Dropped Files | ZeroBOX
Name 17f15c1157e89fc6_centraltable.laccdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.laccdb
Size 64.0B
Processes 552 (WINWORD.EXE)
Type data
MD5 df0769a8ceead9c39f7f2888adab2e0a
SHA1 a3c5648b5260a83617865b49822f5e4b566383e8
SHA256 17f15c1157e89fc67fd7cfe674a6812bed4415b3ef2640048700340475398fbd
CRC32 90BB9F05
ssdeep 3:IkFaV:zu
Yara None matched
VirusTotal Search for analysis
Name 0877a3fc43a5f341_~wrs{cc818324-147e-4b96-96aa-fd4eb3963230}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CC818324-147E-4B96-96AA-FD4EB3963230}.tmp
Size 1.0KB
Processes 552 (WINWORD.EXE)
Type dBase III DBT, version number 0, next free block index 7536653
MD5 28adf62789fd86c3d04877b2d607e000
SHA1 a62f70a7b17863e69759a6720e75fc80e12b46e6
SHA256 0877a3fc43a5f341429a26010ba4004162fa051783b31b8dd8056eca046cf9e2
CRC32 8E6A7128
ssdeep 3:Ghl/dlYdn:Gh2n
Yara None matched
VirusTotal Search for analysis
Name eaf9cdc741596275_centraltable.ini
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.ini
Size 36.0B
Processes 552 (WINWORD.EXE)
Type data
MD5 1f830b53ca33a1207a86ce43177016fa
SHA1 bdf230e1f33afba5c9d5a039986c6505e8b09665
SHA256 eaf9cdc741596275e106dddcf8aba61240368a8c7b0b58b08f74450d162337ef
CRC32 BA4496DE
ssdeep 3:5NixJlElGUR:WrEcUR
Yara None matched
VirusTotal Search for analysis
Name 74ed7458e2b4af7b_fsf-{0e1eee64-e8c6-4e2a-9759-63cf07fd8988}.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
Size 114.0B
Processes 552 (WINWORD.EXE)
Type data
MD5 c52e129a933cf4312436bea24ef2d94d
SHA1 6184bc39227234be882a0a9cce5341e6c4b29149
SHA256 74ed7458e2b4af7b12ca5d8326a8cb387edff113766ba894c54865ccaab0c58a
CRC32 6323E30B
ssdeep 3:yVlgsRlzEliZVlsjfYlkyJ7WTkUflYCR7276:yPblzMAVajfZSKNYCt22
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{3c328ed9-8a94-4196-af7c-f4d90f3cf75c}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3C328ED9-8A94-4196-AF7C-F4D90F3CF75C}.tmp
Size 1.0KB
Processes 552 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 6af0cb6c61f5e014_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Size 128.0KB
Processes 552 (WINWORD.EXE)
Type data
MD5 d019764082a4a902892a2d81cc21d351
SHA1 548797a8f77e84dcead92e391b9bfc9f89e6ce0d
SHA256 6af0cb6c61f5e01442170d94f47a62318a8cba251f3fdb158773b31ecca3e37d
CRC32 F646AE83
ssdeep 48:I3YxBpJilJjqdmhcr6HRsWLY2WOr3Uds0QI6pjQI6p:KYrpqJGdmhzHrWW3D0QIWjQIW
Yara None matched
VirusTotal Search for analysis
Name fe2521a545ea9032_centraltable.accdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.accdb
Size 472.0KB
Processes 552 (WINWORD.EXE)
Type Microsoft Access Database
MD5 de00e07be050428c134421b09b0aff65
SHA1 777f03f494b5cc885e4c60991e1e5040c2c64aeb
SHA256 fe2521a545ea9032ddfd73ac9a5a0004d64b5b470ba9aba078440850c3a0190d
CRC32 1AFBE707
ssdeep 384:hGhwh3yDuSFbI7ITRuAF9bJB1NAEmVZO4F7Z:k+325c7KRuKdARzZ
Yara None matched
VirusTotal Search for analysis
Name 4925c102551a92e5_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 552 (WINWORD.EXE)
Type data
MD5 19234d4acab09de03d2f533dcec74664
SHA1 315c6583253d6ef71d9c7ab708fc714d3ddcd7d2
SHA256 4925c102551a92e5e472830ec4dcce7db1f2e12bfc97bdf4d9c5ca3082bed510
CRC32 2D48ECCF
ssdeep 3:yW2lWRdky/3/W6L7SZJK7OKlpuItTx0ttP/:y1lWoCvWmYK7OKlrWtl
Yara None matched
VirusTotal Search for analysis
Name dc08a57cbf60880b_fsd-{b543fe5a-b933-4480-a6a9-af76311c64fc}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{B543FE5A-B933-4480-A6A9-AF76311C64FC}.FSD
Size 128.0KB
Processes 552 (WINWORD.EXE)
Type data
MD5 7b86acac59814930d1280197d426b542
SHA1 df57a98f0b1869c84439b967947b2ba20d2f0639
SHA256 dc08a57cbf60880b900ff470b16d8f0bb6643a91b361c819a8bb1dbb0d334161
CRC32 E7819A03
ssdeep 24:I3kkfvLaM0B3csImmlA7XDcOkHiwm6HDo9qOiZgvE1BRoRZ2iBwG5m4zl+eGGsyb:I3JsBHR6ofuG17z7bvwtrvtr
Yara None matched
VirusTotal Search for analysis
Name 2d9c12b1cc45e36c_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\FSD-CNRY.FSD
Size 128.0KB
Processes 552 (WINWORD.EXE)
Type data
MD5 cf3568fffc1388a5ea68343f6425fdd1
SHA1 61675a9197c53b1da7afc140d2a5d3f4277b9bd5
SHA256 2d9c12b1cc45e36c811c65f7c6631964286019ede812fad5c4de78689a8b15cb
CRC32 29B5ADFC
ssdeep 48:I3O/hVBnoT/WePyuQBurqIDY2GulMZJXr3y1PH/ndd3/ndd:KO1oT/We6uQBuWIDYPbb3y13ddPdd
Yara None matched
VirusTotal Search for analysis
Name 1ca56ab2a7cbc86f_~$cument_set_20210208_t6253773.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$cument_set_20210208_T6253773.docx
Size 162.0B
Processes 552 (WINWORD.EXE)
Type data
MD5 c02da94929ad3ef940f4dbeb1c62e53d
SHA1 13b47effd76c7046d960dfced1cb7f5e7ad58ddc
SHA256 1ca56ab2a7cbc86f50e76233d863476cc5a2c0ffdc9e7dc1d6ee987321dff700
CRC32 045B14E0
ssdeep 3:yW2lWRdky/3/W6L7SZJK7OKlpuItTx0ttlll/n:y1lWoCvWmYK7OKlrWt/
Yara None matched
VirusTotal Search for analysis