Dropped Files | ZeroBOX
Name f5442672de413792_fsf-{0e1eee64-e8c6-4e2a-9759-63cf07fd8988}.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
Size 114.0B
Processes 916 (WINWORD.EXE)
Type data
MD5 37862fd424105aac4148b60de166f2ef
SHA1 27ab7bf84a0bf1f73a36282f0fdf56f045c657bf
SHA256 f5442672de4137928e48f99bf47b4440eff351ec74e5042a0bc4c9e4b5ccc693
CRC32 0FDC64A2
ssdeep 3:yVlgsRlzT7106L5HIlpVKGrclnZ7276:yPblzTJHKlpY5lnF22
Yara None matched
VirusTotal Search for analysis
Name afb980a114381648_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 916 (WINWORD.EXE)
Type data
MD5 071b41c5d7b3868182d39d0e662d6ea4
SHA1 8b2474ec1d23ef7f1873143b68be3643ff35a557
SHA256 afb980a11438164880a9ff7594059ac89d35dc404a2d0b796d34624e9ceaea77
CRC32 75E7ADA1
ssdeep 3:yW2lWRdioW6L7HzsK7arxItRc/Aqwqlt:y1lWeoWmMK7a2a4q7t
Yara None matched
VirusTotal Search for analysis
Name af7320cf5563b2ce_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Size 128.0KB
Processes 916 (WINWORD.EXE)
Type data
MD5 51c15da77fdd752db54c5bc6d9449280
SHA1 2c6ae85143e44472e136c03dbe9bf849507d9e32
SHA256 af7320cf5563b2ceac3753c13d4765b95ae03afc76fce277e1604835d18cd8ec
CRC32 F33C7055
ssdeep 48:I38LqB+CNExvjZCbLh7ORkXd42C58X+CmXeCwLr3ag5R7ekyk:K8mZWxvt4LhyqtFe8OcCG39DP
Yara None matched
VirusTotal Search for analysis
Name eaf9cdc741596275_centraltable.ini
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.ini
Size 36.0B
Processes 916 (WINWORD.EXE)
Type data
MD5 1f830b53ca33a1207a86ce43177016fa
SHA1 bdf230e1f33afba5c9d5a039986c6505e8b09665
SHA256 eaf9cdc741596275e106dddcf8aba61240368a8c7b0b58b08f74450d162337ef
CRC32 BA4496DE
ssdeep 3:5NixJlElGUR:WrEcUR
Yara None matched
VirusTotal Search for analysis
Name df7551407123201d_fsd-{d289daca-480d-42fb-8600-c7a2f6988258}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D289DACA-480D-42FB-8600-C7A2F6988258}.FSD
Size 128.0KB
Processes 916 (WINWORD.EXE)
Type data
MD5 f8a2c7c8d8feb4d82da2f2d68da4dc6f
SHA1 898be67b31533dfdba4d15844e34f1207b46168a
SHA256 df7551407123201d3d9e0b0f040d64033a824ede17a483812431dbf0abfe8cb7
CRC32 21FB7DCA
ssdeep 96:KPNLbYxtc3W2s9ekVZV47de47A/9wPnyJhSPnyJh:0
Yara None matched
VirusTotal Search for analysis
Name e73d9fab37cd6bf9_centraltable.laccdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.laccdb
Size 128.0B
Processes 916 (WINWORD.EXE) 2692 (MSOSYNC.EXE)
Type data
MD5 0c2be3153a6602550b658e4bb5f073d5
SHA1 3fe515761d3c3744fcb12b10de15e0d94ed36ba9
SHA256 e73d9fab37cd6bf9f8a66e6de08e8178a7d5b5d7ee7bd314f7a25132b17ec5f8
CRC32 D05CFEE4
ssdeep 3:IkFafOkFaV:zQu
Yara None matched
VirusTotal Search for analysis
Name 031af9b2ccfad715_~wrs{df6e64da-fcb0-4ac3-9eea-feb72d2450e2}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DF6E64DA-FCB0-4AC3-9EEA-FEB72D2450E2}.tmp
Size 5.0KB
Processes 916 (WINWORD.EXE)
Type data
MD5 e66cf7f02689ee1ef0c26981b8ad3fd6
SHA1 f9a5c6162abcf5826dde3ac9879952e51986916c
SHA256 031af9b2ccfad715274e9f3a0e4c3fc06e7873205daabcf400a0735fefe32c64
CRC32 BEEB3461
ssdeep 48:suiNN9WHSBbfT1wMh6/c8LtlNq1JmK4kNXBR9FqdcmyoTI/FMo9Ck:cWyBlBhivLt8vl3ydcHgIdDCk
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{ea5ff3a6-3596-4f38-8a27-b607fe581fcd}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EA5FF3A6-3596-4F38-8A27-B607FE581FCD}.tmp
Size 1.0KB
Processes 916 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 62b12d97a2875e34_centraltable.accdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.accdb
Size 472.0KB
Processes 916 (WINWORD.EXE)
Type Microsoft Access Database
MD5 bb8efea3da3b87cbae9a9f7d2bd60945
SHA1 8f22103afa838097a30e7018890b842da1ae9d60
SHA256 62b12d97a2875e34ef157b8dcff68c639cf132e6c326c4e19667338ab5b017ec
CRC32 FFDD1622
ssdeep 384:9GbzpYmXISFtI7ITRuAF/qiB7IpoNsEmVZO4F7Z:I5Y+T27KRukroysRzZ
Yara None matched
VirusTotal Search for analysis
Name 1806c39cb5cde8dd_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\FSD-CNRY.FSD
Size 128.0KB
Processes 916 (WINWORD.EXE)
Type data
MD5 8ba5aa934e62dd22d6b3e5ab4591aecc
SHA1 276424b2deb698952cf56e3a60b7ce35cd13e54c
SHA256 1806c39cb5cde8dd351aa0c8c585aa538bb4b325653a650f31b5389151dd5e47
CRC32 58367BAD
ssdeep 48:I3S1BFbM++xIM5zcMMmL5FTWmcofFJoIuvr3gWemWeN7:K0Fw/xIM544jJfNa3i8
Yara None matched
VirusTotal Search for analysis
Name 2c1a917e820e9b3d_~$оверка сотрудников.docx
Submit file
Size 162.0B
Type data
MD5 0de8aec4383009a0c34172d67c67a771
SHA1 da9533cfd2ca37b0bcf01ca67b39bd2d95b37b78
SHA256 2c1a917e820e9b3d9b8087b3bb6044a81c007a0fc002d771b52b7930dd71bfea
CRC32 81DFD592
ssdeep 3:yW2lWRdioW6L7HzsK7arxItRc/AqNWn:y1lWeoWmMK7a2a4qNW
Yara None matched
VirusTotal Search for analysis