Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
DocuShared_Quima_FacturasPedida_177.rtf
Resource
win7-20231129-en
General
-
Target
DocuShared_Quima_FacturasPedida_177.rtf
-
Size
600KB
-
MD5
4a5bd9768fbcbc38d39d16cc2d32c5ba
-
SHA1
1376410f2b523e27e0739a747b2e1dd15bcf039d
-
SHA256
12ee9017a76069efb4e8cb3572d345a1a0402cd9a7aa015ebfee3d2e3c26dede
-
SHA512
581332cc2647f5ea2247157c55dc98f20ad9a056465d826d3e9e2cb36e4c5dd03ef70101669994471f80ae74c79f61a80370e25ca2a589bbfac75976f382a2d2
-
SSDEEP
768:FB5pxWUbptX7sZ0lpHmfLRZr6xlsw2FALJoezZ8uhnsx5555555n8xiGxB4UGX6a:FlMUVd7c0Mqb96XobQy7i
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEIEXPLORE.EXEiexplore.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0841BA1-394F-11EF-8DE0-D691EE3F3902} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426181964" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e182621b97647f4a8ec8438970e156f2000000000200000000001066000000010000200000007759fd9d8d217216ed359a3220296cfa1999910e4803a217a668fd666710820a000000000e80000000020000200000005d0e869486e92e7693f8f94c3a112e3ce6c76eb3a9b5893a61f11232b64924b42000000028aff1442398ffcff67063636c830908b1cd306f23ddbf8e82c93377f823657e4000000044e83daf531246a49fcfddcc4871e281f9058a375fb7545dca253319ff60177ac0cdf326b45eff69d492f4d6932dc72d13e24d2a27decf0a8cdcb7c2f69cfcf6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204085be5ccdda01 iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1848 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 576 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEiexplore.exeIEXPLORE.EXEpid process 1848 WINWORD.EXE 1848 WINWORD.EXE 576 iexplore.exe 576 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
WINWORD.EXEiexplore.exedescription pid process target process PID 1848 wrote to memory of 2552 1848 WINWORD.EXE splwow64.exe PID 1848 wrote to memory of 2552 1848 WINWORD.EXE splwow64.exe PID 1848 wrote to memory of 2552 1848 WINWORD.EXE splwow64.exe PID 1848 wrote to memory of 2552 1848 WINWORD.EXE splwow64.exe PID 1848 wrote to memory of 576 1848 WINWORD.EXE iexplore.exe PID 1848 wrote to memory of 576 1848 WINWORD.EXE iexplore.exe PID 1848 wrote to memory of 576 1848 WINWORD.EXE iexplore.exe PID 1848 wrote to memory of 576 1848 WINWORD.EXE iexplore.exe PID 576 wrote to memory of 1496 576 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 1496 576 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 1496 576 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 1496 576 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\DocuShared_Quima_FacturasPedida_177.rtf"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://webordendecompra.s3.eu-west-2.amazonaws.com/Darth+Vader.html%20-%20bWF0aWFzLmNhbGRlcm9uQGl2aXJtYS5jb20=2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8Filesize
1KB
MD5d19a604de6ad09ed4473f92edca50651
SHA1094576690124fcf56a41b51712022c56986a1a53
SHA256ee7c1e4005553feb8039e6a6ce6d7dbc959b06c59f1d9caa6195939ebd4a4fef
SHA512365ca165f19b5bd20aed396438662375ab0525607cb92c756314ae9e94199196279986bcb86266f3ea97041ff9d3a5a3405051b72e7d7dfedb91866ebfa4f4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62Filesize
2KB
MD53933beaf4154cd8d64d3b2066628291f
SHA18e5ab8b6d137f760e673556cde30de52b8f2e54d
SHA2566238eb54e94655c1a61e78deab675d716d820608a8c996fcbe0ab66f94f65b38
SHA512285f30328b57e4df882a7bea4a01137635ef0b36ab222e449ebc02c95df86531541021df43bd0997bf74979165ec727039d2fbc76d1c8e13069b708584e21064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894Filesize
1KB
MD5b6cd5101bef3bcfe46fdbf61b4a1f5ff
SHA1d775f0a511e847a68df52225f7a69b017aa89fff
SHA256c0648da352ab4e017bd8ade32100c83e892d721e80f602519e0f40dbbb59bf01
SHA5126a8729cfed5485034c1a0df9e6619b126ed68ac07f1466a2df126a746074cc96d8e752dbe3d37f66a4024d78f2c9f445f08a1e066367f6b694903ff3a6d4d981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D03E46CD585BBE111C712E6577BC5F07_836D95EA8FAFF793C684E466D4C8CD5DFilesize
471B
MD57d4b83e92a8ed10e48601db25fd2c32e
SHA1d4a05694fefe7cf1f751cd16fc6b2f87f22f7169
SHA256ffc379f62d5e6f1e219a6940e1f8a8ea43a6875850f067dfc3f5738fbf6a21a8
SHA512ae65fbfbc7ba8232c88af63db1c294a23b4134d153e7a332abe4b0e42fe6128a4376ddd50d250de1eb06eac71a55cb6b42f8c9f7fe31f4b2e18cf35feb5bae66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD5f9ea3ea22a5cc0b10fad1ffa3adb05b1
SHA136f213e560ba7384533a87bfbd1d9237b535547e
SHA2562aee006dac5804ce5afa5d276795aefd4baad91c54224983122909a70074b26c
SHA512e0f0d966acbebd5b7696857d45e1282836e6118c732df8002399382efc496a6db4738688483c823d0b451a2777ca5ce4158d0303d7950ce3b29d91a0c0ca30b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8Filesize
438B
MD528748d3131ddea1b0124b88e1df06bf0
SHA124e4a1732426deae27b508c4e550ead997cd4e8d
SHA2569533918a6bef26241242374ccf9dacf05b5a33e30e6e4402baad9c1fed092166
SHA512735ad815e68771d1bcc11194ce3d07be10f20aa397d8f963d63bb9896d5eec5c821eb2a5b2d4c3b4c66b1c7718d8e04df4dbd3223d3a71a4c5409c78558eb7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD570adbfd982dd7535df02be017d8d7cf8
SHA170f0d7453aa08a427e82f5c9bb0ed1cd886f62e2
SHA2565a828d42b127173e75c1a3ec70176167add78427def8f6ede9793254a87ae7e4
SHA512e950e821c8f604c12901d4936fdc95df3452714369f5db3b21c7f391a956f428ac78174e0d80573aa597e22fa948b26a2439418859b5ce3cd7af2d22fcdbd447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57934f68680783822214c73e6e096f0c2
SHA10c542d76f3526c35b993effa1660daf8d42fdcb1
SHA256379ff598c6362b0c59d7847b8383d525568ccf9a231007326272f66ca2c2de3d
SHA5126867cdc6ee619395fcaab804f20aa191f5bf2b5d227fa352c2b0250f7d1c9007d257bb4e35561ac3b5b36ad91b2852cff9a7c56cd7f1b19d71391df0c7263e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ad997c2011eab5f830d4da4e4a8dc7e8
SHA1d6f4764c1db290308b785be02dabdfd68d486657
SHA25626e02f007bd20adc730bae5039f05b05dc1936bdcac8adaa0ebd241475f5b09f
SHA512de8787f429f7fdc57ec1fa3a5c6e0b42cbf54237e6cc98afc65fd6b4d173c67121509f9ff10ce36e0e346e360dd298d458cabaf64007b84cb8aff645a93b8b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a040cb842fb286c338f8f972f492cb78
SHA15472dc5a7470cd2d157d483aa4c42dbb1b106620
SHA25649b1fab272a28b8a489a9619c73136939f80a0336be8d8e7b2e6a300f19dfbb2
SHA51220566f82130c5ed5b8b04ef14272b0e1d347ad9c71ab4d96bcb2c26a97180b738de1c2922ecaab4d86b5839aa6aa964edffc3bad804aed3633521921e64506b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51606be39c0d12a725bdf9a76440eaf2a
SHA18ca808930a13b7a2011917c71a61ee63f26ba42e
SHA25627187e6d938da5bdae780cc7bfa1aa1b789b5e3cb8270778fd4a90ec41827590
SHA512a9d9463ca51f90cf39caf3a0e8d1f0eb4506ce945699d2ee82e9fa548472b570287b6d480299aa7c0922d458bd88f41f07c9e3417d72e965ce7ef5010b6283c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c6a9caef8ed67cf1f360577aa8c5e607
SHA107ea6afa70d78cec7317fb89bed734a18aa56f01
SHA256a8f28cb3552fd34db54ed3fbed5900a3ac5ec19ea0c12473fe6736155d7d8b96
SHA512216351051965ca2c176968bb633debd3acbce5067827cdc4d9dee41c940fba621dd92886a5b0cfc209b654c7af13dfbd60597a5d2f6957630c85dd15f487fcc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD520cc496d0cf96cca95c8c5cf6edb74a9
SHA1ddeeee2d48cee2ca028ed0650e38b262a5520fb0
SHA256ce6aaa472036e6bf3a7c4c3a3be840b369c50ba972dc8d8b6b5b786e9e40ad57
SHA51238147ba9290c959279ec9a4adb4612c93ea41de9c422524ceff0f901d9690cc287164b28fcb9aabcf358ed339e409b689645d1f370f358eb3fe5a5be898e2a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55a72d5210419368d1224ae6c74476ebd
SHA112c09cd1f8750f2a407193fc9dd3ebb484683077
SHA256f2ad3f08dfcf1c2318d006128df3584f7d99e8c784e455486c7edd7d83218dd5
SHA512e499f2a77f3d351add221eba3ab9b2877fe8f88f95d30081678e78ef9d6dd296726f13bda15084c204121da57e2ffc5b9f04042840b08372cbd3e2dd777f1f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5fa3ebf27ee3f037098eb111f79940189
SHA1e090cbb9f57c8723ee6d054635d6ba493cbea6b2
SHA256bca3a4ee3e5e1d10e6116b3507d020bdec5b113e61d81e1f7ea238dac23a9232
SHA512d9bf08b22d0165400dac7827cca6dfdf5780da3ac6dbd0fcfd946ce0385e5c91acd4e41a03b76df765bb68f89f99fdb14e89e5f74072e1774399144fe3a76937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50498e99f758181475c169b172b3e6395
SHA10615f93d5080ac4a229a58e2298c5c00506ee5f8
SHA256c8b702d91f248981db115ecd9f6cdb06fee6c105f31115ef6aa4423a81ae9d23
SHA51233c0dd7019aa0eb5cd73e0ef6cf080b268198e57089b8854f043ebe6c7c4d178a2a6515d8e9a47a15e0b30d59a0676aed1886dc076d7c3dc4e1d9df3a578c98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD523f924e3ee11e87cd509a98781886154
SHA135e2463cb479a4a45770399e5b27e16ee42d7a78
SHA25622d4f05b5d36af40092a7d229205f6c9662cbf98b8a6fb4eab9a7ef6de13b836
SHA51218feb87d03695c984428baffc88094d2df7727b67878ce344f618e3ba3932d33554ec9dbdf20c98d710ec1331f431943fc3c73d3b547df8cd10c9dedbcc61c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5211d2968aeb8e568bae71987700e8ed9
SHA1f22e7a328ae56cf9a5d831e73294cbcee6bd363d
SHA256bc3eedc2291686ab79daee106c602515b5ede184a9de41829d5ccd40514fb491
SHA51220dab182f7cf4e329fca7cfb6f9d000893b03f2223e31583e57f62b21d9700b452652c636ae22bee4d2533d5cbd47994f8b3e5d0a041edfe645c17673f1f531d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a3e4e512f8597fb0d0ebe96d78e13757
SHA165e45b26a0c0c2536521f32390a1491741350fff
SHA2568ab9a720fcdc429a477e0e065e768ac6a3714e13dea7bacef7df92d9e9afc6b1
SHA51246a86136f6be0c122a1acd058c712ec87a0a41588fed6a78570323be6c015dfdc4b796a03cc23595c7c9d17baa86ed1b4efd1a4e56f8dd5ffc41e7cfdfc91293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54370fb1719e0a871bfd899732e56ae6f
SHA120b43204acab19d72e03451fb5c163ede771e1e9
SHA256f24f20bc83dccf5b5e8eb2050fdc8b51e8ac799357f500baa32ecb7aabdf5395
SHA51263ce0a024a66dc8300f6a540611ca383ad2fc02519ebc408d976df32876184edfa32bbd4cf5e5f1e7e782db2cd548b71e94e0bdade3d617d6c420a703c2a84f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ca3d5d6312ff7ed5583e6ce6e2677e80
SHA1e5f3a30775ea6f3f72fd3a379493b47bdf561b97
SHA256b3e7cb13a4bfae4c19ddb26bf6536ad9ea7654278f9f1975efc9081b5cc783f5
SHA512dd78e544dcbbfd2dd65f3c475ab890a30b12952ea2aa66d6b63088e8e82b2622d836777ff6f5528d1ee05df0a9242c9d936350c73fce4238b92c83e86a9ecd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b29c736dbb6ee6854761a5383e83545f
SHA12da0344dbb359189c0494f4aa7daaed08e4322b2
SHA2566bb9f6d9dd5df8e2282e93d9296a09e865f4fffd55ee8afe6451d1c97dd48d8c
SHA51258a3dc954fb41f7c6e7fd0b9d24686bda3f62af4024f856fc83d4e3a08a868f7a4a865b4e49eaf79ac6127e5aadde8c760c033ee1cd24a16a95800ac1decc69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53441b2dced6cd1a56c4f34742a43be4e
SHA182aaab3b613a44f103bd344acd2036c30d8fc615
SHA2563475d471639cefef48624c01632371f1554b8b596304015e7de112e7ff9d8f95
SHA51211315482b25c2aeeecfe07683eeea925c7b2e88e4e598134e5189f37004147b31c8ee6879816182c0f048c2c998b9d107914fc25e40378fee197cccce2d1519e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD545b6505d21707558955c3da72ab2c5ad
SHA1115a48df3001db11d71276f5cac33de3a8e0cf8b
SHA256690a2a1b1df8788daf6e373c0cf135c0a5bd72ce2a9233f5d88e718c9c6cb890
SHA512bc55ce34c78caae5a1f789a582fc93b2c513b7405afe7c971352c61f556cbbefef65d3dd85535776ec0077798778bc387e69fda59fe77c06370ff6db83cb17a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62Filesize
458B
MD50fe4144b8f9346bdb0d98691cd50eded
SHA15e447e4fe7f49be4523e46144b541d332d7f25e6
SHA2565f58e462baa9644659121b691b9f8ac5bfb5e2a44f5b57c0ae6c636f5a4d13cf
SHA512c37b2d35ceb8446524b03b1df1048853cf3194a3cde643785a086e31c175b26729f6cc3cc61d11471926b15037a196e2337c0252bf718602ca114b9c3812380d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894Filesize
432B
MD568a5468c2aa92d0b5e9635adb0b3b0c6
SHA12e3f7d42d50e8d6d9a61ec51d2cabdc5623e53f1
SHA25617627dd767a71cd46f0f472c55dd00b507e9f3c0c12c13b61dd986a34d2bae47
SHA512c529e3106633b792695df2e91b26626bced8811b1c05b69f0c59565a738bde451a616466c5afa4d1fe0a87a2b9605e4fca38d0cb964d4e12115602fe11347d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D03E46CD585BBE111C712E6577BC5F07_836D95EA8FAFF793C684E466D4C8CD5DFilesize
422B
MD5e9ab1dd470f992cbc0b6388faba43c5f
SHA1abae87ea9e54d423a6dc08bd830cd02679d44ace
SHA2565524dedcb8bd35b0a378d1b4b59affaf308971d73d1c2ecaf7f8cdde335ff32d
SHA512df944fe6465b1125d283b3806c7a429fe1d95013eb64dd436c61a10279d8d70ded470473914bcb61b99b2edfaecd95ba4525cb59fa76c49b9c6948eab11fedf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5ed0031ede919f43a3452d9118e9ffb70
SHA1f3c713a104a9a59cac461f7ca68cc0fc61025e1a
SHA256f3fa8a41336fd2530eef3bb3215818d7bda2f1fc26f1d0d117ecc223c89281a4
SHA512a4da9e9f5ff3d4de4d7662b686262032b21b1364b247ca5477c49de299d412076f83285a8fdc75013f22cf2fcc33c49c35dfb827a066848e7648ce4234b67365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoFilesize
4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Temp\Tar324D.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/1848-0-0x000000002F8B1000-0x000000002F8B2000-memory.dmpFilesize
4KB
-
memory/1848-660-0x0000000070B3D000-0x0000000070B48000-memory.dmpFilesize
44KB
-
memory/1848-2-0x0000000070B3D000-0x0000000070B48000-memory.dmpFilesize
44KB
-
memory/1848-1-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB