Dropped Files | ZeroBOX
Name ac866163d75a8b4c_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 252.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 b9b578726d4f531c1f0114d41e446464
SHA1 ef2556f255437e632b3d51457c7f2a8f0978027d
SHA256 ac866163d75a8b4c7eb7f2c9eaafaf197230f2dd92c52be8d2105c850250d5d0
CRC32 50CC138A
ssdeep 3:kkFklM/ttfllXlE/VWw1BllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1ADEQcOP:kKd/tMWA1liBAIdQZV7CDEQcK1
Yara None matched
VirusTotal Search for analysis
Name 8f94069dca83b160_~$snake.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$snake.docx
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 d2fc33e42629b9448253642dfd9b95d6
SHA1 fbb8ff1df808be191cc4a38f0e490631f1d3b217
SHA256 8f94069dca83b1605a8e091757e208f7a3b0f1aa174a027b9b1a3556929bf644
CRC32 970D7D6D
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtGTllXKXhn:y1lWnlxK7ghqqFGpIxn
Yara None matched
VirusTotal Search for analysis
Name 43a85daf72215795_~wrs{d6842f1f-fcfe-4598-ae80-c9737dc1deba}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D6842F1F-FCFE-4598-AE80-C9737DC1DEBA}.tmp
Size 55.5KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 3c36cbbc2ecd60e6ca85fc27b1e0ff9e
SHA1 b388a32d694b4fc8e57c0748aa24236310de600a
SHA256 43a85daf7221579585229ef8734382e642a853ad0a1ce1686421378fbb2f148a
CRC32 408914E4
ssdeep 768:WtZLJm3nq0a7GphKvE2NkegsiJX3MTYgGphKhldaq/MI7SZ30kB5M3lKLoVkhJLw:2tPEOkegsiJX3eRJMmS90A5sOJZitj
Yara None matched
VirusTotal Search for analysis
Name e414e04bbd9decd8_fsd-{842cb583-f07d-4954-9668-91ad7835869d}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{842CB583-F07D-4954-9668-91AD7835869D}.FSD
Size 128.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 b827bcdd4db0cbbf9e7ce66b6b42eb57
SHA1 4458defd108304f112c51afac1209086a2b4e7c8
SHA256 e414e04bbd9decd88bb0d38e3b3bd23a079648bc7b3c6d079717873a9f660d93
CRC32 DBEDE625
ssdeep 96:K4q6ylV+ZeodTLoGCu8zrYq2gFkd90d9KkUHc/dI9dj:Sm6G3skkUHc
Yara None matched
VirusTotal Search for analysis
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{fba4d76f-b495-4acd-a7b9-a5a58a28acbf}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FBA4D76F-B495-4ACD-A7B9-A5A58A28ACBF}.tmp
Size 1.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 51fcdf3a76b6692e_~wrs{7a69592d-6f25-4543-a1fe-d5d39f703eed}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7A69592D-6F25-4543-A1FE-D5D39F703EED}.tmp
Size 1.5KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 fb055c389208800f928b3502a6615abe
SHA1 14564d6e0e4ec0f9717c16471b75e44b5868290a
SHA256 51fcdf3a76b6692eaa84d280b39bdc081cf6e4808171e0ec0484229648400ae9
CRC32 640E2478
ssdeep 6:IiiiiiiiiiE/bYflo30XOnySySkssqA1+tKfn:S/XkeySpk1j1+tKfn
Yara None matched
VirusTotal Search for analysis
Name 00ed0efd116aa82e_fsd-{76f98930-c425-4c6e-96bc-28557a52a1f9}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{76F98930-C425-4C6E-96BC-28557A52A1F9}.FSD
Size 128.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 93811b9930fa42defa54dd6ebf5d7598
SHA1 f4f367756df74e9f72d6313bb5ed3c95a6edf1bd
SHA256 00ed0efd116aa82ed803488ffab84805962efe515cc92381974908e509cad805
CRC32 351856C3
ssdeep 48:I3CuL3kkHrBPWTthC6FllbR474SmlePxoaCRK6hgcA+lT6TL:Kh5PWTnC6Fllq1mlePBC8tST6TL
Yara None matched
VirusTotal Search for analysis
Name f9c14b7f3c78db51_fsf-{0e1eee64-e8c6-4e2a-9759-63cf07fd8988}.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
Size 114.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 4d9d25d0df600b21993e167f4a4db054
SHA1 c587d0c6d9541058597b73799c8258a3e2e2ff41
SHA256 f9c14b7f3c78db51e8a42f8d0d306211149b66e82ae2f70bface0b53b91b4521
CRC32 E9E4CE95
ssdeep 3:yVlgsRlz+5lMUWPZIGtnxi+O5lcClRZ276:yPblz4MPP2G9xzOYCt22
Yara None matched
VirusTotal Search for analysis
Name e159b1494adc3c19_fsf-ctbl.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
Size 114.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 9acec8786f09939fbd8e4dd2cc1a36b5
SHA1 a5c1fd671e219ece10da7dd1d68844dcbf847478
SHA256 e159b1494adc3c198464f1e6a5d0ca969d3bdd42ccb9cc93a1bae6c938f03356
CRC32 E9051A3E
ssdeep 3:yVlgsRlzxXlmHQlnWZh/+DYUTUU7QWGRf276:yPblzxsHQFWZJ1UUWk22
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis
Name f380c19aee19a5c4_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
Size 128.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 374a150b31404ac0af8e972858adc61c
SHA1 caae1208e16541bd653c7e20c44bafe3746434af
SHA256 f380c19aee19a5c4f7a527bbb1ebfe2e10f27a66580cfffa515902a48035b4c3
CRC32 7B375D25
ssdeep 48:I3FkwBrYd0JLc/DePVjk1/cv7PcpBYlILXu55RFUJxlrcyCaydrsAvMH08HTZArD:K3sQVjkGSywejHU3pmWoZWo7H
Yara None matched
VirusTotal Search for analysis
Name eb6652c16ab47244_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Size 128.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 330410c574617c3134f54e4292957583
SHA1 607cfe495511a6af11ee4db69806cb76dd47b480
SHA256 eb6652c16ab4724402cbc10e5ad07794215995fc061672108cb0762eaecfaedc
CRC32 75A7B7DA
ssdeep 48:I3OkwByL2VhwH3MSWdQukVS0lnuqdfiNU8lsrFgEnxl3G6a8rNTl/lKTFJrRT6Fp:KmMMSGmjuAWU1eQ6kH
Yara None matched
VirusTotal Search for analysis