Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 07:07
Static task
static1
Behavioral task
behavioral1
Sample
Documentation 644.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Documentation 644.xls
Resource
win10v20201028
General
-
Target
Documentation 644.xls
-
Size
778KB
-
MD5
955ddd57164c95530bbff3d5481c0cde
-
SHA1
38449ef5a84f657d39228df55586fa13cab8d9f1
-
SHA256
e9e0a2d27876dc9e0fb5e4a9675a23be3f1a8651f72d5774db0e34c0418fcbf8
-
SHA512
3f502ef2bf16519e0992129a0070efcee4905d88f60b75f1389e39e9549192631ed796f27918b797b0de917e46f3d8c7690201ad0df049e24251844dd0007e38
Malware Config
Extracted
dridex
111
52.73.70.149:443
8.4.9.152:3786
185.246.87.202:3098
50.116.111.64:5353
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
wMIc.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 1940 wMIc.exe -
Processes:
resource yara_rule behavioral1/memory/1460-11-0x000000006BA20000-0x000000006BA3F000-memory.dmp dridex_ldr -
Blocklisted process makes network request 1 IoCs
Processes:
wMIc.exeflow pid process 6 1344 wMIc.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1460 rundll32.exe 1460 rundll32.exe 1460 rundll32.exe 1460 rundll32.exe -
JavaScript code in executable 5 IoCs
Processes:
resource yara_rule C:\Windows\Temp\3ttqn.dll js \Windows\Temp\3ttqn.dll js \Windows\Temp\3ttqn.dll js \Windows\Temp\3ttqn.dll js \Windows\Temp\3ttqn.dll js -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE -
Modifies registry class 280 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8063B555-EAFE-4C1A-9FF6-88D25E479A4A} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9} EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8063B555-EAFE-4C1A-9FF6-88D25E479A4A}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE\\MSForms.exd" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{8063B555-EAFE-4C1A-9FF6-88D25E479A4A}\2.0\FLAGS EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8063B555-EAFE-4C1A-9FF6-88D25E479A4A}\2.0\FLAGS\ = "6" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8063B555-EAFE-4C1A-9FF6-88D25E479A4A}\2.0\0 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1432 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
wMIc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1344 wMIc.exe Token: SeSecurityPrivilege 1344 wMIc.exe Token: SeTakeOwnershipPrivilege 1344 wMIc.exe Token: SeLoadDriverPrivilege 1344 wMIc.exe Token: SeSystemProfilePrivilege 1344 wMIc.exe Token: SeSystemtimePrivilege 1344 wMIc.exe Token: SeProfSingleProcessPrivilege 1344 wMIc.exe Token: SeIncBasePriorityPrivilege 1344 wMIc.exe Token: SeCreatePagefilePrivilege 1344 wMIc.exe Token: SeBackupPrivilege 1344 wMIc.exe Token: SeRestorePrivilege 1344 wMIc.exe Token: SeShutdownPrivilege 1344 wMIc.exe Token: SeDebugPrivilege 1344 wMIc.exe Token: SeSystemEnvironmentPrivilege 1344 wMIc.exe Token: SeRemoteShutdownPrivilege 1344 wMIc.exe Token: SeUndockPrivilege 1344 wMIc.exe Token: SeManageVolumePrivilege 1344 wMIc.exe Token: 33 1344 wMIc.exe Token: 34 1344 wMIc.exe Token: 35 1344 wMIc.exe Token: SeIncreaseQuotaPrivilege 1344 wMIc.exe Token: SeSecurityPrivilege 1344 wMIc.exe Token: SeTakeOwnershipPrivilege 1344 wMIc.exe Token: SeLoadDriverPrivilege 1344 wMIc.exe Token: SeSystemProfilePrivilege 1344 wMIc.exe Token: SeSystemtimePrivilege 1344 wMIc.exe Token: SeProfSingleProcessPrivilege 1344 wMIc.exe Token: SeIncBasePriorityPrivilege 1344 wMIc.exe Token: SeCreatePagefilePrivilege 1344 wMIc.exe Token: SeBackupPrivilege 1344 wMIc.exe Token: SeRestorePrivilege 1344 wMIc.exe Token: SeShutdownPrivilege 1344 wMIc.exe Token: SeDebugPrivilege 1344 wMIc.exe Token: SeSystemEnvironmentPrivilege 1344 wMIc.exe Token: SeRemoteShutdownPrivilege 1344 wMIc.exe Token: SeUndockPrivilege 1344 wMIc.exe Token: SeManageVolumePrivilege 1344 wMIc.exe Token: 33 1344 wMIc.exe Token: 34 1344 wMIc.exe Token: 35 1344 wMIc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 1432 EXCEL.EXE 1432 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1432 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
wMIc.exerundll32.exedescription pid process target process PID 1344 wrote to memory of 1168 1344 wMIc.exe rundll32.exe PID 1344 wrote to memory of 1168 1344 wMIc.exe rundll32.exe PID 1344 wrote to memory of 1168 1344 wMIc.exe rundll32.exe PID 1168 wrote to memory of 1460 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1460 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1460 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1460 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1460 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1460 1168 rundll32.exe rundll32.exe PID 1168 wrote to memory of 1460 1168 rundll32.exe rundll32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Documentation 644.xls"1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\wbem\wMIc.exewMIc1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:/Windows/Temp//3ttqn.dll InitHelperDll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:/Windows/Temp//3ttqn.dll InitHelperDll3⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\2E7EF.xslMD5
bf8eb8c05f7fef58d868e7b066936a12
SHA1ed97a033371ea71e271506ea015316efa652c6d9
SHA2562219065f014fa13dfc5681b5f675ccd3abef2f515a5abb2d0217d2e8c766270a
SHA512b76d583cfe8718f8933b845fe44521a06e36d63a26094b0f6dc3b42221505f21411682360ce20113bf0904f463eef82424e0913e5930c703069c45a62dd02fb3
-
C:\Windows\Temp\3ttqn.dllMD5
eb36808c91fe76f09d63c332b8c11a69
SHA1ed11e2cb4e7d176d1e7cb988f548d2582dfae6e5
SHA2563996219367139c590091a24a19f2e3bae6a17185b70ce21dc4e152febefdbb9c
SHA51283e36918a12a8b0dd44da0d7214701c7b0446f0a00697ad1c738a365be6292ba4b4a3cbe43f7c2b97b93687fe4b6356fb1e74ec60645b2f4bbed968f350ad73d
-
\Windows\Temp\3ttqn.dllMD5
eb36808c91fe76f09d63c332b8c11a69
SHA1ed11e2cb4e7d176d1e7cb988f548d2582dfae6e5
SHA2563996219367139c590091a24a19f2e3bae6a17185b70ce21dc4e152febefdbb9c
SHA51283e36918a12a8b0dd44da0d7214701c7b0446f0a00697ad1c738a365be6292ba4b4a3cbe43f7c2b97b93687fe4b6356fb1e74ec60645b2f4bbed968f350ad73d
-
\Windows\Temp\3ttqn.dllMD5
eb36808c91fe76f09d63c332b8c11a69
SHA1ed11e2cb4e7d176d1e7cb988f548d2582dfae6e5
SHA2563996219367139c590091a24a19f2e3bae6a17185b70ce21dc4e152febefdbb9c
SHA51283e36918a12a8b0dd44da0d7214701c7b0446f0a00697ad1c738a365be6292ba4b4a3cbe43f7c2b97b93687fe4b6356fb1e74ec60645b2f4bbed968f350ad73d
-
\Windows\Temp\3ttqn.dllMD5
eb36808c91fe76f09d63c332b8c11a69
SHA1ed11e2cb4e7d176d1e7cb988f548d2582dfae6e5
SHA2563996219367139c590091a24a19f2e3bae6a17185b70ce21dc4e152febefdbb9c
SHA51283e36918a12a8b0dd44da0d7214701c7b0446f0a00697ad1c738a365be6292ba4b4a3cbe43f7c2b97b93687fe4b6356fb1e74ec60645b2f4bbed968f350ad73d
-
\Windows\Temp\3ttqn.dllMD5
eb36808c91fe76f09d63c332b8c11a69
SHA1ed11e2cb4e7d176d1e7cb988f548d2582dfae6e5
SHA2563996219367139c590091a24a19f2e3bae6a17185b70ce21dc4e152febefdbb9c
SHA51283e36918a12a8b0dd44da0d7214701c7b0446f0a00697ad1c738a365be6292ba4b4a3cbe43f7c2b97b93687fe4b6356fb1e74ec60645b2f4bbed968f350ad73d
-
memory/780-3-0x000007FEF74A0000-0x000007FEF771A000-memory.dmpFilesize
2.5MB
-
memory/1168-4-0x0000000000000000-mapping.dmp
-
memory/1460-6-0x0000000000000000-mapping.dmp
-
memory/1460-11-0x000000006BA20000-0x000000006BA3F000-memory.dmpFilesize
124KB