Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2023 07:16

General

  • Target

    b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe

  • Size

    3.3MB

  • MD5

    031e2e05add303f0e8adbca3be022151

  • SHA1

    719acfd7047f5a2003ed1386b97ed5e2868d09d2

  • SHA256

    b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f

  • SHA512

    86b5466b716bddceb1b6ef482f1683f248e8120100d8e529178a21d4542337d3b4c9362bb4fbbf90c2759d8413f3e2ca2112a20e32dccd44bce07bb9c3388536

  • SSDEEP

    49152:By408wwmrOYMMJNBzgz15u+djZSHc2E2Y8csb6Aged9XJUOHUr+RmE:ayoDz+15VzSHc2EJ8cc3xtoKU

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe
    "C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1348
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Ifdtktlacord_certificate_of_insurance.pdf"
      2⤵
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=203EE91E8EB11468B3874266C7DC1180 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
          4⤵
            PID:2948
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CA130EA71C57C1423745298E56C6A906 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CA130EA71C57C1423745298E56C6A906 --renderer-client-id=2 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job /prefetch:1
            4⤵
              PID:388
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FC9BFE89F1F293F673BFDD3F3D75EDA7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FC9BFE89F1F293F673BFDD3F3D75EDA7 --renderer-client-id=4 --mojo-platform-channel-handle=2144 --allow-no-sandbox-job /prefetch:1
              4⤵
                PID:2820
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DCA0B555684A0ABFFE9905DC5CDA8C06 --mojo-platform-channel-handle=2668 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                4⤵
                  PID:216
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B33A7C25287B5F6521F928A7DB312C0F --mojo-platform-channel-handle=2836 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  4⤵
                    PID:3960
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3CEB9AB60CE897829DBDBACCA99E2C68 --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    4⤵
                      PID:552
                • C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe
                  C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4220
                  • C:\Windows\explorer.exe
                    "C:\Windows\explorer.exe"
                    3⤵
                    • Modifies Installed Components in the registry
                    • Enumerates connected drives
                    • Checks SCSI registry key(s)
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:60
                  • C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe
                    "C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe"
                    3⤵
                    • Checks computer location settings
                    • Adds Run key to start application
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4612
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1224
                    • C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe
                      C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:552
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'stubnet';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'stubnet' -Value '"C:\Users\Admin\AppData\Local\Temp\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe"' -PropertyType 'String'
                        5⤵
                        • Adds Run key to start application
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3312
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
                1⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2316
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:3904
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                • Enumerates system info in registry
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:4344

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              Registry Run Keys / Startup Folder

              2
              T1060

              Defense Evasion

              Modify Registry

              3
              T1112

              Discovery

              Query Registry

              5
              T1012

              System Information Discovery

              6
              T1082

              Peripheral Device Discovery

              2
              T1120

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f.exe.log
                Filesize

                1KB

                MD5

                a713c363be116d5ed1f971db6a657e4f

                SHA1

                90791863564c9ed38e7b4f047022dec4474060a1

                SHA256

                4b5c446ec8ed2a2696ba00a0890763d413006ce1ea1a7a32fda1655720aef46e

                SHA512

                5dc740414a6ec30908e924f3bdfae2f761a35a476ef2dda239b789575a0a3696169deb6dc84a14d5828eaa5644623f107b2c686bfa4f54a90f0688239b4b1739

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                Filesize

                1KB

                MD5

                4280e36a29fa31c01e4d8b2ba726a0d8

                SHA1

                c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                SHA256

                e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                SHA512

                494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                Filesize

                53KB

                MD5

                06ad34f9739c5159b4d92d702545bd49

                SHA1

                9152a0d4f153f3f40f7e606be75f81b582ee0c17

                SHA256

                474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                SHA512

                c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                Filesize

                16KB

                MD5

                f30b05d5cf0ed752992c56f13aa9f762

                SHA1

                f63700e7ec55df516f88de490661571afc035091

                SHA256

                eaef2b9ffee30a40550883190d284a0f70c1ca0bd896cdafcbe0af5219ab438b

                SHA512

                3f510375853daebe157851057a627ef49186456c95e898daf8122516a41d9c950d59ad3bdd02ab0326fd335d5a6bcfa4d1811f4b287aae860cfe1f1be0e7d905

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                Filesize

                15KB

                MD5

                3b534119f06a41afef1caca0b9521f61

                SHA1

                3df6f092ea55d8abd68a0ed320de0cb3a30ef5ac

                SHA256

                870fc20758abda90cd1314af838314f485a00d10870c8dd40e7c72f7b7dcdb7a

                SHA512

                7c7d4e3b25b7272b46b07313e1d3cc054595f3ffb0b944ac68b011a301a75115db186fd7b4a282e97a2c8f9d94d5c5c967f93bc5e8a957a43a2f162b16b9d290

              • C:\Users\Admin\AppData\Local\Temp\Ifdtktlacord_certificate_of_insurance.pdf
                Filesize

                102KB

                MD5

                261fa374ef694300b6bb6aa3d27ccb34

                SHA1

                cc931c06a52082b031d03ea8c517f69d3bdf0e13

                SHA256

                5921d7a39219dac7bb469d80c4d3932e457a5a17249155c389c1ef47d9d8e452

                SHA512

                807914c336c784668291b82a36e747b2945afd15e5bec77864f9aa61efbd3f65f63901e655cf43c1f84f15fed60422adc8c3f425d1dfdff4d6541fb8f9ec2001

              • C:\Users\Admin\AppData\Roaming\Jqgnazw\Sdbhybed.exe
                MD5

                d41d8cd98f00b204e9800998ecf8427e

                SHA1

                da39a3ee5e6b4b0d3255bfef95601890afd80709

                SHA256

                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                SHA512

                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

              • memory/60-148-0x0000000000000000-mapping.dmp
              • memory/216-166-0x0000000000000000-mapping.dmp
              • memory/388-154-0x0000000000000000-mapping.dmp
              • memory/552-217-0x0000000006350000-0x000000000635A000-memory.dmp
                Filesize

                40KB

              • memory/552-214-0x0000000000000000-mapping.dmp
              • memory/552-188-0x0000000000000000-mapping.dmp
              • memory/1224-168-0x0000000000000000-mapping.dmp
              • memory/1348-139-0x0000000005E40000-0x0000000005E5E000-memory.dmp
                Filesize

                120KB

              • memory/1348-136-0x0000000004F70000-0x0000000005598000-memory.dmp
                Filesize

                6.2MB

              • memory/1348-134-0x0000000000000000-mapping.dmp
              • memory/1348-141-0x0000000006330000-0x000000000634A000-memory.dmp
                Filesize

                104KB

              • memory/1348-135-0x0000000002860000-0x0000000002896000-memory.dmp
                Filesize

                216KB

              • memory/1348-140-0x00000000076D0000-0x0000000007D4A000-memory.dmp
                Filesize

                6.5MB

              • memory/1348-138-0x00000000057B0000-0x0000000005816000-memory.dmp
                Filesize

                408KB

              • memory/1348-137-0x0000000005740000-0x00000000057A6000-memory.dmp
                Filesize

                408KB

              • memory/2632-133-0x0000000005D40000-0x0000000005D62000-memory.dmp
                Filesize

                136KB

              • memory/2632-132-0x0000000000BA0000-0x0000000000EE6000-memory.dmp
                Filesize

                3.3MB

              • memory/2820-159-0x0000000000000000-mapping.dmp
              • memory/2948-151-0x0000000000000000-mapping.dmp
              • memory/3312-216-0x0000000000000000-mapping.dmp
              • memory/3312-220-0x0000000007130000-0x0000000007152000-memory.dmp
                Filesize

                136KB

              • memory/3312-219-0x00000000071A0000-0x0000000007236000-memory.dmp
                Filesize

                600KB

              • memory/3960-185-0x0000000000000000-mapping.dmp
              • memory/4220-144-0x0000000000400000-0x00000000004C6000-memory.dmp
                Filesize

                792KB

              • memory/4220-163-0x0000000006610000-0x0000000006BB4000-memory.dmp
                Filesize

                5.6MB

              • memory/4220-143-0x0000000000000000-mapping.dmp
              • memory/4220-146-0x0000000005610000-0x00000000056A2000-memory.dmp
                Filesize

                584KB

              • memory/4344-206-0x00000181871B8000-0x00000181871C0000-memory.dmp
                Filesize

                32KB

              • memory/4344-209-0x000001818AF6E000-0x000001818AF72000-memory.dmp
                Filesize

                16KB

              • memory/4344-196-0x000001818AF52000-0x000001818AF56000-memory.dmp
                Filesize

                16KB

              • memory/4344-197-0x000001818AF52000-0x000001818AF56000-memory.dmp
                Filesize

                16KB

              • memory/4344-198-0x000001818AF52000-0x000001818AF56000-memory.dmp
                Filesize

                16KB

              • memory/4344-199-0x000001818AF52000-0x000001818AF56000-memory.dmp
                Filesize

                16KB

              • memory/4344-202-0x000001818AF60000-0x000001818AF63000-memory.dmp
                Filesize

                12KB

              • memory/4344-203-0x000001818AF60000-0x000001818AF63000-memory.dmp
                Filesize

                12KB

              • memory/4344-204-0x000001818AF60000-0x000001818AF63000-memory.dmp
                Filesize

                12KB

              • memory/4344-192-0x000001818AF4F000-0x000001818AF52000-memory.dmp
                Filesize

                12KB

              • memory/4344-208-0x000001818AF6E000-0x000001818AF72000-memory.dmp
                Filesize

                16KB

              • memory/4344-195-0x000001818AF52000-0x000001818AF56000-memory.dmp
                Filesize

                16KB

              • memory/4344-210-0x000001818AF6E000-0x000001818AF72000-memory.dmp
                Filesize

                16KB

              • memory/4344-211-0x000001818AF6E000-0x000001818AF72000-memory.dmp
                Filesize

                16KB

              • memory/4344-178-0x0000018189C80000-0x0000018189CA0000-memory.dmp
                Filesize

                128KB

              • memory/4344-193-0x000001818AF4F000-0x000001818AF52000-memory.dmp
                Filesize

                12KB

              • memory/4344-190-0x000001818AF4F000-0x000001818AF52000-memory.dmp
                Filesize

                12KB

              • memory/4344-191-0x000001818AF4F000-0x000001818AF52000-memory.dmp
                Filesize

                12KB

              • memory/4612-164-0x0000000000000000-mapping.dmp
              • memory/4692-142-0x0000000000000000-mapping.dmp
              • memory/4700-149-0x0000000000000000-mapping.dmp