Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
12345.xlsm
|
Microsoft Excel 2007+
|
initial sample
|
||
C:\Users\user\Desktop\~$12345.xlsm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\699323C9.png
|
PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\761041BF.png
|
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B5BE736.png
|
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4AC70B4.png
|
PNG image data, 364 x 139, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\91DE0000
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\12345.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15
2020, mtime=Tue Apr 6 15:47:39 2021, atime=Tue Apr 6 15:47:39 2021, length=95644, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue
Oct 17 10:04:00 2017, mtime=Tue Apr 6 15:47:39 2021, atime=Tue Apr 6 15:47:39 2021, length=12288, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\A2DE0000
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe -s ..\nvcoerf.dll
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe -s ..\nvcoerf1.dll
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe -s ..\nvcoerf2.dll
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe -s ..\nvcoerf3.dll
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe -s ..\nvcoerf4.dll
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://velma-harber30ku.com/gg.gif
|
8.211.4.209
|
||
http://mills-skyla30ec.com/gg.gif
|
8.211.4.209
|
||
http://jacktech.jackindia.com/ds/0204.gif
|
103.205.143.227
|
||
http://moumitas.com/ds/0204.gif
|
74.208.236.90
|
||
http://laura9630fr.com/gg.gif
|
8.211.4.209
|
||
http://servername/isapibackend.dll
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
laura9630fr.com
|
8.211.4.209
|
||
mills-skyla30ec.com
|
8.211.4.209
|
||
jacktech.jackindia.com
|
103.205.143.227
|
||
velma-harber30ku.com
|
8.211.4.209
|
||
moumitas.com
|
74.208.236.90
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.205.143.227
|
jacktech.jackindia.com
|
India
|
||
8.211.4.209
|
laura9630fr.com
|
Singapore
|
||
74.208.236.90
|
moumitas.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
g-8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ECCC1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DefaultSheetR2L
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
UseSystemSeparators
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ThousandsSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DecimalSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ED05A
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ED25C
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ED318
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
r78
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F8102
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F8FA2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EXCELFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SavedLegacySettings
|
There are 95 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
500000
|
heap private
|
page read and write
|
||
2160000
|
heap private
|
page read and write
|
||
260000
|
heap default
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
360000
|
unkown
|
page read and write
|
||
2030000
|
heap private
|
page read and write
|
||
2E6000
|
unkown
|
page read and write
|
||
20A000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
70000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
654000
|
heap private
|
page read and write
|
||
21A0000
|
unkown
|
page write copy
|
||
1CE0000
|
unkown
|
page readonly
|
||
F0000
|
unkown
|
page read and write
|
||
28C000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
454000
|
heap private
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
1D80000
|
unkown
|
page readonly
|
||
267000
|
heap default
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
1F30000
|
unkown
|
page readonly
|
||
206B000
|
heap private
|
page read and write
|
||
130000
|
heap private
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
200000
|
heap private
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
3D0000
|
heap private
|
page read and write
|
||
336000
|
unkown
|
page read and write
|
||
2B3000
|
heap default
|
page read and write
|
||
2165000
|
heap private
|
page read and write
|
||
396000
|
unkown
|
page read and write
|
||
2C3000
|
heap default
|
page read and write
|
||
504000
|
heap private
|
page read and write
|
||
504000
|
heap private
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
450000
|
heap private
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
29E000
|
heap default
|
page read and write
|
||
3FE000
|
heap default
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
||
650000
|
heap private
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
2155000
|
heap private
|
page read and write
|
||
CE000
|
heap default
|
page read and write
|
||
134000
|
heap private
|
page read and write
|
||
413000
|
heap default
|
page read and write
|
||
1AC000
|
unkown
|
page read and write
|
||
215B000
|
heap private
|
page read and write
|
||
436000
|
unkown
|
page read and write
|
||
1C30000
|
unkown
|
page readonly
|
||
1B0000
|
heap default
|
page read and write
|
||
2AE000
|
heap default
|
page read and write
|
||
219B000
|
heap private
|
page read and write
|
||
1F90000
|
unkown
|
page readonly
|
||
2F4000
|
heap private
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page read and write
|
||
4A6000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page write copy
|
||
3C7000
|
heap default
|
page read and write
|
||
2C6000
|
unkown
|
page read and write
|
||
E3000
|
heap default
|
page read and write
|
||
1FE0000
|
unkown
|
page readonly
|
||
2165000
|
heap private
|
page read and write
|
||
28C000
|
unkown
|
page read and write
|
||
2035000
|
heap private
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
2060000
|
unkown
|
page write copy
|
||
E0000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
500000
|
heap private
|
page read and write
|
||
90000
|
heap default
|
page read and write
|
||
270000
|
heap default
|
page read and write
|
||
97000
|
heap default
|
page read and write
|
||
3A6000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
2120000
|
heap private
|
page read and write
|
||
2F0000
|
heap private
|
page read and write
|
||
4F6000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page readonly
|
||
218B000
|
heap private
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
546000
|
unkown
|
page read and write
|
||
203000
|
heap default
|
page read and write
|
||
224000
|
heap private
|
page read and write
|
||
19C000
|
unkown
|
page read and write
|
||
2160000
|
heap private
|
page read and write
|
||
2150000
|
heap private
|
page read and write
|
||
204000
|
heap private
|
page read and write
|
||
277000
|
heap default
|
page read and write
|
||
2125000
|
heap private
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
2BA000
|
heap default
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page readonly
|
||
41A000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
20B0000
|
unkown
|
page write copy
|
||
1EE000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page write copy
|
||
510000
|
unkown
|
page readonly
|
||
4C0000
|
unkown
|
page read and write
|
||
1B7000
|
heap default
|
page read and write
|
||
21D0000
|
unkown
|
page readonly
|
||
2CA000
|
heap default
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
190000
|
unkown
|
page readonly
|
||
70000
|
unkown
|
page readonly
|
||
1C90000
|
unkown
|
page readonly
|
||
3D4000
|
heap private
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
1C80000
|
unkown
|
page readonly
|
||
496000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1F80000
|
unkown
|
page readonly
|
||
219B000
|
heap private
|
page read and write
|
||
12C000
|
unkown
|
page read and write
|
||
EA000
|
heap default
|
page read and write
|
||
204000
|
heap private
|
page read and write
|
There are 120 hidden memdumps, click here to show them.