Dropped Files | ZeroBOX
Name 7aed307d60ead012_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\FSD-CNRY.FSD
Size 128.0KB
Processes 1940 (WINWORD.EXE)
Type data
MD5 ae21c33e3948049e58e125be79503b6e
SHA1 52d9eaa34729d04081f01e804f3e2d6cb4392522
SHA256 7aed307d60ead012cc7b2726ad58c30b00d910476ae62d3d87c96b2b4083594d
CRC32 0E0AF3CB
ssdeep 48:I3JPB0PEXLnCmUiykH/SukHV5wvqL7xDtwyxmwx/jQxqur3p4Doa9DoLvldVNZ/L:KJ5eMyOPOXn7bLiq23FxZQ
Yara None matched
VirusTotal Search for analysis
Name eaf9cdc741596275_centraltable.ini
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.ini
Size 36.0B
Processes 1940 (WINWORD.EXE)
Type data
MD5 1f830b53ca33a1207a86ce43177016fa
SHA1 bdf230e1f33afba5c9d5a039986c6505e8b09665
SHA256 eaf9cdc741596275e106dddcf8aba61240368a8c7b0b58b08f74450d162337ef
CRC32 BA4496DE
ssdeep 3:5NixJlElGUR:WrEcUR
Yara None matched
VirusTotal Search for analysis
Name e73d9fab37cd6bf9_centraltable.laccdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.laccdb
Size 128.0B
Processes 1940 (WINWORD.EXE) 2688 (MSOSYNC.EXE)
Type data
MD5 0c2be3153a6602550b658e4bb5f073d5
SHA1 3fe515761d3c3744fcb12b10de15e0d94ed36ba9
SHA256 e73d9fab37cd6bf9f8a66e6de08e8178a7d5b5d7ee7bd314f7a25132b17ec5f8
CRC32 D05CFEE4
ssdeep 3:IkFafOkFaV:zQu
Yara None matched
VirusTotal Search for analysis
Name 6baa6aea68f52c0d_centraltable.accdb
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\CentralTable.accdb
Size 472.0KB
Processes 1940 (WINWORD.EXE)
Type Microsoft Access Database
MD5 01df44f1fc57351f654c768a2f54077a
SHA1 54e7b82cb3fe5eda416f02c9836ddfbba121dcd5
SHA256 6baa6aea68f52c0d0ca6821cf06a98819dbfef3ea4cf2362cc0cc87f7dfd3dc0
CRC32 BBFC1E7F
ssdeep 384:MG3rteqVISFTI7ITRuAFvUYtGNbemVZO4FNZ:3xeAT07KRusrMbH1Z
Yara None matched
VirusTotal Search for analysis
Name cc413c074263e568_fsd-{72d9241d-817c-485d-a693-71f40aabe42a}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{72D9241D-817C-485D-A693-71F40AABE42A}.FSD
Size 128.0KB
Processes 1940 (WINWORD.EXE)
Type data
MD5 10549d21bad65a07b75806ab5846a939
SHA1 0f68e44c8419ac99cc112eb8ffe6f9193a126ccb
SHA256 cc413c074263e568afe3e2608b5e127580472beae70128542d52d6bfb350e0db
CRC32 08478A0C
ssdeep 96:KRwXch8Ydn228SBuTE4gHIuRb2QarLlzQarLl:Chpdn22QEVHIuRb2XrLlzXrLl
Yara None matched
VirusTotal Search for analysis
Name c699ed1833f10867_fsf-{0e1eee64-e8c6-4e2a-9759-63cf07fd8988}.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
Size 114.0B
Processes 1940 (WINWORD.EXE)
Type data
MD5 2c0b040bb873324ff738a4d1a8e24dcd
SHA1 af6819d64151537f1f3726c5fec47a09d3f61fc3
SHA256 c699ed1833f10867324169ac2dd4a61fe92595ba54f244220c3fcdfb0872e3f5
CRC32 2316C714
ssdeep 3:yVlgsRlz6Kz8XWFQ7XcMSLSs+UCt276:yPblzHz8NAMSeMCt22
Yara None matched
VirusTotal Search for analysis
Name 9fe1d11203ce883e_~$ghanistan-is-rich-in-minerals-but-getting-to-them-is-challenging.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$ghanistan-is-rich-in-minerals-but-getting-to-them-is-challenging.docx
Size 162.0B
Processes 1940 (WINWORD.EXE)
Type data
MD5 9a799d6a7a0df778a409fd8d723842d4
SHA1 e8b877e9c69e9adf7719396a4cd433e3492545ee
SHA256 9fe1d11203ce883ef25cd7a9857bb408ce8fa442a0ccfb5239f17fded93fb4eb
CRC32 533FA8E8
ssdeep 3:yW2lWRdJ/vW6L7VkK73lkFIt8lrR//:y1lWlXWmOK7yW0F
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{abf6afa8-4101-419e-a0aa-bdef0455b118}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{ABF6AFA8-4101-419E-A0AA-BDEF0455B118}.tmp
Size 1.0KB
Processes 1940 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 588ca01e131eeefe_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1940 (WINWORD.EXE)
Type data
MD5 fe5a15835daea0ee42d1a6eaae5feb99
SHA1 ae17ac6090a534652e35390d8b248efa1a4677b3
SHA256 588ca01e131eeefed31f218accaeb077128f94013c786aa0b3d69c88b2e905f5
CRC32 2056B154
ssdeep 3:yW2lWRdJ/vW6L7VkK73lkFIt8lrT:y1lWlXWmOK7yW0X
Yara None matched
VirusTotal Search for analysis
Name 2ee2435e525f264d_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\15.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Size 128.0KB
Processes 1940 (WINWORD.EXE)
Type data
MD5 eb05308c03c6a861ba704be450b40f05
SHA1 33d16328218157ffcd2b25b5eb8ac09fb3d1013a
SHA256 2ee2435e525f264d3a126f31edf882423f540304f880f95e277b86921d0ef820
CRC32 BFC1428F
ssdeep 48:I37bF+EBrTdqd7+w0PANGC0digEEA4pBwSue2r3sER0y0:K75+Ur9ANGCj14p563sER0y0
Yara None matched
VirusTotal Search for analysis