Analysis
-
max time kernel
102s -
max time network
102s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-03-2021 15:59
Static task
static1
Behavioral task
behavioral1
Sample
2180.xlsx
Resource
win7v20201028
Behavioral task
behavioral2
Sample
2180.xlsx
Resource
win10v20201028
Errors
General
-
Target
2180.xlsx
-
Size
38KB
-
MD5
28d75c5b8fd1d80712f3b390ce304843
-
SHA1
1dcc3d0c446cd7abbac118af64b49e5cb1cb97f0
-
SHA256
a77a62810bde7745f7c7eb1311159c5291dcd06c70db3c8fe5d58aa989725192
-
SHA512
a2e38b16e060b0e58452642804af6bc38cfccc9ac80506301b07a2199f593dd31d2a82e9c1851546c383d826a07a2a48328e82fb763634652c2631ccd4774aba
Malware Config
Extracted
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7ISB2KAC\71335[1].xlsm office_xlm_macros C:\Users\Admin\Downloads\71335.doc.npu4nkh.partial office_xlm_macros -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
EXCEL.EXEEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = a0ace1699716d701 iexplore.exe -
Processes:
IEXPLORE.EXEiexplore.exeEXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "322246732" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6377181-828A-11EB-AC04-FE5A252B9BCD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 32 IoCs
Processes:
iexplore.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe230000100090e24d373f126545916439c4925e467b00000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_Classes\Local Settings iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
EXCEL.EXEEXCEL.EXEpid process 528 EXCEL.EXE 1596 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 1152 iexplore.exe 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
Processes:
EXCEL.EXEiexplore.exeIEXPLORE.EXEWINWORD.EXEWINWORD.EXEEXCEL.EXEpid process 528 EXCEL.EXE 528 EXCEL.EXE 528 EXCEL.EXE 1152 iexplore.exe 1152 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 528 EXCEL.EXE 528 EXCEL.EXE 1152 iexplore.exe 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 608 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 528 EXCEL.EXE 528 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE 1596 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
EXCEL.EXEiexplore.exedescription pid process target process PID 528 wrote to memory of 1152 528 EXCEL.EXE iexplore.exe PID 528 wrote to memory of 1152 528 EXCEL.EXE iexplore.exe PID 528 wrote to memory of 1152 528 EXCEL.EXE iexplore.exe PID 528 wrote to memory of 1152 528 EXCEL.EXE iexplore.exe PID 1152 wrote to memory of 1964 1152 iexplore.exe IEXPLORE.EXE PID 1152 wrote to memory of 1964 1152 iexplore.exe IEXPLORE.EXE PID 1152 wrote to memory of 1964 1152 iexplore.exe IEXPLORE.EXE PID 1152 wrote to memory of 1964 1152 iexplore.exe IEXPLORE.EXE PID 1152 wrote to memory of 608 1152 iexplore.exe WINWORD.EXE PID 1152 wrote to memory of 608 1152 iexplore.exe WINWORD.EXE PID 1152 wrote to memory of 608 1152 iexplore.exe WINWORD.EXE PID 1152 wrote to memory of 608 1152 iexplore.exe WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2180.xlsx1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://docs.zoho.com/downloaddocument.do?docId=ib6t2197ba609615e4f72a497037ef60d925a2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Downloads\71335.doc"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /vu "C:\Users\Admin\Downloads\71335.doc"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a01⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9915FBCE5ECE56452A09FB65EDE2FAD2_8D1CA85B209F2F6A5A72F299949DF354MD5
70d251f82ae25df5a0cabab075f19d97
SHA112918f71a7a2a1fb7df0903f71a71f6b9b1c0f83
SHA256d1da5a5aae1ebc9617064e66fdddbd3ca46b7439b73386e130c6a9da44c82ce4
SHA5123d009965285f30fae3da9380fa1142cc9ea933bd111ce6310d4cabc4d210c2d1269cb40d7db06f93e08314ef58606750ed49c72387fd14c710ae6fb0fd8be44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D93C575AD9E9AF9B95268A3CB953B5A1MD5
0c34c7cf45afe00252fa2b6f1326ec26
SHA15a05e800712bfd57981f7f9577e97fc9b42653ee
SHA2567befeb48e039ccba22f089871840b49b9bb383be4127ea1fcc454b5560e7b50b
SHA512136ae2cdaf74346a14ac239ba23cc53fe9393329c2e56dd029f65a8a78e457b4e866a2b6562b807244af21042b03029ed2c70ee1668a8d62ebe7330ac4556892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
f7b19e97a7a3eb7710bc54578fe3fffb
SHA11fe975744ac1252bc489c9b55e8fac7074aa86f4
SHA256e0b3e0290ec5aacedd352a95f230091c7aa9abd642b362616d78463083efd6b9
SHA512892d5383151bce299af2fb5b058bf824f7d6a21ec45d22a78758c093a024c6e1132c8e77de06598e0ed1fe1bee4bbfce237b8b761fc0dcbfcc9de378d630d354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9915FBCE5ECE56452A09FB65EDE2FAD2_8D1CA85B209F2F6A5A72F299949DF354MD5
2dc32939982ba38452f37eab16e3c0c6
SHA1b143d360b6f6295f96b1dac37af19200ddf7613c
SHA2566954f0b3abb734f1b207acdf89e06f60e3e54e0dd35cf589cf73f90f1ea8c2c5
SHA512d694f1aa50995b51680e190408e5c47b0416343b69f8e5bb7ea2094c9a4eefd2fc7e8428c85853416234184adbc6f12ca74643bf61c7396b69229bc2113a16e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D93C575AD9E9AF9B95268A3CB953B5A1MD5
12e4542bb8d59a8eea1400feefdfb8c0
SHA1274ad2737e3e545e3655d9c27153816ffd1c7ff3
SHA256c046d131e058c95f3abeb6813193d2b871600c3467930b4a7e55ea098f22e4ac
SHA512233f3feeff82b879f1716b6ad4edb27076d77c389c118d226335e937f01fc7cf04d41d778b23aae6be757e1215033c5467fd3955cffd541f73c2d41633bd35ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7ISB2KAC\71335[1].xlsmMD5
769b921e19de86a5c4e9f34b081ab0f9
SHA11fe3fc7318b99c947c3dd7093ad477be14ccf39a
SHA256a2160fbbb43389a925f1ac3bb59f5dd994f469cbb40ebe9996228be7f89978a0
SHA5121622834c25e0909074662a63372bb9d42472de47fe16d466fdf81cd36ec3b9ab96f163f1401cdf544b37cc428a98b1102982cc80729e781e95d205a5a86bfae5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datMD5
0b7ec7262e810831b8dd78dcaa472090
SHA1b739038769542f4c1f74395dd27988fd3e8c22f3
SHA256c120c962a6f030d8d021dca22472ee1c1854f878b3b0d2850208f4639fdcf1e4
SHA5125846556071e0b03c430b2550836785fcb1fcdd0f3a8cd9a0ff5fb526e15f5a1697403701aa5fcfb7357b279fa159f0aabe9a17eaba898201a75640a106d9d0a3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotmMD5
dc5d0a4795fb7555e5f5b76419ce4745
SHA1b37ef47e996d4155a854c4d64710da0a45a36b70
SHA256bac8c338bd71e133a4824b57b18d2b2ac7a699e38451bda0cf15dac03bdd1188
SHA512093c4172ad2f746599293ab9946ca6b25ebade6d5cb712620217d941fcea4aee10d0849c00a4ae40e132187432707e2691a99adc9d3a13150bb98f2adbff2d20
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IH0Z4K5A.txtMD5
a558667a187f3193d546ac165b407fef
SHA135d3c9576f5ef5b74105b230ac9cb51f8ce52959
SHA256f16dc5daa0dcca3c00eafa77ac312305a7e001b43a46d6836b316d27212c4aef
SHA51266d546009d73641e49be2a9026a4aab21d6d29a58a12d2181223f2e9bd7a3dd077f8d626d11fb49e6c2e09c5dde3d2d817ba684aac1b523b31ffe7c02ee0b355
-
C:\Users\Admin\Downloads\71335.doc.npu4nkh.partialMD5
769b921e19de86a5c4e9f34b081ab0f9
SHA11fe3fc7318b99c947c3dd7093ad477be14ccf39a
SHA256a2160fbbb43389a925f1ac3bb59f5dd994f469cbb40ebe9996228be7f89978a0
SHA5121622834c25e0909074662a63372bb9d42472de47fe16d466fdf81cd36ec3b9ab96f163f1401cdf544b37cc428a98b1102982cc80729e781e95d205a5a86bfae5
-
memory/528-6-0x0000000002060000-0x0000000002061000-memory.dmpFilesize
4KB
-
memory/528-4-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/528-2-0x000000002F371000-0x000000002F374000-memory.dmpFilesize
12KB
-
memory/528-3-0x0000000071C01000-0x0000000071C03000-memory.dmpFilesize
8KB
-
memory/600-23-0x00000000694A1000-0x00000000694A4000-memory.dmpFilesize
12KB
-
memory/608-18-0x0000000000000000-mapping.dmp
-
memory/608-19-0x00000000694C1000-0x00000000694C4000-memory.dmpFilesize
12KB
-
memory/608-22-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/848-36-0x00000000027B0000-0x00000000027B1000-memory.dmpFilesize
4KB
-
memory/1120-5-0x000007FEF7D40000-0x000007FEF7FBA000-memory.dmpFilesize
2.5MB
-
memory/1152-16-0x0000000004590000-0x0000000004591000-memory.dmpFilesize
4KB
-
memory/1152-8-0x000007FEFC3C1000-0x000007FEFC3C3000-memory.dmpFilesize
8KB
-
memory/1152-7-0x0000000000000000-mapping.dmp
-
memory/1344-38-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/1596-30-0x000000002FB31000-0x000000002FB34000-memory.dmpFilesize
12KB
-
memory/1596-31-0x0000000072FA1000-0x0000000072FA3000-memory.dmpFilesize
8KB
-
memory/1596-32-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1964-9-0x0000000000000000-mapping.dmp