Dropped Files | ZeroBOX
Name 266beea72d192f67_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
Size 128.0KB
Processes 3032 (WINWORD.EXE)
Type data
MD5 bed2e1385d5ce7209a3b760278858783
SHA1 93dea6ad19e3d987c573aa9cc81dd1dda2f6720e
SHA256 266beea72d192f67c932c347d33a70fea4e48e91da44f3ea62f3ec4496aac240
CRC32 72C9F9DB
ssdeep 48:I32akwBQHfSI+BQxcf4YnbLqh/uCl6EqSUSSvrZQ/zZ4ZkH:K1kfR+BvqICl6EqSUSSDZgz6uH
Yara None matched
VirusTotal Search for analysis
Name 96bcec06264976f3_2d85f72862b55c4eadd9e66e06947f3d
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Size 1.4KB
Processes 3032 (WINWORD.EXE)
Type data
MD5 0cd2f9e0da1773e9ed864da5e370e74e
SHA1 cabd2a79a1076a31f21d253635cb039d4329a5e8
SHA256 96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
CRC32 65E5A5B2
ssdeep 24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
Yara None matched
VirusTotal Search for analysis
Name 216bae0f79a6671b_fsd-cnry.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Size 128.0KB
Processes 3032 (WINWORD.EXE)
Type data
MD5 eb38dc682449f2d0d18b71a47a957103
SHA1 17af163b455a19310dad7c23677cb1ff7ce0e905
SHA256 216bae0f79a6671b69341da1fec8a3637edbee2b4ea293eee62c12621d91b4c1
CRC32 0DFE524A
ssdeep 48:I35uUkwBa//CdCsW/Xsmc/NQspb9KvfVigBwRuuJqoRYUqsmrK+eRaHafH:KT6zbclJUHVigwUoiUcd6fH
Yara None matched
VirusTotal Search for analysis
Name 343d7c2edd50979f_~$vestigation_of_sexual_harassment.docx
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$VESTIGATION_OF_SEXUAL_HARASSMENT.docx
Size 162.0B
Processes 3032 (WINWORD.EXE)
Type data
MD5 ac83ef2f8e8ae5190d3694ec73d95ebf
SHA1 f36dd273487a53dc180a9d038bc33a49fb76a5f0
SHA256 343d7c2edd50979f3faf62e5015c41b2fa7cc10042355810522de26e825004a3
CRC32 D9487F49
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVt/mXl4Xhn:y1lWnlxK7ghqqF/mXl4xn
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{421036af-d9d3-4283-8b0c-4828b2d0b9c6}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{421036AF-D9D3-4283-8B0C-4828B2D0B9C6}.tmp
Size 1.0KB
Processes 3032 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name f92cf22f25a19e90_fsd-{921aa58a-f6f3-421a-9bd3-9a2c4c212e5d}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{921AA58A-F6F3-421A-9BD3-9A2C4C212E5D}.FSD
Size 128.0KB
Processes 3032 (WINWORD.EXE)
Type data
MD5 2e26033f08b851824667ff0a59f6aa09
SHA1 a1719e17141492b555ff16f99597f3f6186b7122
SHA256 f92cf22f25a19e908371fcfcd78814b743afaf503e014e73713a0745d67f9a4b
CRC32 2CF132E4
ssdeep 96:KRCyKuiRLGv2+qpnIuvFyNGoGzwEXVlyECqx4wIgxE8jOW+HI3E8jOW+HIw55Zh/:Iibo9GvptM
Yara None matched
VirusTotal Search for analysis
Name 01be465e90c6c615_fsd-{65ed0db1-3260-4ac2-ac7b-1ab8009eb8d8}.fsd
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{65ED0DB1-3260-4AC2-AC7B-1AB8009EB8D8}.FSD
Size 128.0KB
Processes 3032 (WINWORD.EXE)
Type data
MD5 6fec8cc1f08da60d59cb5d3b646745cb
SHA1 997383168ddb5548bea8a8500afc22ef97c63081
SHA256 01be465e90c6c6156367c6bd9db7d317272184d3d4854a482ab9560653819340
CRC32 2A858E1E
ssdeep 48:I3Nd7kHrB0oVL5dtOTN+ix7pJ+QCSqXAhZaYhDdTWdTO:KNqpF5dITN+GQmaYbT4TO
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3032 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis
Name ecae57fe05e04217_fsf-{0e1eee64-e8c6-4e2a-9759-63cf07fd8988}.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
Size 114.0B
Processes 3032 (WINWORD.EXE)
Type data
MD5 e9b5ff513473dd23431dc97d7f079aba
SHA1 130fa29482af5010ede948d1040f5ae2a17bc6f8
SHA256 ecae57fe05e0421761ceaf4d5346b9adffe675c88eda462d496e4cfb700ed78b
CRC32 9B1B3DF4
ssdeep 3:yVlgsRlzhl7hHZkbEt3ylWnWUs91du276:yPblzh5vkbuilWTJ22
Yara None matched
VirusTotal Search for analysis
Name 912f689b04e90176_2d85f72862b55c4eadd9e66e06947f3d
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
Size 192.0B
Processes 3032 (WINWORD.EXE)
Type data
MD5 b6b856a63fa39135c7e8aafda5930267
SHA1 a7b9bacb9dec477c30c0f39fb3e304429057f859
SHA256 912f689b04e90176268901b50580f3fbc9a66c2ecf3f1a3bc3164db611bd7709
CRC32 9FD138FC
ssdeep 3:kkFklnwzkVXfllXlE/HT8kgRl1NNX8RolJuRdxLlGB9lQRYwpDdt:kKXkVIT8ZNMa8RdWBwRd
Yara None matched
VirusTotal Search for analysis
Name 51e6212f551b7ea8_fsf-ctbl.fsf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
Size 114.0B
Processes 3032 (WINWORD.EXE)
Type data
MD5 7e512b964d854bc56e19845f6eb05fc6
SHA1 bd6edfab6897ae077aabf3f1aec7479a2bc5bc13
SHA256 51e6212f551b7ea82bdee79f14d13833aca37590460df16d367d40852ef69684
CRC32 51446CB8
ssdeep 3:yVlgsRlzVlsh+S5VWWyabAeGkkZl27276:yPblzVLSilFPdM22
Yara None matched
VirusTotal Search for analysis