Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
02-04-2020 14:48
Static task
static1
Behavioral task
behavioral1
Sample
SBA_DISA.EXE
Resource
win7v200217
Behavioral task
behavioral2
Sample
SBA_DISA.EXE
Resource
win10v200217
General
-
Target
SBA_DISA.EXE
-
Size
152KB
-
MD5
43927d58e211d5a2d2670bf46b1d9884
-
SHA1
89dba75b13a506ee5042b5636c06555baf85050c
-
SHA256
a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835
-
SHA512
12982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
benzinforh.exedwn.exebenzinforh.exebenzinforh.exebenzinforh.exepid process 3936 benzinforh.exe 968 dwn.exe 4020 benzinforh.exe 2088 benzinforh.exe 3760 benzinforh.exe -
Loads dropped DLL 2 IoCs
Processes:
benzinforh.exedwn.exepid process 4000 benzinforh.exe 4016 dwn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
SBA_DISA.EXEbenzinforh.exesvchost.exesvchost.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce SBA_DISA.EXE Key created \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce benzinforh.exe Set value (str) \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Gymnasti = "C:\\Users\\Admin\\Sugaryse\\benzinforh.vbs" benzinforh.exe Set value (str) \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Gymnasti = "C:\\Users\\Admin\\Sugaryse\\benzinforh.vbs" svchost.exe Key created \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Gymnasti = "C:\\Users\\Admin\\Sugaryse\\benzinforh.vbs" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Gymnasti = "C:\\Users\\Admin\\Sugaryse\\benzinforh.vbs" SBA_DISA.EXE Key created \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Gymnasti = "C:\\Users\\Admin\\Sugaryse\\benzinforh.vbs" svchost.exe Key created \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Key created \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-638615289-2068236702-2426684043-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Gymnasti = "C:\\Users\\Admin\\Sugaryse\\benzinforh.vbs" svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
SBA_DISA.EXESBA_DISA.EXEbenzinforh.exebenzinforh.exedwn.exedwn.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exepid process 3864 SBA_DISA.EXE 3976 SBA_DISA.EXE 3936 benzinforh.exe 4000 benzinforh.exe 4000 benzinforh.exe 968 dwn.exe 4016 dwn.exe 2644 svchost.exe 1944 svchost.exe 2876 svchost.exe 668 svchost.exe 860 svchost.exe 3928 svchost.exe 3764 svchost.exe 1996 svchost.exe -
Suspicious use of SetThreadContext 15 IoCs
Processes:
SBA_DISA.EXEbenzinforh.exebenzinforh.exedwn.exesvchost.exesvchost.exesvchost.exesvchost.exedescription pid process target process PID 3864 set thread context of 3976 3864 SBA_DISA.EXE SBA_DISA.EXE PID 3936 set thread context of 4000 3936 benzinforh.exe benzinforh.exe PID 4000 set thread context of 2644 4000 benzinforh.exe svchost.exe PID 968 set thread context of 4016 968 dwn.exe dwn.exe PID 4000 set thread context of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 set thread context of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 set thread context of 3760 4000 benzinforh.exe benzinforh.exe PID 2644 set thread context of 1944 2644 svchost.exe svchost.exe PID 4000 set thread context of 2876 4000 benzinforh.exe svchost.exe PID 2876 set thread context of 668 2876 svchost.exe svchost.exe PID 4000 set thread context of 860 4000 benzinforh.exe svchost.exe PID 860 set thread context of 3928 860 svchost.exe svchost.exe PID 4000 set thread context of 3764 4000 benzinforh.exe svchost.exe PID 3764 set thread context of 1996 3764 svchost.exe svchost.exe PID 4000 set thread context of 3992 4000 benzinforh.exe svchost.exe -
Processes:
benzinforh.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\75E0ABB6138512271C04F85FDDDE38E4B7242EFE benzinforh.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\75E0ABB6138512271C04F85FDDDE38E4B7242EFE\Blob = 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 benzinforh.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
benzinforh.exebenzinforh.exepid process 4020 benzinforh.exe 4020 benzinforh.exe 2088 benzinforh.exe 2088 benzinforh.exe 4020 benzinforh.exe 4020 benzinforh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
benzinforh.exepid process 4000 benzinforh.exe -
Suspicious behavior: MapViewOfSection 11 IoCs
Processes:
SBA_DISA.EXEbenzinforh.exedwn.exesvchost.exesvchost.exesvchost.exesvchost.exepid process 3864 SBA_DISA.EXE 3936 benzinforh.exe 968 dwn.exe 2644 svchost.exe 2644 svchost.exe 2876 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 3764 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
benzinforh.exedescription pid process Token: SeDebugPrivilege 2088 benzinforh.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
SBA_DISA.EXEbenzinforh.exebenzinforh.exesvchost.exedwn.exesvchost.exesvchost.exesvchost.exesvchost.exepid process 3864 SBA_DISA.EXE 3936 benzinforh.exe 4000 benzinforh.exe 2644 svchost.exe 968 dwn.exe 2876 svchost.exe 860 svchost.exe 3764 svchost.exe 3992 svchost.exe -
Suspicious use of WriteProcessMemory 111 IoCs
Processes:
SBA_DISA.EXESBA_DISA.EXEbenzinforh.exebenzinforh.exedwn.exesvchost.exedescription pid process target process PID 3864 wrote to memory of 3976 3864 SBA_DISA.EXE SBA_DISA.EXE PID 3864 wrote to memory of 3976 3864 SBA_DISA.EXE SBA_DISA.EXE PID 3864 wrote to memory of 3976 3864 SBA_DISA.EXE SBA_DISA.EXE PID 3864 wrote to memory of 3976 3864 SBA_DISA.EXE SBA_DISA.EXE PID 3976 wrote to memory of 3936 3976 SBA_DISA.EXE benzinforh.exe PID 3976 wrote to memory of 3936 3976 SBA_DISA.EXE benzinforh.exe PID 3976 wrote to memory of 3936 3976 SBA_DISA.EXE benzinforh.exe PID 3936 wrote to memory of 4000 3936 benzinforh.exe benzinforh.exe PID 3936 wrote to memory of 4000 3936 benzinforh.exe benzinforh.exe PID 3936 wrote to memory of 4000 3936 benzinforh.exe benzinforh.exe PID 3936 wrote to memory of 4000 3936 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2644 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 968 4000 benzinforh.exe dwn.exe PID 4000 wrote to memory of 968 4000 benzinforh.exe dwn.exe PID 4000 wrote to memory of 968 4000 benzinforh.exe dwn.exe PID 968 wrote to memory of 4016 968 dwn.exe dwn.exe PID 968 wrote to memory of 4016 968 dwn.exe dwn.exe PID 968 wrote to memory of 4016 968 dwn.exe dwn.exe PID 968 wrote to memory of 4016 968 dwn.exe dwn.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 4020 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 2088 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 4000 wrote to memory of 3760 4000 benzinforh.exe benzinforh.exe PID 2644 wrote to memory of 2284 2644 svchost.exe svchost.exe PID 2644 wrote to memory of 2284 2644 svchost.exe svchost.exe PID 2644 wrote to memory of 2284 2644 svchost.exe svchost.exe PID 2644 wrote to memory of 1944 2644 svchost.exe svchost.exe PID 2644 wrote to memory of 1944 2644 svchost.exe svchost.exe PID 2644 wrote to memory of 1944 2644 svchost.exe svchost.exe PID 2644 wrote to memory of 1944 2644 svchost.exe svchost.exe PID 4000 wrote to memory of 2876 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2876 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2876 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2876 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2876 4000 benzinforh.exe svchost.exe PID 4000 wrote to memory of 2876 4000 benzinforh.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE"C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE"C:\Users\Admin\AppData\Local\Temp\SBA_DISA.EXE"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Sugaryse\benzinforh.exe"C:\Users\Admin\Sugaryse\benzinforh.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Sugaryse\benzinforh.exe"C:\Users\Admin\Sugaryse\benzinforh.exe"4⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Sugaryse\dwn.exe"C:\Users\Admin\Sugaryse\dwn.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Sugaryse\dwn.exe"C:\Users\Admin\Sugaryse\dwn.exe"6⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Sugaryse\benzinforh.exeC:\Users\Admin\Sugaryse\benzinforh.exe /stext "C:\Users\Admin\AppData\Local\Temp\cuezfnvnbiuccvwnbnfok"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Sugaryse\benzinforh.exeC:\Users\Admin\Sugaryse\benzinforh.exe /stext "C:\Users\Admin\AppData\Local\Temp\mxjsggfhoqnhebsrkysqnpvt"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Sugaryse\benzinforh.exeC:\Users\Admin\Sugaryse\benzinforh.exe /stext "C:\Users\Admin\AppData\Local\Temp\orpcgyqicyfmppgvbimjyupkbeq"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_0B97942EE72A6E3F514E8E84F294CC72MD5
9dc91d1ae0ad42bc7ea59d04f5764cde
SHA19c8b4cfc2333d7a459571ed90ee63d18a342b09e
SHA2569d7cc95d37e7f03d74ec159888a058d5a7e8f10c974f167ee2094334671a687d
SHA512bf849ccda5a8d1266b97eff77a75a9063ae37d1ae6af3141f40a94d1a1d334691aa86cabe909a4bc134ec41fac7bf957cef9a01e86482fb10fb5484b09e7b283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_BA8650709FF65A42B9202D73C10A8F29MD5
869c8fb2e075d4fa18e18b14a6105ea5
SHA158a73030ac4ec92b6777dc3f2f85af3c96e9fc55
SHA256d2bfa48276a89799e6f2d529b15cd27318c32431daa2e13cf38528e09b04de2e
SHA5121552265fdc1b8c125638ae54443e1a20bdd00eb9ca7dce03a6a37a780ae548c747b5ecf1a772ed2db804bd5c1cfe85d3246b85b6daf2279f750072ff0a1cfefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288BMD5
e550da03aee5b546b436cd553d3233b9
SHA17d4f842c50f4136f10c6c6a2e891bfc4a182a0ed
SHA2569abfd4e29b96cca442502b1de6071fe0293455df22b4eff19fa3e6df060947e7
SHA512e758228aa2b04ec44ded777ae2318ecf6e9278b6b5981d29d10378e0f66885fabccab48ece78fc279755e710fb531575b58a4fe28469d199736eeb24aa62c767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_0B97942EE72A6E3F514E8E84F294CC72MD5
9d8e8dc0a8b2dc2fc1829e3894cbf47f
SHA1f93bf785c3ac00ed38d851694d04e576d0bc97ba
SHA256cbbd1cd95a9f6dbcce83282be1a96a3b3f9f364a6a62cd01e7efc0815b063e01
SHA512ca4f9f9470487043e70ce32f6b4a5c8a34677630522908672568bd25c12a01ca0ac5419eb48f8aa96fa84d2357b5af8fc4a44aee9b6127bc48b8dc8a256fbc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_BA8650709FF65A42B9202D73C10A8F29MD5
c5a5342ce2902b3f4cb540cc30f364b5
SHA168a9bd03c1b84a3f02839cd06bfea46fbaea9937
SHA256317bb9fcad3d6e5a685ae49930c3335a50a73c37993349223b91898be86d7c39
SHA51280eb5eaa53581bcdc3d35803f9a3a4278ca1f6b0aad679314e0c39822d6f55dc798c05cb41513827b07b87662da2a8f0fe3c18f916c9e3a4c905e14d1d0e673c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288BMD5
8cc93fcd0cf41adade260de10a0584f3
SHA1a79b33c0e8f2860db5f0f70970bee59f1221afde
SHA256275370349395b8a2a6e8e06a6fb9121f7457de4f63a9c77bcb935d69175ab621
SHA512bf5312cd6cfcb26322ab6389553ad36c2cc94a11a1605f4ae68e0aef811b8b0cd5e28d5a545bea204207839c870f8e8cd4666fc8263f1e934f9667dd171c30d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\K3PAB8M0.cookieMD5
a2b3552fae99d93c613195f89b79935f
SHA1a3aca690785d60077a1665e698c69a6baaa65e11
SHA256f7afa4344319327cc0b30a40295e16a601f9edaa62fc9dd32305c06ee7e8b9c8
SHA512f6558ec0a2b1b8f2ce47921e595df88c7f850d3a271fdd0713b948fb21d1aa21f32a5f57009c9b66725a790ede329bc03fa90303ad854767ce112e1097140a7f
-
C:\Users\Admin\AppData\Local\Temp\cuezfnvnbiuccvwnbnfokMD5
789064d8c49c486f874b6efae420cc61
SHA124aeacf5398df3acac56cbeb50980cc23ade6028
SHA25601ed0cd7f645777ed9307bc566656bf459a9daa0e00311dedfd514889aec5bf3
SHA5129859fb64ca0565af253af0cdb49b63b759a38d6d988462cc4c2b2ca11d53680ed082aa8df29fce360e483d092d22d472e61085ea809056af682f09ea69b8b863
-
C:\Users\Admin\Sugaryse\benzinforh.exeMD5
43927d58e211d5a2d2670bf46b1d9884
SHA189dba75b13a506ee5042b5636c06555baf85050c
SHA256a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835
SHA51212982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521
-
C:\Users\Admin\Sugaryse\benzinforh.exeMD5
43927d58e211d5a2d2670bf46b1d9884
SHA189dba75b13a506ee5042b5636c06555baf85050c
SHA256a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835
SHA51212982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521
-
C:\Users\Admin\Sugaryse\benzinforh.exeMD5
43927d58e211d5a2d2670bf46b1d9884
SHA189dba75b13a506ee5042b5636c06555baf85050c
SHA256a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835
SHA51212982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521
-
C:\Users\Admin\Sugaryse\benzinforh.exeMD5
43927d58e211d5a2d2670bf46b1d9884
SHA189dba75b13a506ee5042b5636c06555baf85050c
SHA256a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835
SHA51212982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521
-
C:\Users\Admin\Sugaryse\benzinforh.exeMD5
43927d58e211d5a2d2670bf46b1d9884
SHA189dba75b13a506ee5042b5636c06555baf85050c
SHA256a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835
SHA51212982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521
-
C:\Users\Admin\Sugaryse\benzinforh.exeMD5
43927d58e211d5a2d2670bf46b1d9884
SHA189dba75b13a506ee5042b5636c06555baf85050c
SHA256a6cc856405546af76f769ae3148e782571675af436ae9701c17d081266d6c835
SHA51212982c56cf7b9864b60829336b4c33a1caee4061fccf434fa9809f71b3259c3823cb6786656d639bc0fabe0a683793df4a6ba34d9f35b47801688b3f28bb5521
-
C:\Users\Admin\Sugaryse\benzinforh.vbsMD5
b2f77fbcd220c98436c0c42b0d0fb01f
SHA13f3b0cd67cae27cad373ca5af477e0ab00d11515
SHA2566457cced6b0101ae70e6c281ee5813578a30486a61433c03df3fac9d2ca681de
SHA512510a2743bcf216196f19813daaf85257686202a912426f30cad0a3459a75949d810016e25187a07abe345836c6c2eab849d46333e0d948952f3686a8b2d561c0
-
C:\Users\Admin\Sugaryse\benzinforh.vbsMD5
b2f77fbcd220c98436c0c42b0d0fb01f
SHA13f3b0cd67cae27cad373ca5af477e0ab00d11515
SHA2566457cced6b0101ae70e6c281ee5813578a30486a61433c03df3fac9d2ca681de
SHA512510a2743bcf216196f19813daaf85257686202a912426f30cad0a3459a75949d810016e25187a07abe345836c6c2eab849d46333e0d948952f3686a8b2d561c0
-
C:\Users\Admin\Sugaryse\benzinforh.vbsMD5
b2f77fbcd220c98436c0c42b0d0fb01f
SHA13f3b0cd67cae27cad373ca5af477e0ab00d11515
SHA2566457cced6b0101ae70e6c281ee5813578a30486a61433c03df3fac9d2ca681de
SHA512510a2743bcf216196f19813daaf85257686202a912426f30cad0a3459a75949d810016e25187a07abe345836c6c2eab849d46333e0d948952f3686a8b2d561c0
-
C:\Users\Admin\Sugaryse\benzinforh.vbsMD5
b2f77fbcd220c98436c0c42b0d0fb01f
SHA13f3b0cd67cae27cad373ca5af477e0ab00d11515
SHA2566457cced6b0101ae70e6c281ee5813578a30486a61433c03df3fac9d2ca681de
SHA512510a2743bcf216196f19813daaf85257686202a912426f30cad0a3459a75949d810016e25187a07abe345836c6c2eab849d46333e0d948952f3686a8b2d561c0
-
C:\Users\Admin\Sugaryse\dwn.exeMD5
daeefcc7e346e447891d46b6611aa5be
SHA19dfc5d1e7f5276eb125a2d551ff1738ffd61802d
SHA25614591bdae3b5e9cf9988efa782bf96425851dad41c83d4644732b73e02d8d3b1
SHA5125cf5ecd8282d0c3e4b584bb1e695a344180d9c9c05613c1f47b51bfc16fdd15461bfbe28869cd8a1b49ab81a0e142a0dda27d8197fcaad640c9d5f9575788565
-
C:\Users\Admin\Sugaryse\dwn.exeMD5
daeefcc7e346e447891d46b6611aa5be
SHA19dfc5d1e7f5276eb125a2d551ff1738ffd61802d
SHA25614591bdae3b5e9cf9988efa782bf96425851dad41c83d4644732b73e02d8d3b1
SHA5125cf5ecd8282d0c3e4b584bb1e695a344180d9c9c05613c1f47b51bfc16fdd15461bfbe28869cd8a1b49ab81a0e142a0dda27d8197fcaad640c9d5f9575788565
-
C:\Users\Admin\Sugaryse\dwn.exeMD5
daeefcc7e346e447891d46b6611aa5be
SHA19dfc5d1e7f5276eb125a2d551ff1738ffd61802d
SHA25614591bdae3b5e9cf9988efa782bf96425851dad41c83d4644732b73e02d8d3b1
SHA5125cf5ecd8282d0c3e4b584bb1e695a344180d9c9c05613c1f47b51bfc16fdd15461bfbe28869cd8a1b49ab81a0e142a0dda27d8197fcaad640c9d5f9575788565
-
memory/2088-21-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2088-18-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2088-26-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2644-7-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/3760-25-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3760-24-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3760-20-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4020-16-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/4020-22-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB