270c45e2c9
SHA256 5bd365bd32c0b1fe58e42983a9bb52c3b23320b3eb02d10cb17321e344b73f7b
CRC32 826F67B2
ssdeep 3:yW2lWRdPldW6L761/lhJK7/NcItA+zt:y1lWDldWmuHvK7FrA6t
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{8721d3d8-d661-44b7-af4b-3ef9e44cc26d}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8721D3D8-D661-44B7-AF4B-3EF9E44CC26D}.tmp
Size 1.0KB
Processes 2052 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 546500e34bde1b7a_~wrs{af117d16-a915-4991-9e57-e949b80a6ada}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AF117D16-A915-4991-9E57-E949B80A6ADA}.tmp
Size 33.5KB
Processes 2052 (WINWORD.EXE)
Type data
MD5 74a9151e4268cdc93e5f6c6b44ee6374
SHA1 225bd3c917293331615488f1b00855af4cfef7a6
SHA256 546500e34bde1b7a46cea012a9baa06ea4aa0e9e6c472591212174df9f4f988e
CRC32 18538D1D
ssdeep 768:Rs0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsfkkVwZ:RDvwxKrK2fkke
Yara None matched
VirusTotal Search for analysis
Name 82734edbcc9e29f9_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2052 (WINWORD.EXE)
Type data
MD5 e8819f912f416dc38457359f004c41d5
SHA1 0b88ada06a3537c45bb79155161b5d1109b74b1d
SHA256 82734edbcc9e29f9d6eaf5899ebfd77d0140696dad632a6932f42583e20a3968
CRC32 BBFD3C50
ssdeep 3:yW2lWRdPldW6L761/lhJK7/NcItA3lll:y1lWDldWmuHvK7FrA3lll
Yara None matched
VirusTotal Search for analysis