Dropped Files | ZeroBOX
Name 58715d461cae1c7b_~$llianozx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$llianozx.doc
Size 162.0B
Processes 1680 (WINWORD.EXE)
Type data
MD5 5aaad382b5a8aeca5c02703d5e2b140a
SHA1 5cbb23e6d940202f3cf69c928df836881f60585d
SHA256 58715d461cae1c7b7023b86a3ffe76356bf85931a0dfabca6b0f9335ab360494
CRC32 16FA2740
ssdeep 3:yW2lWRdQoW6L7I3tvK7+elliIteSin:y1lWEoWmsFK7+UeSin
Yara None matched
VirusTotal Search for analysis
Name ee9359441e389930_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1680 (WINWORD.EXE)
Type data
MD5 9946bb385d4296b05bbf4c74561e55e8
SHA1 bd25a122654f19d064ab731ec1e3cdbcd8053799
SHA256 ee9359441e389930c715ccf7622ab116bbe8e41af30a063ff21d86c938ac8b85
CRC32 A581BDC2
ssdeep 3:yW2lWRdQoW6L7I3tvK7+elliIteSmt:y1lWEoWmsFK7+UeSmt
Yara None matched
VirusTotal Search for analysis
Name b5bdee452bbf0260_~wrs{c4e2f51f-dac9-49fc-b9d5-108c335c54a4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C4E2F51F-DAC9-49FC-B9D5-108C335C54A4}.tmp
Size 28.0KB
Processes 1680 (WINWORD.EXE)
Type data
MD5 4e4703141a8a07e4979ce9c18d2f12ab
SHA1 961b56f8442f901e7bd52141447d792d7b08078e
SHA256 b5bdee452bbf0260c5723fa877f3beb40209f42745698a6afbe71664233e38ff
CRC32 0295A489
ssdeep 768:mgI2Q5Q6IQXwvW5Kq2g0DSlqlc0QHNBhZJZZ:lSyemne0wNX7
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{be4cde85-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDE85-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 1680 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis