Dropped Files | ZeroBOX
Name 7357bf3c7e590e46_centraltable.accdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.accdb
Size 472.0KB
Processes 2496 (WINWORD.EXE)
Type Microsoft Access Database
MD5 1750d3f821afcc2a845d8594125958a6
SHA1 382140a46d82c28abc1dbc22c4cd7b94348a30f8
SHA256 7357bf3c7e590e46194f8c690b3904eea1ba203d5dd2a7834d21af6ecbe62fb6
CRC32 E340ECAB
ssdeep 384:oGaMS2GSauS57BCYTISFZI7ITRuAFX5SIklHNnFmVZO4F7Z:rBaxlCsTy7KRu8M9HnkzZ
Yara None matched
VirusTotal Search for analysis
Name a44d75e59af9faf6_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 2496 (WINWORD.EXE)
Type data
MD5 a86b6fd5ac2fd075dfd2486df653d8b9
SHA1 5400afda82a4abd8361ac493334605cbf37a2ad3
SHA256 a44d75e59af9faf6350c6e5e4ee8e4d7931d54737a531c186f69886fba863363
CRC32 848CBDC1
ssdeep 3:yW2lWRdkl/W6L7flnZJK7v4tpuItsO9/3Vftn:y1lWg/WmjdXK7AbVsOFVVn
Yara None matched
VirusTotal Search for analysis
Name 17f15c1157e89fc6_centraltable.laccdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.laccdb
Size 64.0B
Processes 2496 (WINWORD.EXE)
Type data
MD5 df0769a8ceead9c39f7f2888adab2e0a
SHA1 a3c5648b5260a83617865b49822f5e4b566383e8
SHA256 17f15c1157e89fc67fd7cfe674a6812bed4415b3ef2640048700340475398fbd
CRC32 90BB9F05
ssdeep 3:IkFaV:zu
Yara None matched
VirusTotal Search for analysis
Name a4ef4f050573d865_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Size 128.0KB
Processes 2496 (WINWORD.EXE)
Type data
MD5 f23776292c1e25e96071dc9af5d9665e
SHA1 4cdb8f6d50d12ad03e4d88574613c9a7a74d4194
SHA256 a4ef4f050573d86549fd77317e4f7656d813b65bf7e95b0e864554c6d9a79df6
CRC32 1E243EE4
ssdeep 48:I3ABOF9K9kK6+LPUGN8iChmlQRikdwnr324S8gB3:KgoC6zaC8loigwr32Cg3
Yara None matched
VirusTotal Search for analysis
Name eaf9cdc741596275_centraltable.ini
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.ini
Size 36.0B
Processes 2496 (WINWORD.EXE)
Type data
MD5 1f830b53ca33a1207a86ce43177016fa
SHA1 bdf230e1f33afba5c9d5a039986c6505e8b09665
SHA256 eaf9cdc741596275e106dddcf8aba61240368a8c7b0b58b08f74450d162337ef
CRC32 BA4496DE
ssdeep 3:5NixJlElGUR:WrEcUR
Yara None matched
VirusTotal Search for analysis
Name 57cfa30bb860b95b_d4499d40.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D4499D40.dat
Size 52.0B
Processes 2496 (WINWORD.EXE)
Type Targa image data - Map - RLE 5 x 65536 x 0 "\004"
MD5 07ffeff17a8a1a1209ab3c2690d569d4
SHA1 37cb513fabddcdbbaa2e7296b31a4bc9832e1b01
SHA256 57cfa30bb860b95b7012ed62427025959b671d270aaf67fc406fbc3c4f3c48d4
CRC32 898B0AFD
ssdeep 3:Vm1olpUktK0Xg/lrll0:MW6kK0XgtI
Yara None matched
VirusTotal Search for analysis
Name 2730cc50984feb12_fsf-{0e1eee64-e8c6-4e2a-9759-63cf07fd8988}.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
Size 114.0B
Processes 2496 (WINWORD.EXE)
Type data
MD5 8287fd455598d4bc91ee2e5238a6392e
SHA1 479496ba43cdfd36d97c8ed8f38293a13723cc58
SHA256 2730cc50984feb12746c4438fb9ffba155e4828d828a8ea8e2ffe8f799e441b6
CRC32 70F10BC1
ssdeep 3:yVlgsRlz2S+MX+SlvdQSlHjlORG5ldEi276:yPblzzdQS1p7V22
Yara None matched
VirusTotal Search for analysis
Name 345e23b5fe11bb4b_fsd-{dae25a9d-25cd-4305-a9fe-d349f93e6fdd}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{DAE25A9D-25CD-4305-A9FE-D349F93E6FDD}.FSD
Size 128.0KB
Processes 2496 (WINWORD.EXE)
Type data
MD5 03a2fc3682b8f52ae6bb8de9368919fc
SHA1 23cd7f4ac61f626ff323353159aee9d37ae217a9
SHA256 345e23b5fe11bb4b80b11f1e28ea4ed1618074585610e37310fbaed3d619bbee
CRC32 82CBB93D
ssdeep 24:I32QaM0B3cnzG6dkeh5A+VXgvslz2x4PbWL4zzG0USMnm4zl+eGYlBn47z+x47z+:I3UBcfhH+vw8e9zzsD7z7xnCwC
Yara None matched
VirusTotal Search for analysis
Name 391950df14fb44cb_~$p description.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$p description.docx
Size 162.0B
Processes 2496 (WINWORD.EXE)
Type data
MD5 d823a8c8215986b6e31f4c70b409b50f
SHA1 7c8106655147a825a508d0eb7ceb4a34d7266abb
SHA256 391950df14fb44cb430d77404adfe31ba987fa0ceb1639632f2c0baeefc55c7c
CRC32 A106055B
ssdeep 3:yW2lWRdkl/W6L7flnZJK7v4tpuItsO9/3Wlll:y1lWg/WmjdXK7AbVsOFWl/
Yara None matched
VirusTotal Search for analysis
Name 026f8630819ff6d6_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\FSD-CNRY.FSD
Size 128.0KB
Processes 2496 (WINWORD.EXE)
Type data
MD5 11fb2cd9727c1229a2efe4abd2e0b8c4
SHA1 cdd956b9d7448251251d1e15e0c59539b6f0eb4a
SHA256 026f8630819ff6d6f41cd5140fde9bb7ad1c7e7b6b5baec53d2d582f17d9b6b2
CRC32 14DD07CE
ssdeep 48:I3O/jRKiBJRjcHcPD/Rx93guxCeZwzdlB7RUr3eFeKReKR:KqJRYHc7RxwNO38F
Yara None matched
VirusTotal Search for analysis
Name 2e76af29faed0d2a_~wrs{7d25aae6-ef38-468e-a4d5-e898529ad4dc}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7D25AAE6-EF38-468E-A4D5-E898529AD4DC}.tmp
Size 4.1KB
Processes 2496 (WINWORD.EXE)
Type data
MD5 0d97a748840d7747b1494d06c7eda572
SHA1 1237b720b38c632d19da7a28d3d8dc0bbb77df4a
SHA256 2e76af29faed0d2a210e5d2ca9c25bf4c375ed9c56c73971bf068824e074b61c
CRC32 EAD9316B
ssdeep 96:4xsxFsCAUCi2yecmyvfdM+BECTFHLNSjBTQ1oLM:pFAUCi2yecmymgyE1oLM
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{95be2469-f03c-4324-bfbe-a735f2af7b9e}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{95BE2469-F03C-4324-BFBE-A735F2AF7B9E}.tmp
Size 1.0KB
Processes 2496 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis