Dropped Files | ZeroBOX
Name 30270e16c3704813_~wrs{b61a3d81-f745-457c-b359-bb2d5eb7d77f}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B61A3D81-F745-457C-B359-BB2D5EB7D77F}.tmp
Size 38.0KB
Processes 3040 (WINWORD.EXE)
Type data
MD5 e88123aa34f0841ffc5e827bc06629a8
SHA1 f86cce0aa7b14747856f86227dc976252edee536
SHA256 30270e16c370481338fa0d2a7a544830f110f32a325e6430c13be3ee9c6d568c
CRC32 5DF76C97
ssdeep 768:Fs0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsf8TY0en2o5CIpXv:FDvwxKrK2folFUv
Yara None matched
VirusTotal Search for analysis
Name 849c3f74e13ecf01_~$irdagodzx.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$irdagodzx.doc
Size 162.0B
Processes 3040 (WINWORD.EXE)
Type data
MD5 61a17b7bf6750114cc3e8991a20dbb24
SHA1 93782263187eaca872aaac1390126c55bb746c1d
SHA256 849c3f74e13ecf01f3935896346001903ccea334e62ea7d5320d1eb4c8ac6f2f
CRC32 CF6CC10D
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtYsl7Xhn:y1lWnlxK7ghqqFYsJxn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{175accd2-f0cc-47c8-87d4-35f304794e66}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{175ACCD2-F0CC-47C8-87D4-35F304794E66}.tmp
Size 1.0KB
Processes 3040 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3040 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis