Dropped Files | ZeroBOX
Name 0c39da6ce004e2d0_fsf-{0e1eee64-e8c6-4e2a-9759-63cf07fd8988}.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
Size 114.0B
Processes 3012 (WINWORD.EXE)
Type data
MD5 a73b0c8fe3aa10c03ffcf2a8b93c65b4
SHA1 1d723eca670c5bf4c6ece16badb57d7eeb6cff2f
SHA256 0c39da6ce004e2d03032726964384ac5a219ecc55a7f571a5920a60687e30fd2
CRC32 E4E232A5
ssdeep 3:yVlgsRlzylwcSHrToLkCHLlzWSQxGvZ276:yPblz2wcSLcQCx6Bgh22
Yara None matched
VirusTotal Search for analysis
Name 4f4cbea68ee378e0_~wrs{dac78438-33ba-4738-bd53-31361ae4d2de}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DAC78438-33BA-4738-BD53-31361AE4D2DE}.tmp
Size 1.5KB
Processes 3012 (WINWORD.EXE)
Type dBase III DBT, version number 0, next free block index 3080205
MD5 22dc2708fb2bbb902208f21098bcc8a3
SHA1 e48886aa020c4d173d43b69afadd4108a0cc576a
SHA256 4f4cbea68ee378e032fe9b819731165757c2e980100ea1316281481480de3410
CRC32 CD6EE017
ssdeep 3:n1lPglEkn/lmrtlIwPxZlhRt3PKD9:QllUZ+wPxZfK5
Yara None matched
VirusTotal Search for analysis
Name cd276d0bf208947f_index.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\index.dat
Size 107.0B
Processes 3012 (WINWORD.EXE)
Type ASCII text, with CRLF line terminators
MD5 4d632b1d558295322bd13c2adc3f4b1a
SHA1 5c184f44009705f52f2a6029ef07a88690d6cc93
SHA256 cd276d0bf208947fe9133d6ffeefd812da8f76a87fbc4a11f439cbedd074cac5
CRC32 70BBD3E7
ssdeep 3:bDuMJlWsXvuZnaOUBBYNJPqddQQt1:bC7ZnaFBgJSd6Q1
Yara None matched
VirusTotal Search for analysis
Name 96ebff5f49c67c3a_outlooksyn.com에 있는 16monopqdw8+w6xh4qxcxholwxvizbhxrr6y5a.url
Submit file
Size 150.0B
Type MS Windows 95 Internet shortcut text (URL=<http://outlooksyn.com/FpUCu5h6W2/R/YHXCCUK7bk34tzd6GA2AAAATqzjlQ4FwFifvY2EpuSOyN+L1n/16mONopqdw>), ASCII text, with CRLF line terminators
MD5 66d06d6f43c19407a50bc967a178cd5f
SHA1 6e6719115ebaee2eef9be96cb2fd4629024f4fa4
SHA256 96ebff5f49c67c3a16f0d25bcbd8af3ae4946620a192eaf227dc890455cc61ac
CRC32 E5078894
ssdeep 3:HRAbABGQYm/sQuZ3pbTj3EH533IfPIEgWafE9UBBYNJPqddQQ0v:HRYFVm/xuZ3qHJIfPdlmBgJSd6pv
Yara None matched
VirusTotal Search for analysis
Name a8badcbd3ef699fe_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Size 128.0KB
Processes 3012 (WINWORD.EXE)
Type data
MD5 cb7791d33e548cfff57bf61320fa0e43
SHA1 5d3140aeebe1e50c57932e1870dcec664de4f4a7
SHA256 a8badcbd3ef699feae75ec4a239390abaf4a5b7dabd55fcc316a2bf2d3443f35
CRC32 3051A68B
ssdeep 48:I3rwGkwBOwJ6bvNbYE6T9ocihnJusuKakQu99ULprRySpZM2pRIM2pRAH:KrRfUxl+9HihYPGU5E0ZM2pqM2p+H
Yara None matched
VirusTotal Search for analysis
Name bb6aaa726761aa15_fsf-ctbl.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
Size 114.0B
Processes 3012 (WINWORD.EXE)
Type data
MD5 b7f513257ccb913a3f666a88fc09d645
SHA1 54102061c96daa0730fed2400ab034d366084585
SHA256 bb6aaa726761aa15432b665f870896f8bb5a0b3e84fd83cf5e2343b44ecbb8d5
CRC32 7CC90994
ssdeep 3:yVlgsRlzg3OxlX6lgoRXnLnUT2OlsVjBu276:yPblzg+xlq6MnLUDku22
Yara None matched
VirusTotal Search for analysis
Name a2f2d1a68a046206_fsd-{fab2e1c3-2ee2-4a9e-86bc-e60ed1a0db15}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{FAB2E1C3-2EE2-4A9E-86BC-E60ED1A0DB15}.FSD
Size 128.0KB
Processes 3012 (WINWORD.EXE)
Type data
MD5 88394fe17205475e8c0b4309a4250275
SHA1 4557280adcb6876ed682b95b1bd22eb22f329a8c
SHA256 a2f2d1a68a046206fdbf32081ba2aa2dc02684be9b598badcde5583d48d13beb
CRC32 56AB0699
ssdeep 48:I3mHZkvBy/uR4DlVb2q0+EUMHYvnFUFWjzR0AG+te5GBk6+0tRoFklo0lI/XPa57:KmSymU3WUjJlecZtRoG+jJodaG0c5TL
Yara None matched
VirusTotal Search for analysis
Name 10c88383476e46ad_fsd-{9305b859-866b-4ef2-84d3-0d0d99729e9e}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{9305B859-866B-4EF2-84D3-0D0D99729E9E}.FSD
Size 128.0KB
Processes 3012 (WINWORD.EXE)
Type data
MD5 02096aae03e44bdfe04735916bab944d
SHA1 e98434e96321a465a07bc90ed76756457ce28a35
SHA256 10c88383476e46adcfe265743a86ea3545be3971728501ad78b29017dd3e9267
CRC32 E4C50493
ssdeep 24:I3iVmDkCwnM0B34+fQhSbwvYvnlbX8m9/mlINpHGQVpTpHpKbsGsvPVbFuwpWuwq:I3iEDkHrBJf3L7t9uFQyghT8e
Yara None matched
VirusTotal Search for analysis
Name 34a12474ef9c6ccc_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
Size 128.0KB
Processes 3012 (WINWORD.EXE)
Type data
MD5 bfdd352eadffdb673c1c56064798f004
SHA1 c49d5bfbfb8cd686a594b8580066f7ec2c383b70
SHA256 34a12474ef9c6ccca8b2d0b2eec41caced4760ee11e687576a6d2eb0dee3cd03
CRC32 ED5D945E
ssdeep 48:I3L5kwBs3Xt+GNGF+O01Ee9uXuZQ6U2lryTT6O0cX5O0cXPH:KLbs3X3NGjRYue66U2p82H
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{ee3dfc29-b21e-4130-a5b5-098abadfaff4}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EE3DFC29-B21E-4130-A5B5-098ABADFAFF4}.tmp
Size 1.0KB
Processes 3012 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name 91efa95f33e571b6_kdsgdl.url
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\kdSgdL.url
Size 156.0B
Processes 3012 (WINWORD.EXE)
Type MS Windows 95 Internet shortcut text (URL=<http://outlooksyn.com/FpUCu5h6W2/R/YHXCCUK7bk34tzd6GA2AAAATqzjlQ4FwFifvY2EpuSOyN+L1n/16mONopqdw>), ASCII text, with CRLF line terminators
MD5 617ac7f10b27acfbc9cecfd0bf788b5d
SHA1 31b385423a7dde01318d09b7279adb1c9d9073f6
SHA256 91efa95f33e571b628d8665e69c1e6c53bfbc266081fb2250de435023ad665fe
CRC32 70E7E874
ssdeep 3:HRAbABGQYm/sQuZ3pbTj3EH533IfPIEgWafE9UBBYNJPqddQQSAC4:HRYFVm/xuZ3qHJIfPdlmBgJSd6PAj
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3012 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis
Name 5b212b3012c222b1_~$go agreement.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$go agreement.docx
Size 162.0B
Processes 3012 (WINWORD.EXE)
Type data
MD5 c2610cf41ca23a9eb378aca66074ea3f
SHA1 57d91acc625de4008d0293467ecdf8bf80791f6b
SHA256 5b212b3012c222b176b25d1a6eb0a192836538afa778e58474c65b56e8b24a8e
CRC32 03A41393
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtXul/4Xhn:y1lWnlxK7ghqqFXut4xn
Yara None matched
VirusTotal Search for analysis