Analysis

  • max time kernel
    207s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 12:37

General

  • Target

    6254862dc894eac6f4e63bbe66a811e44ec7ed0b7fb0b3ce7bf35af78dc81dee.exe

  • Size

    72KB

  • MD5

    05a2b64905f2180553141b1a6ed00651

  • SHA1

    940f5b7ce35b8cbe029d5771659d10f8f180bdc4

  • SHA256

    6254862dc894eac6f4e63bbe66a811e44ec7ed0b7fb0b3ce7bf35af78dc81dee

  • SHA512

    b3715adc5f8c74f326881d0055442f0aff5305f85fb6977a589de6f094644d9f667a67f1a0a6b637324e1e913cdd1cda925d120f3498881b940cea80bbdc1315

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2U:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrY

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 43 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in Program Files directory 49 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6254862dc894eac6f4e63bbe66a811e44ec7ed0b7fb0b3ce7bf35af78dc81dee.exe
    "C:\Users\Admin\AppData\Local\Temp\6254862dc894eac6f4e63bbe66a811e44ec7ed0b7fb0b3ce7bf35af78dc81dee.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\3162902699\backup.exe
      C:\Users\Admin\AppData\Local\Temp\3162902699\backup.exe C:\Users\Admin\AppData\Local\Temp\3162902699\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1280
      • C:\backup.exe
        \backup.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1668
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1740
          • C:\PerfLogs\Admin\backup.exe
            C:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1220
        • C:\Program Files\update.exe
          "C:\Program Files\update.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1652
          • C:\Program Files\7-Zip\backup.exe
            "C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1228
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1284
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:2012
            • C:\Program Files\Common Files\Microsoft Shared\backup.exe
              "C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1288
              • C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:788
              • C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1868
                • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1752
                • C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1360
                • C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:964
                • C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1560
                • C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:556
                • C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1792
                • C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1564
                • C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:664
                • C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\update.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\
                  8⤵
                  • Executes dropped EXE
                  PID:1488
                • C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\
                  8⤵
                    PID:1356
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:648
                • C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1736
                • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\
                  7⤵
                    PID:1636
                • C:\Program Files\Common Files\Services\backup.exe
                  "C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1216
                • C:\Program Files\Common Files\SpeechEngines\backup.exe
                  "C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\
                  6⤵
                  • Executes dropped EXE
                  PID:288
                • C:\Program Files\Common Files\System\backup.exe
                  "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
                  6⤵
                  • Executes dropped EXE
                  PID:1588
              • C:\Program Files\DVD Maker\backup.exe
                "C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1468
              • C:\Program Files\Google\backup.exe
                "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
                5⤵
                • Executes dropped EXE
                PID:1664
              • C:\Program Files\Internet Explorer\backup.exe
                "C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\
                5⤵
                • Executes dropped EXE
                PID:1688
              • C:\Program Files\Java\backup.exe
                "C:\Program Files\Java\backup.exe" C:\Program Files\Java\
                5⤵
                  PID:1360
              • C:\Program Files (x86)\data.exe
                "C:\Program Files (x86)\data.exe" C:\Program Files (x86)\
                4⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1112
                • C:\Program Files (x86)\Adobe\backup.exe
                  "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
                  5⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1464
                  • C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe
                    "C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\
                    6⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    • Suspicious use of SetWindowsHookEx
                    PID:1948
                    • C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe
                      "C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\
                      7⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:1596
                    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe
                      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\
                      7⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      • Executes dropped EXE
                      • Drops file in Program Files directory
                      • Suspicious use of SetWindowsHookEx
                      • System policy modification
                      PID:896
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\
                        8⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:884
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\
                        8⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1124
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\
                        8⤵
                        • Modifies visibility of file extensions in Explorer
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1644
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\
                        8⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1928
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\
                          9⤵
                          • Modifies visibility of file extensions in Explorer
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:1944
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\
                        8⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1156
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\
                        8⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • System policy modification
                        PID:1484
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\
                          9⤵
                          • Suspicious use of SetWindowsHookEx
                          PID:1916
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1692
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\
                        8⤵
                          PID:1744
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1108
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\
                        7⤵
                        • Executes dropped EXE
                        PID:1044
                  • C:\Program Files (x86)\Common Files\backup.exe
                    "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
                    5⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:2016
                  • C:\Program Files (x86)\Google\backup.exe
                    "C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1784
                  • C:\Program Files (x86)\Internet Explorer\backup.exe
                    "C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:512
                  • C:\Program Files (x86)\Microsoft Analysis Services\backup.exe
                    "C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\
                    5⤵
                      PID:1960
                  • C:\Users\backup.exe
                    C:\Users\backup.exe C:\Users\
                    4⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:1380
                    • C:\Users\Admin\backup.exe
                      C:\Users\Admin\backup.exe C:\Users\Admin\
                      5⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      • System policy modification
                      PID:820
                      • C:\Users\Admin\Contacts\backup.exe
                        C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
                        6⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1208
                      • C:\Users\Admin\Desktop\backup.exe
                        C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
                        6⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1192
                      • C:\Users\Admin\Documents\backup.exe
                        C:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\
                        6⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1728
                      • C:\Users\Admin\Downloads\data.exe
                        C:\Users\Admin\Downloads\data.exe C:\Users\Admin\Downloads\
                        6⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1200
                      • C:\Users\Admin\Favorites\backup.exe
                        C:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1064
                      • C:\Users\Admin\Links\backup.exe
                        C:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1412
                      • C:\Users\Admin\Music\backup.exe
                        C:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\
                        6⤵
                        • Executes dropped EXE
                        PID:2028
                      • C:\Users\Admin\Pictures\backup.exe
                        C:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\
                        6⤵
                        • Executes dropped EXE
                        PID:1552
                    • C:\Users\Public\backup.exe
                      C:\Users\Public\backup.exe C:\Users\Public\
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2040
                  • C:\Windows\update.exe
                    C:\Windows\update.exe C:\Windows\
                    4⤵
                    • Executes dropped EXE
                    PID:788
              • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
                C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
                2⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:2000
              • C:\Users\Admin\AppData\Local\Temp\Low\update.exe
                C:\Users\Admin\AppData\Local\Temp\Low\update.exe C:\Users\Admin\AppData\Local\Temp\Low\
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1940
              • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
                "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
                2⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1756
              • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
                "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
                2⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:820
              • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
                C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
                2⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1960
              • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe
                C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\
                2⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1736

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\PerfLogs\Admin\backup.exe

              Filesize

              72KB

              MD5

              a8761f45a4daf3d9c18b36b1675ee431

              SHA1

              0493b3f6c322514e1b48429c47391c104e08ca6a

              SHA256

              02dd4fbc9193e44ffcd60e95e30786624cb8358363e2d47d0d20b5c0c1c5752c

              SHA512

              145fa47fa51dc87a56e4ea8835b6bc8d30ee1562c59a72ecd7594197ad03f872114eb0cdaad06b9addf2d2c02da1e8f19069ab5d53ad5f83dbb70641a36ee2b2

            • C:\PerfLogs\backup.exe

              Filesize

              72KB

              MD5

              aa0b89e3c880c2d58b548782495abe03

              SHA1

              2bb15645fece6d3d97cff7cde7332043920634b7

              SHA256

              842265cd14f275293143c8187fb0615e1dcd70914bc05ecc0b68835be4c03d06

              SHA512

              7ed6410150caa3ed2e88fb9979055433bb578bfa673a7bf671c85686af96102b0c3b1ec0d6812b4e3ccc8029175c40c192c59ef50b34c5fe76ccebba26ecb881

            • C:\PerfLogs\backup.exe

              Filesize

              72KB

              MD5

              aa0b89e3c880c2d58b548782495abe03

              SHA1

              2bb15645fece6d3d97cff7cde7332043920634b7

              SHA256

              842265cd14f275293143c8187fb0615e1dcd70914bc05ecc0b68835be4c03d06

              SHA512

              7ed6410150caa3ed2e88fb9979055433bb578bfa673a7bf671c85686af96102b0c3b1ec0d6812b4e3ccc8029175c40c192c59ef50b34c5fe76ccebba26ecb881

            • C:\Program Files (x86)\Adobe\backup.exe

              Filesize

              72KB

              MD5

              c16f4961a3778029b735ee7dd0b2cbe3

              SHA1

              9d088eb9391d1b9171822b253c280cc78c677dcb

              SHA256

              8e78cab3581e50045c526ab52d9c42b43d0fb573bd942d8895f254b679d9fae3

              SHA512

              b2eea20ad559296d1248e0696ac2d76b6c43cfa1aa64aac9940e255c7c2c1cecad365a10f26956963d63c1de1987bc6c716c5e72af2eec2cc5e36290219fc8fb

            • C:\Program Files (x86)\Adobe\backup.exe

              Filesize

              72KB

              MD5

              c16f4961a3778029b735ee7dd0b2cbe3

              SHA1

              9d088eb9391d1b9171822b253c280cc78c677dcb

              SHA256

              8e78cab3581e50045c526ab52d9c42b43d0fb573bd942d8895f254b679d9fae3

              SHA512

              b2eea20ad559296d1248e0696ac2d76b6c43cfa1aa64aac9940e255c7c2c1cecad365a10f26956963d63c1de1987bc6c716c5e72af2eec2cc5e36290219fc8fb

            • C:\Program Files (x86)\data.exe

              Filesize

              72KB

              MD5

              8fd78f2770784bb788c1c3b425fc9439

              SHA1

              1b464fb70a5fddfd1b36be3d88a1a745ff46366d

              SHA256

              1d269d124e764a7f7384a189678a4e8be8f488b7eb73bcd07bfbc3c2d796a60e

              SHA512

              c0fc2549b3966d4024730257d474a07e3a2e2fc2f88f37be9b425a7f6ff9de0cc058b799dedf31ef5b398407035f487f709c1b85cf9b49fbde218c0ddde2f10e

            • C:\Program Files (x86)\data.exe

              Filesize

              72KB

              MD5

              8fd78f2770784bb788c1c3b425fc9439

              SHA1

              1b464fb70a5fddfd1b36be3d88a1a745ff46366d

              SHA256

              1d269d124e764a7f7384a189678a4e8be8f488b7eb73bcd07bfbc3c2d796a60e

              SHA512

              c0fc2549b3966d4024730257d474a07e3a2e2fc2f88f37be9b425a7f6ff9de0cc058b799dedf31ef5b398407035f487f709c1b85cf9b49fbde218c0ddde2f10e

            • C:\Program Files\7-Zip\Lang\backup.exe

              Filesize

              72KB

              MD5

              32632d75b465084c7c0f7b6a768a87d5

              SHA1

              442d63197f0652e4188aa02651d1cdfcc77f401f

              SHA256

              3bda2ffc26ef75e038e9e9622c2e59ecf86f2fd48f88c061ecce6101ce336f12

              SHA512

              a779423d53d8f4bbf90e3d3d15d388e3b9ab50142cc6e03bffc283cff1cf90584cfc3c26ff85be59e6ceeeeefd169ba17381b3c0507e1b7d126ab87781a243bf

            • C:\Program Files\7-Zip\Lang\backup.exe

              Filesize

              72KB

              MD5

              32632d75b465084c7c0f7b6a768a87d5

              SHA1

              442d63197f0652e4188aa02651d1cdfcc77f401f

              SHA256

              3bda2ffc26ef75e038e9e9622c2e59ecf86f2fd48f88c061ecce6101ce336f12

              SHA512

              a779423d53d8f4bbf90e3d3d15d388e3b9ab50142cc6e03bffc283cff1cf90584cfc3c26ff85be59e6ceeeeefd169ba17381b3c0507e1b7d126ab87781a243bf

            • C:\Program Files\7-Zip\backup.exe

              Filesize

              72KB

              MD5

              95270b08567336b7a5af5a08d71d520f

              SHA1

              02bff242018693a36c1ea08c3c059d2216307a97

              SHA256

              d713a722afffc3385c7209bb019effef2a094ca3fbd43ff19e93138ce7cb9fac

              SHA512

              ce8dd72655e4f170caeae52e55dae5d2fe95013c03b947a94fbd9e3bcf13dd21897212a9a90bc7dc69e7559d58f163775ef924294212896ae4ed0dd9b3ad8903

            • C:\Program Files\7-Zip\backup.exe

              Filesize

              72KB

              MD5

              95270b08567336b7a5af5a08d71d520f

              SHA1

              02bff242018693a36c1ea08c3c059d2216307a97

              SHA256

              d713a722afffc3385c7209bb019effef2a094ca3fbd43ff19e93138ce7cb9fac

              SHA512

              ce8dd72655e4f170caeae52e55dae5d2fe95013c03b947a94fbd9e3bcf13dd21897212a9a90bc7dc69e7559d58f163775ef924294212896ae4ed0dd9b3ad8903

            • C:\Program Files\update.exe

              Filesize

              72KB

              MD5

              41e1f53f6c10891fde82c998eccbc7c4

              SHA1

              d55750a37a10d0c00840d849540709e1a8b1ce06

              SHA256

              6b213ead1b5340b34ef89dfce70edfe00d5867dff5b2186637c63d3340696821

              SHA512

              dfea1ecd916ced1a4a6f0d5563d259de4629ce4dcee17144f83a9301166dd98f71b19a9886185c00f71efcf151bb6059c8a86e0d275e860c0a27c7b2f91ad948

            • C:\Program Files\update.exe

              Filesize

              72KB

              MD5

              41e1f53f6c10891fde82c998eccbc7c4

              SHA1

              d55750a37a10d0c00840d849540709e1a8b1ce06

              SHA256

              6b213ead1b5340b34ef89dfce70edfe00d5867dff5b2186637c63d3340696821

              SHA512

              dfea1ecd916ced1a4a6f0d5563d259de4629ce4dcee17144f83a9301166dd98f71b19a9886185c00f71efcf151bb6059c8a86e0d275e860c0a27c7b2f91ad948

            • C:\Users\Admin\AppData\Local\Temp\3162902699\backup.exe

              Filesize

              72KB

              MD5

              1af3fef4719a012a19c339e697ebf93c

              SHA1

              ea8e86fa591ea3c99a25b06af7b0ef07ffc22cf3

              SHA256

              8340b3b85d3ed4995175745461207ece83bdaeb09a6d55f6a874cacbef69ef01

              SHA512

              8b6640bf84ec5a6e308851bc55167546cff59860b2e2d20f892cdb28e52bf7754c88c0be6a6c6fa8a9c068f7e3d914b9efd89831f0c2db95cc08b326981127b6

            • C:\Users\Admin\AppData\Local\Temp\3162902699\backup.exe

              Filesize

              72KB

              MD5

              1af3fef4719a012a19c339e697ebf93c

              SHA1

              ea8e86fa591ea3c99a25b06af7b0ef07ffc22cf3

              SHA256

              8340b3b85d3ed4995175745461207ece83bdaeb09a6d55f6a874cacbef69ef01

              SHA512

              8b6640bf84ec5a6e308851bc55167546cff59860b2e2d20f892cdb28e52bf7754c88c0be6a6c6fa8a9c068f7e3d914b9efd89831f0c2db95cc08b326981127b6

            • C:\Users\Admin\AppData\Local\Temp\Low\update.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • C:\Users\Admin\AppData\Local\Temp\Low\update.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

              Filesize

              72KB

              MD5

              150ddc0fbb0b78a511cafc480d27092a

              SHA1

              fda90f009e6a4d4f444e885ecd907289c534e9a5

              SHA256

              e52bb5059bf7200dbd69b80a886dff61aaab2491c18d371716d65aea5c5da154

              SHA512

              21cb5bf9fe30c2de3227461d46a6926fd48533b74e10ce6d3b530d804db119f104297b5d4cacb3d193243714e8d4769d0db0a5c9d164ead1de90032cd98ccddc

            • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

              Filesize

              72KB

              MD5

              22f578862816d26dd5cfe8dc2f2b7064

              SHA1

              dd48e187af681d350ce79af53acacd9cb235462a

              SHA256

              7dff94f0806a15325250f894e316825fdf6aae68950ab7a82757ed02d06d63f4

              SHA512

              faf59ee53b46d93d775a2b2eb827326e3515687adb3dcf9da69d995a4e6dfaad3979af8a712c79e1e0fb779bc349086b8c49ffcb2b90a20af12c3c422845dd2a

            • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

              Filesize

              72KB

              MD5

              1af3fef4719a012a19c339e697ebf93c

              SHA1

              ea8e86fa591ea3c99a25b06af7b0ef07ffc22cf3

              SHA256

              8340b3b85d3ed4995175745461207ece83bdaeb09a6d55f6a874cacbef69ef01

              SHA512

              8b6640bf84ec5a6e308851bc55167546cff59860b2e2d20f892cdb28e52bf7754c88c0be6a6c6fa8a9c068f7e3d914b9efd89831f0c2db95cc08b326981127b6

            • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

              Filesize

              72KB

              MD5

              150ddc0fbb0b78a511cafc480d27092a

              SHA1

              fda90f009e6a4d4f444e885ecd907289c534e9a5

              SHA256

              e52bb5059bf7200dbd69b80a886dff61aaab2491c18d371716d65aea5c5da154

              SHA512

              21cb5bf9fe30c2de3227461d46a6926fd48533b74e10ce6d3b530d804db119f104297b5d4cacb3d193243714e8d4769d0db0a5c9d164ead1de90032cd98ccddc

            • C:\backup.exe

              Filesize

              72KB

              MD5

              23cea8279a5816786b621ac684a14727

              SHA1

              898409a550451a45240c9b083bd0cb1302f00f19

              SHA256

              d294eddd0978503ab08ce8efba96c040bf26213ae874d77a46701cd824d09664

              SHA512

              ca145e84c5120c32771fa29a77caa33dcb9e9d1aafa4f8d0f408ea70f642c6d2eb86b1990a7d02ce31fe34694c837571d87836c7d90aeda2fe0ef4ee45fa4806

            • C:\backup.exe

              Filesize

              72KB

              MD5

              23cea8279a5816786b621ac684a14727

              SHA1

              898409a550451a45240c9b083bd0cb1302f00f19

              SHA256

              d294eddd0978503ab08ce8efba96c040bf26213ae874d77a46701cd824d09664

              SHA512

              ca145e84c5120c32771fa29a77caa33dcb9e9d1aafa4f8d0f408ea70f642c6d2eb86b1990a7d02ce31fe34694c837571d87836c7d90aeda2fe0ef4ee45fa4806

            • \PerfLogs\Admin\backup.exe

              Filesize

              72KB

              MD5

              a8761f45a4daf3d9c18b36b1675ee431

              SHA1

              0493b3f6c322514e1b48429c47391c104e08ca6a

              SHA256

              02dd4fbc9193e44ffcd60e95e30786624cb8358363e2d47d0d20b5c0c1c5752c

              SHA512

              145fa47fa51dc87a56e4ea8835b6bc8d30ee1562c59a72ecd7594197ad03f872114eb0cdaad06b9addf2d2c02da1e8f19069ab5d53ad5f83dbb70641a36ee2b2

            • \PerfLogs\Admin\backup.exe

              Filesize

              72KB

              MD5

              a8761f45a4daf3d9c18b36b1675ee431

              SHA1

              0493b3f6c322514e1b48429c47391c104e08ca6a

              SHA256

              02dd4fbc9193e44ffcd60e95e30786624cb8358363e2d47d0d20b5c0c1c5752c

              SHA512

              145fa47fa51dc87a56e4ea8835b6bc8d30ee1562c59a72ecd7594197ad03f872114eb0cdaad06b9addf2d2c02da1e8f19069ab5d53ad5f83dbb70641a36ee2b2

            • \PerfLogs\backup.exe

              Filesize

              72KB

              MD5

              aa0b89e3c880c2d58b548782495abe03

              SHA1

              2bb15645fece6d3d97cff7cde7332043920634b7

              SHA256

              842265cd14f275293143c8187fb0615e1dcd70914bc05ecc0b68835be4c03d06

              SHA512

              7ed6410150caa3ed2e88fb9979055433bb578bfa673a7bf671c85686af96102b0c3b1ec0d6812b4e3ccc8029175c40c192c59ef50b34c5fe76ccebba26ecb881

            • \PerfLogs\backup.exe

              Filesize

              72KB

              MD5

              aa0b89e3c880c2d58b548782495abe03

              SHA1

              2bb15645fece6d3d97cff7cde7332043920634b7

              SHA256

              842265cd14f275293143c8187fb0615e1dcd70914bc05ecc0b68835be4c03d06

              SHA512

              7ed6410150caa3ed2e88fb9979055433bb578bfa673a7bf671c85686af96102b0c3b1ec0d6812b4e3ccc8029175c40c192c59ef50b34c5fe76ccebba26ecb881

            • \Program Files (x86)\Adobe\backup.exe

              Filesize

              72KB

              MD5

              c16f4961a3778029b735ee7dd0b2cbe3

              SHA1

              9d088eb9391d1b9171822b253c280cc78c677dcb

              SHA256

              8e78cab3581e50045c526ab52d9c42b43d0fb573bd942d8895f254b679d9fae3

              SHA512

              b2eea20ad559296d1248e0696ac2d76b6c43cfa1aa64aac9940e255c7c2c1cecad365a10f26956963d63c1de1987bc6c716c5e72af2eec2cc5e36290219fc8fb

            • \Program Files (x86)\Adobe\backup.exe

              Filesize

              72KB

              MD5

              c16f4961a3778029b735ee7dd0b2cbe3

              SHA1

              9d088eb9391d1b9171822b253c280cc78c677dcb

              SHA256

              8e78cab3581e50045c526ab52d9c42b43d0fb573bd942d8895f254b679d9fae3

              SHA512

              b2eea20ad559296d1248e0696ac2d76b6c43cfa1aa64aac9940e255c7c2c1cecad365a10f26956963d63c1de1987bc6c716c5e72af2eec2cc5e36290219fc8fb

            • \Program Files (x86)\data.exe

              Filesize

              72KB

              MD5

              8fd78f2770784bb788c1c3b425fc9439

              SHA1

              1b464fb70a5fddfd1b36be3d88a1a745ff46366d

              SHA256

              1d269d124e764a7f7384a189678a4e8be8f488b7eb73bcd07bfbc3c2d796a60e

              SHA512

              c0fc2549b3966d4024730257d474a07e3a2e2fc2f88f37be9b425a7f6ff9de0cc058b799dedf31ef5b398407035f487f709c1b85cf9b49fbde218c0ddde2f10e

            • \Program Files (x86)\data.exe

              Filesize

              72KB

              MD5

              8fd78f2770784bb788c1c3b425fc9439

              SHA1

              1b464fb70a5fddfd1b36be3d88a1a745ff46366d

              SHA256

              1d269d124e764a7f7384a189678a4e8be8f488b7eb73bcd07bfbc3c2d796a60e

              SHA512

              c0fc2549b3966d4024730257d474a07e3a2e2fc2f88f37be9b425a7f6ff9de0cc058b799dedf31ef5b398407035f487f709c1b85cf9b49fbde218c0ddde2f10e

            • \Program Files\7-Zip\Lang\backup.exe

              Filesize

              72KB

              MD5

              32632d75b465084c7c0f7b6a768a87d5

              SHA1

              442d63197f0652e4188aa02651d1cdfcc77f401f

              SHA256

              3bda2ffc26ef75e038e9e9622c2e59ecf86f2fd48f88c061ecce6101ce336f12

              SHA512

              a779423d53d8f4bbf90e3d3d15d388e3b9ab50142cc6e03bffc283cff1cf90584cfc3c26ff85be59e6ceeeeefd169ba17381b3c0507e1b7d126ab87781a243bf

            • \Program Files\7-Zip\Lang\backup.exe

              Filesize

              72KB

              MD5

              32632d75b465084c7c0f7b6a768a87d5

              SHA1

              442d63197f0652e4188aa02651d1cdfcc77f401f

              SHA256

              3bda2ffc26ef75e038e9e9622c2e59ecf86f2fd48f88c061ecce6101ce336f12

              SHA512

              a779423d53d8f4bbf90e3d3d15d388e3b9ab50142cc6e03bffc283cff1cf90584cfc3c26ff85be59e6ceeeeefd169ba17381b3c0507e1b7d126ab87781a243bf

            • \Program Files\7-Zip\Lang\backup.exe

              Filesize

              72KB

              MD5

              32632d75b465084c7c0f7b6a768a87d5

              SHA1

              442d63197f0652e4188aa02651d1cdfcc77f401f

              SHA256

              3bda2ffc26ef75e038e9e9622c2e59ecf86f2fd48f88c061ecce6101ce336f12

              SHA512

              a779423d53d8f4bbf90e3d3d15d388e3b9ab50142cc6e03bffc283cff1cf90584cfc3c26ff85be59e6ceeeeefd169ba17381b3c0507e1b7d126ab87781a243bf

            • \Program Files\7-Zip\Lang\backup.exe

              Filesize

              72KB

              MD5

              32632d75b465084c7c0f7b6a768a87d5

              SHA1

              442d63197f0652e4188aa02651d1cdfcc77f401f

              SHA256

              3bda2ffc26ef75e038e9e9622c2e59ecf86f2fd48f88c061ecce6101ce336f12

              SHA512

              a779423d53d8f4bbf90e3d3d15d388e3b9ab50142cc6e03bffc283cff1cf90584cfc3c26ff85be59e6ceeeeefd169ba17381b3c0507e1b7d126ab87781a243bf

            • \Program Files\7-Zip\Lang\backup.exe

              Filesize

              72KB

              MD5

              32632d75b465084c7c0f7b6a768a87d5

              SHA1

              442d63197f0652e4188aa02651d1cdfcc77f401f

              SHA256

              3bda2ffc26ef75e038e9e9622c2e59ecf86f2fd48f88c061ecce6101ce336f12

              SHA512

              a779423d53d8f4bbf90e3d3d15d388e3b9ab50142cc6e03bffc283cff1cf90584cfc3c26ff85be59e6ceeeeefd169ba17381b3c0507e1b7d126ab87781a243bf

            • \Program Files\7-Zip\backup.exe

              Filesize

              72KB

              MD5

              95270b08567336b7a5af5a08d71d520f

              SHA1

              02bff242018693a36c1ea08c3c059d2216307a97

              SHA256

              d713a722afffc3385c7209bb019effef2a094ca3fbd43ff19e93138ce7cb9fac

              SHA512

              ce8dd72655e4f170caeae52e55dae5d2fe95013c03b947a94fbd9e3bcf13dd21897212a9a90bc7dc69e7559d58f163775ef924294212896ae4ed0dd9b3ad8903

            • \Program Files\7-Zip\backup.exe

              Filesize

              72KB

              MD5

              95270b08567336b7a5af5a08d71d520f

              SHA1

              02bff242018693a36c1ea08c3c059d2216307a97

              SHA256

              d713a722afffc3385c7209bb019effef2a094ca3fbd43ff19e93138ce7cb9fac

              SHA512

              ce8dd72655e4f170caeae52e55dae5d2fe95013c03b947a94fbd9e3bcf13dd21897212a9a90bc7dc69e7559d58f163775ef924294212896ae4ed0dd9b3ad8903

            • \Program Files\7-Zip\backup.exe

              Filesize

              72KB

              MD5

              95270b08567336b7a5af5a08d71d520f

              SHA1

              02bff242018693a36c1ea08c3c059d2216307a97

              SHA256

              d713a722afffc3385c7209bb019effef2a094ca3fbd43ff19e93138ce7cb9fac

              SHA512

              ce8dd72655e4f170caeae52e55dae5d2fe95013c03b947a94fbd9e3bcf13dd21897212a9a90bc7dc69e7559d58f163775ef924294212896ae4ed0dd9b3ad8903

            • \Program Files\7-Zip\backup.exe

              Filesize

              72KB

              MD5

              95270b08567336b7a5af5a08d71d520f

              SHA1

              02bff242018693a36c1ea08c3c059d2216307a97

              SHA256

              d713a722afffc3385c7209bb019effef2a094ca3fbd43ff19e93138ce7cb9fac

              SHA512

              ce8dd72655e4f170caeae52e55dae5d2fe95013c03b947a94fbd9e3bcf13dd21897212a9a90bc7dc69e7559d58f163775ef924294212896ae4ed0dd9b3ad8903

            • \Program Files\7-Zip\backup.exe

              Filesize

              72KB

              MD5

              95270b08567336b7a5af5a08d71d520f

              SHA1

              02bff242018693a36c1ea08c3c059d2216307a97

              SHA256

              d713a722afffc3385c7209bb019effef2a094ca3fbd43ff19e93138ce7cb9fac

              SHA512

              ce8dd72655e4f170caeae52e55dae5d2fe95013c03b947a94fbd9e3bcf13dd21897212a9a90bc7dc69e7559d58f163775ef924294212896ae4ed0dd9b3ad8903

            • \Program Files\Common Files\backup.exe

              Filesize

              72KB

              MD5

              d85c425141740448c9cc66abb874a9df

              SHA1

              bda8f0f737e247bc1733479cca5a61debde73a51

              SHA256

              fe9a360fce1761d0d69d404101c05c9a4453401fcf56d377cb01e8a9fc22d301

              SHA512

              0538d9ebad90c13d83c5ab7fdc80289113789ed9f1dab899eefabc1c3f8e0bf27cfa29d7837fde76e3940df8d2fe0eb91bd351097841cb00c75faca1ea29f412

            • \Program Files\Common Files\backup.exe

              Filesize

              72KB

              MD5

              d85c425141740448c9cc66abb874a9df

              SHA1

              bda8f0f737e247bc1733479cca5a61debde73a51

              SHA256

              fe9a360fce1761d0d69d404101c05c9a4453401fcf56d377cb01e8a9fc22d301

              SHA512

              0538d9ebad90c13d83c5ab7fdc80289113789ed9f1dab899eefabc1c3f8e0bf27cfa29d7837fde76e3940df8d2fe0eb91bd351097841cb00c75faca1ea29f412

            • \Program Files\update.exe

              Filesize

              72KB

              MD5

              41e1f53f6c10891fde82c998eccbc7c4

              SHA1

              d55750a37a10d0c00840d849540709e1a8b1ce06

              SHA256

              6b213ead1b5340b34ef89dfce70edfe00d5867dff5b2186637c63d3340696821

              SHA512

              dfea1ecd916ced1a4a6f0d5563d259de4629ce4dcee17144f83a9301166dd98f71b19a9886185c00f71efcf151bb6059c8a86e0d275e860c0a27c7b2f91ad948

            • \Program Files\update.exe

              Filesize

              72KB

              MD5

              41e1f53f6c10891fde82c998eccbc7c4

              SHA1

              d55750a37a10d0c00840d849540709e1a8b1ce06

              SHA256

              6b213ead1b5340b34ef89dfce70edfe00d5867dff5b2186637c63d3340696821

              SHA512

              dfea1ecd916ced1a4a6f0d5563d259de4629ce4dcee17144f83a9301166dd98f71b19a9886185c00f71efcf151bb6059c8a86e0d275e860c0a27c7b2f91ad948

            • \Program Files\update.exe

              Filesize

              72KB

              MD5

              41e1f53f6c10891fde82c998eccbc7c4

              SHA1

              d55750a37a10d0c00840d849540709e1a8b1ce06

              SHA256

              6b213ead1b5340b34ef89dfce70edfe00d5867dff5b2186637c63d3340696821

              SHA512

              dfea1ecd916ced1a4a6f0d5563d259de4629ce4dcee17144f83a9301166dd98f71b19a9886185c00f71efcf151bb6059c8a86e0d275e860c0a27c7b2f91ad948

            • \Program Files\update.exe

              Filesize

              72KB

              MD5

              41e1f53f6c10891fde82c998eccbc7c4

              SHA1

              d55750a37a10d0c00840d849540709e1a8b1ce06

              SHA256

              6b213ead1b5340b34ef89dfce70edfe00d5867dff5b2186637c63d3340696821

              SHA512

              dfea1ecd916ced1a4a6f0d5563d259de4629ce4dcee17144f83a9301166dd98f71b19a9886185c00f71efcf151bb6059c8a86e0d275e860c0a27c7b2f91ad948

            • \Users\Admin\AppData\Local\Temp\3162902699\backup.exe

              Filesize

              72KB

              MD5

              1af3fef4719a012a19c339e697ebf93c

              SHA1

              ea8e86fa591ea3c99a25b06af7b0ef07ffc22cf3

              SHA256

              8340b3b85d3ed4995175745461207ece83bdaeb09a6d55f6a874cacbef69ef01

              SHA512

              8b6640bf84ec5a6e308851bc55167546cff59860b2e2d20f892cdb28e52bf7754c88c0be6a6c6fa8a9c068f7e3d914b9efd89831f0c2db95cc08b326981127b6

            • \Users\Admin\AppData\Local\Temp\3162902699\backup.exe

              Filesize

              72KB

              MD5

              1af3fef4719a012a19c339e697ebf93c

              SHA1

              ea8e86fa591ea3c99a25b06af7b0ef07ffc22cf3

              SHA256

              8340b3b85d3ed4995175745461207ece83bdaeb09a6d55f6a874cacbef69ef01

              SHA512

              8b6640bf84ec5a6e308851bc55167546cff59860b2e2d20f892cdb28e52bf7754c88c0be6a6c6fa8a9c068f7e3d914b9efd89831f0c2db95cc08b326981127b6

            • \Users\Admin\AppData\Local\Temp\Low\update.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • \Users\Admin\AppData\Local\Temp\Low\update.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • \Users\Admin\AppData\Local\Temp\Low\update.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • \Users\Admin\AppData\Local\Temp\Low\update.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

              Filesize

              72KB

              MD5

              5c1064d9b2cb11519ccd8c52f6046132

              SHA1

              c6a42fdd5f0fec3da3a090ac9a01830a30d405fe

              SHA256

              7bbe21486111680aa56e72c430548e76ddf70b96e3ac53e352dd432a7978c409

              SHA512

              58584b5ffdade02d8a1005309848646a9c9a3c692b64a9413894d9373d2cb73184196b9c6a23c411e8eed847e42e1ab0d500d1ab140402fa3493566972348e32

            • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

              Filesize

              72KB

              MD5

              150ddc0fbb0b78a511cafc480d27092a

              SHA1

              fda90f009e6a4d4f444e885ecd907289c534e9a5

              SHA256

              e52bb5059bf7200dbd69b80a886dff61aaab2491c18d371716d65aea5c5da154

              SHA512

              21cb5bf9fe30c2de3227461d46a6926fd48533b74e10ce6d3b530d804db119f104297b5d4cacb3d193243714e8d4769d0db0a5c9d164ead1de90032cd98ccddc

            • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

              Filesize

              72KB

              MD5

              150ddc0fbb0b78a511cafc480d27092a

              SHA1

              fda90f009e6a4d4f444e885ecd907289c534e9a5

              SHA256

              e52bb5059bf7200dbd69b80a886dff61aaab2491c18d371716d65aea5c5da154

              SHA512

              21cb5bf9fe30c2de3227461d46a6926fd48533b74e10ce6d3b530d804db119f104297b5d4cacb3d193243714e8d4769d0db0a5c9d164ead1de90032cd98ccddc

            • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

              Filesize

              72KB

              MD5

              22f578862816d26dd5cfe8dc2f2b7064

              SHA1

              dd48e187af681d350ce79af53acacd9cb235462a

              SHA256

              7dff94f0806a15325250f894e316825fdf6aae68950ab7a82757ed02d06d63f4

              SHA512

              faf59ee53b46d93d775a2b2eb827326e3515687adb3dcf9da69d995a4e6dfaad3979af8a712c79e1e0fb779bc349086b8c49ffcb2b90a20af12c3c422845dd2a

            • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

              Filesize

              72KB

              MD5

              22f578862816d26dd5cfe8dc2f2b7064

              SHA1

              dd48e187af681d350ce79af53acacd9cb235462a

              SHA256

              7dff94f0806a15325250f894e316825fdf6aae68950ab7a82757ed02d06d63f4

              SHA512

              faf59ee53b46d93d775a2b2eb827326e3515687adb3dcf9da69d995a4e6dfaad3979af8a712c79e1e0fb779bc349086b8c49ffcb2b90a20af12c3c422845dd2a

            • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

              Filesize

              72KB

              MD5

              1af3fef4719a012a19c339e697ebf93c

              SHA1

              ea8e86fa591ea3c99a25b06af7b0ef07ffc22cf3

              SHA256

              8340b3b85d3ed4995175745461207ece83bdaeb09a6d55f6a874cacbef69ef01

              SHA512

              8b6640bf84ec5a6e308851bc55167546cff59860b2e2d20f892cdb28e52bf7754c88c0be6a6c6fa8a9c068f7e3d914b9efd89831f0c2db95cc08b326981127b6

            • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

              Filesize

              72KB

              MD5

              1af3fef4719a012a19c339e697ebf93c

              SHA1

              ea8e86fa591ea3c99a25b06af7b0ef07ffc22cf3

              SHA256

              8340b3b85d3ed4995175745461207ece83bdaeb09a6d55f6a874cacbef69ef01

              SHA512

              8b6640bf84ec5a6e308851bc55167546cff59860b2e2d20f892cdb28e52bf7754c88c0be6a6c6fa8a9c068f7e3d914b9efd89831f0c2db95cc08b326981127b6

            • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

              Filesize

              72KB

              MD5

              150ddc0fbb0b78a511cafc480d27092a

              SHA1

              fda90f009e6a4d4f444e885ecd907289c534e9a5

              SHA256

              e52bb5059bf7200dbd69b80a886dff61aaab2491c18d371716d65aea5c5da154

              SHA512

              21cb5bf9fe30c2de3227461d46a6926fd48533b74e10ce6d3b530d804db119f104297b5d4cacb3d193243714e8d4769d0db0a5c9d164ead1de90032cd98ccddc

            • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

              Filesize

              72KB

              MD5

              150ddc0fbb0b78a511cafc480d27092a

              SHA1

              fda90f009e6a4d4f444e885ecd907289c534e9a5

              SHA256

              e52bb5059bf7200dbd69b80a886dff61aaab2491c18d371716d65aea5c5da154

              SHA512

              21cb5bf9fe30c2de3227461d46a6926fd48533b74e10ce6d3b530d804db119f104297b5d4cacb3d193243714e8d4769d0db0a5c9d164ead1de90032cd98ccddc

            • memory/1940-72-0x0000000076121000-0x0000000076123000-memory.dmp

              Filesize

              8KB

            • memory/1992-149-0x0000000074421000-0x0000000074423000-memory.dmp

              Filesize

              8KB