Dropped Files | ZeroBOX
Name 4826c0d860af884d_~wrs{96738234-8625-4b42-bb13-17730609ead0}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{96738234-8625-4B42-BB13-17730609EAD0}.tmp
Size 1.0KB
Processes 2348 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 5afdd5d2fab60ae9_~$icktoexploit.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$icktoexploit.docx
Size 162.0B
Processes 2348 (WINWORD.EXE)
Type data
MD5 09bb720f630cd7070a24617ad1c179d2
SHA1 c540fdeb46383e97f7d93a317bd9e165817c0efe
SHA256 5afdd5d2fab60ae92c83083cd5fd0d0e39cd49c776bbfd700833b2ac93c73df0
CRC32 57C3440A
ssdeep 3:yW2lWRd8uttiloW6L7nUl1jTK7C8/zgHIt6/3ldRHltn:y1lWhwoWmgjTK7CcB6N7Ftn
Yara None matched
VirusTotal Search for analysis
Name 3c530f6f78540962_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2348 (WINWORD.EXE)
Type data
MD5 7edfc441369684b9f834515a58c27ccc
SHA1 26e38549b4ef5d44222bf814f89fae62dcf81378
SHA256 3c530f6f785409623f60a64a7b127a7eaab6facf77388c0647a1c4327dca69be
CRC32 1D34C963
ssdeep 3:yW2lWRd8uttiloW6L7nUl1jTK7C8/zgHIt6/3ldb/n:y1lWhwoWmgjTK7CcB6NJ
Yara None matched
VirusTotal Search for analysis