Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    244s
  • max time network
    253s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 14:25

General

  • Target

    1d31febccb4def6ecbb5e325e2f6a18b9df921d9cde27414b3d46960e6de58e6.exe

  • Size

    72KB

  • MD5

    120d4b7fb3a49644aec28ae3252ed79b

  • SHA1

    0eca393f2b4c056af1a624d7575c41428822ec2f

  • SHA256

    1d31febccb4def6ecbb5e325e2f6a18b9df921d9cde27414b3d46960e6de58e6

  • SHA512

    9fc4e66209f2dfd2353245d02f4cc01e26a5a8f63f382033c2389f33655e5625d607d6f194dbc09a205151682df3c934ad1888c9baac47bead4f667749a95eab

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2x:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrN

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 43 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 59 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 58 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d31febccb4def6ecbb5e325e2f6a18b9df921d9cde27414b3d46960e6de58e6.exe
    "C:\Users\Admin\AppData\Local\Temp\1d31febccb4def6ecbb5e325e2f6a18b9df921d9cde27414b3d46960e6de58e6.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Disables RegEdit via registry modification
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3164
    • C:\Users\Admin\AppData\Local\Temp\1238733345\backup.exe
      C:\Users\Admin\AppData\Local\Temp\1238733345\backup.exe C:\Users\Admin\AppData\Local\Temp\1238733345\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\backup.exe
        \backup.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:5052
        • C:\odt\backup.exe
          C:\odt\backup.exe C:\odt\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1140
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:4032
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3740
          • C:\Program Files\7-Zip\data.exe
            "C:\Program Files\7-Zip\data.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3080
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3884
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1296
            • C:\Program Files\Common Files\DESIGNER\System Restore.exe
              "C:\Program Files\Common Files\DESIGNER\System Restore.exe" C:\Program Files\Common Files\DESIGNER\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:5000
            • C:\Program Files\Common Files\microsoft shared\backup.exe
              "C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:4584
              • C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe
                "C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:4212
              • C:\Program Files\Common Files\microsoft shared\ink\System Restore.exe
                "C:\Program Files\Common Files\microsoft shared\ink\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:680
                • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1128
                • C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2104
              • C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe
                "C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1376
                • C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\
                  8⤵
                  • Executes dropped EXE
                  PID:5040
              • C:\Program Files\Common Files\microsoft shared\OFFICE16\update.exe
                "C:\Program Files\Common Files\microsoft shared\OFFICE16\update.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4720
            • C:\Program Files\Common Files\Services\backup.exe
              "C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3388
            • C:\Program Files\Common Files\System\backup.exe
              "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1048
          • C:\Program Files\Google\backup.exe
            "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:540
            • C:\Program Files\Google\Chrome\System Restore.exe
              "C:\Program Files\Google\Chrome\System Restore.exe" C:\Program Files\Google\Chrome\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              PID:364
              • C:\Program Files\Google\Chrome\Application\backup.exe
                "C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:4348
                • C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe
                  "C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1168
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:4272
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1864
                • C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe
                  "C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:2944
          • C:\Program Files\Internet Explorer\backup.exe
            "C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:3460
            • C:\Program Files\Internet Explorer\de-DE\backup.exe
              "C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\
              6⤵
              • Executes dropped EXE
              PID:180
          • C:\Program Files\Java\backup.exe
            "C:\Program Files\Java\backup.exe" C:\Program Files\Java\
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4488
        • C:\Program Files (x86)\backup.exe
          "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1956
          • C:\Program Files (x86)\Adobe\backup.exe
            "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:996
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:708
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:1484
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4388
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3448
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:948
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:2236
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1060
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3380
          • C:\Program Files (x86)\Common Files\backup.exe
            "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:3156
            • C:\Program Files (x86)\Common Files\Adobe\backup.exe
              "C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3436
          • C:\Program Files (x86)\Google\backup.exe
            "C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:5084
        • C:\Users\backup.exe
          C:\Users\backup.exe C:\Users\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4884
          • C:\Users\Admin\data.exe
            C:\Users\Admin\data.exe C:\Users\Admin\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:628
            • C:\Users\Admin\3D Objects\backup.exe
              "C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1596
            • C:\Users\Admin\Contacts\backup.exe
              C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4364
            • C:\Users\Admin\Desktop\backup.exe
              C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:4184
            • C:\Users\Admin\Documents\backup.exe
              C:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3752
            • C:\Users\Admin\Downloads\backup.exe
              C:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3432
          • C:\Users\Public\backup.exe
            C:\Users\Public\backup.exe C:\Users\Public\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:2548
            • C:\Users\Public\Documents\backup.exe
              C:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:856
        • C:\Windows\backup.exe
          C:\Windows\backup.exe C:\Windows\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:4152
          • C:\Windows\addins\backup.exe
            C:\Windows\addins\backup.exe C:\Windows\addins\
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:5008
    • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe
      C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1716
    • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
      C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2008
    • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
      C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3084
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:792
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1616
    • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
      C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    c87bcf2c5d6e3b452867c2b6754193f9

    SHA1

    167275faae79c90d01c0f4c40f85b5570d7c8bbd

    SHA256

    ea7d97aea611396ee34ef5fd0e90b1fc03f1fffe6f8f36f5e823b0b8714d9c9f

    SHA512

    f1321dc92d6ddd170c4025c69699cc369ef2d23be57634e7e2ac37b50124c1caef67f55ecd9168c368dae4bae5c74d3cddad252676c2a8570bc8d39d422d781e

  • C:\PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    c87bcf2c5d6e3b452867c2b6754193f9

    SHA1

    167275faae79c90d01c0f4c40f85b5570d7c8bbd

    SHA256

    ea7d97aea611396ee34ef5fd0e90b1fc03f1fffe6f8f36f5e823b0b8714d9c9f

    SHA512

    f1321dc92d6ddd170c4025c69699cc369ef2d23be57634e7e2ac37b50124c1caef67f55ecd9168c368dae4bae5c74d3cddad252676c2a8570bc8d39d422d781e

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe

    Filesize

    72KB

    MD5

    1b729fada6b325c379d3cb2a7bf90520

    SHA1

    27b2599d02b23316f56a1678cdc0ddccecc545aa

    SHA256

    09b7e29bb5500ebffe0e0893e10bdf3523c7995ef0c660dc30d8666288df5ea4

    SHA512

    4c331db3b58b06ecf3d66c45e2326010b0a236c1a2dc0adb4cc0d8972e69d49eb9787b9fb5d6f4cd6ced3f379d4fc2c5dbeb5e0e855c39c693ba65f575cbb205

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe

    Filesize

    72KB

    MD5

    1b729fada6b325c379d3cb2a7bf90520

    SHA1

    27b2599d02b23316f56a1678cdc0ddccecc545aa

    SHA256

    09b7e29bb5500ebffe0e0893e10bdf3523c7995ef0c660dc30d8666288df5ea4

    SHA512

    4c331db3b58b06ecf3d66c45e2326010b0a236c1a2dc0adb4cc0d8972e69d49eb9787b9fb5d6f4cd6ced3f379d4fc2c5dbeb5e0e855c39c693ba65f575cbb205

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe

    Filesize

    72KB

    MD5

    1b729fada6b325c379d3cb2a7bf90520

    SHA1

    27b2599d02b23316f56a1678cdc0ddccecc545aa

    SHA256

    09b7e29bb5500ebffe0e0893e10bdf3523c7995ef0c660dc30d8666288df5ea4

    SHA512

    4c331db3b58b06ecf3d66c45e2326010b0a236c1a2dc0adb4cc0d8972e69d49eb9787b9fb5d6f4cd6ced3f379d4fc2c5dbeb5e0e855c39c693ba65f575cbb205

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe

    Filesize

    72KB

    MD5

    1b729fada6b325c379d3cb2a7bf90520

    SHA1

    27b2599d02b23316f56a1678cdc0ddccecc545aa

    SHA256

    09b7e29bb5500ebffe0e0893e10bdf3523c7995ef0c660dc30d8666288df5ea4

    SHA512

    4c331db3b58b06ecf3d66c45e2326010b0a236c1a2dc0adb4cc0d8972e69d49eb9787b9fb5d6f4cd6ced3f379d4fc2c5dbeb5e0e855c39c693ba65f575cbb205

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe

    Filesize

    72KB

    MD5

    71be0ebe83716f94888087eb47e3fe34

    SHA1

    5ba6b89df6a2ec81102a1166e30cb8566bdf6ae9

    SHA256

    bc5c434e51f8518688e7952137c1059c3ce99cff94c1bf6e212fc42f6a3014ab

    SHA512

    cc627c17cf84b16c9e0cc65fb5c6e11d4f1a132241a95094fbab9d8299a3b9fe8829d7bb1e9fd440e7f150d93eb04c66c2586293e259c0c8788018ce1ea9deab

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe

    Filesize

    72KB

    MD5

    71be0ebe83716f94888087eb47e3fe34

    SHA1

    5ba6b89df6a2ec81102a1166e30cb8566bdf6ae9

    SHA256

    bc5c434e51f8518688e7952137c1059c3ce99cff94c1bf6e212fc42f6a3014ab

    SHA512

    cc627c17cf84b16c9e0cc65fb5c6e11d4f1a132241a95094fbab9d8299a3b9fe8829d7bb1e9fd440e7f150d93eb04c66c2586293e259c0c8788018ce1ea9deab

  • C:\Program Files (x86)\Adobe\backup.exe

    Filesize

    72KB

    MD5

    367923c51f7546c6c85904f3e72a451f

    SHA1

    1424d0d12cec7cadec41552134595bc8dc768525

    SHA256

    99d828615507347b29e725216d83e1d7bab1eaafa16dd4d215dec9b5e93cc9fc

    SHA512

    67c58d794879ddc55b4cd89788caca9bb9349cf4c63dc859235fe63e016729785085117cadd8e1b6545e9f19d7fb850e667ed36903ab11acb8d52a6e4e319aea

  • C:\Program Files (x86)\Adobe\backup.exe

    Filesize

    72KB

    MD5

    367923c51f7546c6c85904f3e72a451f

    SHA1

    1424d0d12cec7cadec41552134595bc8dc768525

    SHA256

    99d828615507347b29e725216d83e1d7bab1eaafa16dd4d215dec9b5e93cc9fc

    SHA512

    67c58d794879ddc55b4cd89788caca9bb9349cf4c63dc859235fe63e016729785085117cadd8e1b6545e9f19d7fb850e667ed36903ab11acb8d52a6e4e319aea

  • C:\Program Files (x86)\backup.exe

    Filesize

    72KB

    MD5

    3ef107c7966faf1aa7458e9d07dfc84e

    SHA1

    e5f74bbf08d40ed82ac12a7a308801d863369f50

    SHA256

    1e20ebfb17d47fdad00fa20a1fc8de35a04c2231f165bc58bd2c1085f2879bb9

    SHA512

    2999a1a113d9fe4a81222b22f40c9cb09a8f000344b3c871ed49adecd679025eac286d1916218df1c87cc19002006de04c6f29c930acbc0876878ebfe551ba8d

  • C:\Program Files (x86)\backup.exe

    Filesize

    72KB

    MD5

    3ef107c7966faf1aa7458e9d07dfc84e

    SHA1

    e5f74bbf08d40ed82ac12a7a308801d863369f50

    SHA256

    1e20ebfb17d47fdad00fa20a1fc8de35a04c2231f165bc58bd2c1085f2879bb9

    SHA512

    2999a1a113d9fe4a81222b22f40c9cb09a8f000344b3c871ed49adecd679025eac286d1916218df1c87cc19002006de04c6f29c930acbc0876878ebfe551ba8d

  • C:\Program Files\7-Zip\Lang\backup.exe

    Filesize

    72KB

    MD5

    8f5850cdaae662370fda6433e4328e89

    SHA1

    aeb874bfeb2b16b60c159bca584f7e262358e7c0

    SHA256

    8bf95aac9a6fc0ccf1700ab84d06f4b60f2d29b81d52843d2ae5d30ed728068e

    SHA512

    aaf8c54a292c5d12649df0a3c8eb723ec9a0d964bdcb794d2633e543a4549dfd7ea5178c39967fc84dac4d8c6f12c4116395897b4d4312b837ef5011d6ccc38d

  • C:\Program Files\7-Zip\Lang\backup.exe

    Filesize

    72KB

    MD5

    8f5850cdaae662370fda6433e4328e89

    SHA1

    aeb874bfeb2b16b60c159bca584f7e262358e7c0

    SHA256

    8bf95aac9a6fc0ccf1700ab84d06f4b60f2d29b81d52843d2ae5d30ed728068e

    SHA512

    aaf8c54a292c5d12649df0a3c8eb723ec9a0d964bdcb794d2633e543a4549dfd7ea5178c39967fc84dac4d8c6f12c4116395897b4d4312b837ef5011d6ccc38d

  • C:\Program Files\7-Zip\data.exe

    Filesize

    72KB

    MD5

    13b823ea2424b10ac5f63d715ddde5f7

    SHA1

    afa3c7d50f3faa36dfe429b40a7faa9f49a5c9b9

    SHA256

    e120e1d56f853e6b4d42e239aa6d88ffd02b3e9fe85a3d55834c0b197eaa7aef

    SHA512

    6defafedc1005f4b1d1c67f0c0337f10f9a707f8e0ff3e618c77d408077ce7bbc4d14181bac023f6c645e34ddea4952e59e3dbc8a76b82d29f2e05056c005db9

  • C:\Program Files\7-Zip\data.exe

    Filesize

    72KB

    MD5

    13b823ea2424b10ac5f63d715ddde5f7

    SHA1

    afa3c7d50f3faa36dfe429b40a7faa9f49a5c9b9

    SHA256

    e120e1d56f853e6b4d42e239aa6d88ffd02b3e9fe85a3d55834c0b197eaa7aef

    SHA512

    6defafedc1005f4b1d1c67f0c0337f10f9a707f8e0ff3e618c77d408077ce7bbc4d14181bac023f6c645e34ddea4952e59e3dbc8a76b82d29f2e05056c005db9

  • C:\Program Files\Common Files\DESIGNER\System Restore.exe

    Filesize

    72KB

    MD5

    aaccae09a9a327778cb73db187a21a16

    SHA1

    e933d6b94b89961921173f6d91daa8dcbf1dad0c

    SHA256

    4015b0928ab1bae643bf5ea8b960a29f40f717639a674f69feacb72d188e76ea

    SHA512

    83aeab03805943c1176024ba1bf1e88b32e54b9e3ad236bd8b21a519c238e683d1ba8d8842e4f0593c90183302adb6722a673f1277ad0bbee037c0c9fc4b023c

  • C:\Program Files\Common Files\DESIGNER\System Restore.exe

    Filesize

    72KB

    MD5

    aaccae09a9a327778cb73db187a21a16

    SHA1

    e933d6b94b89961921173f6d91daa8dcbf1dad0c

    SHA256

    4015b0928ab1bae643bf5ea8b960a29f40f717639a674f69feacb72d188e76ea

    SHA512

    83aeab03805943c1176024ba1bf1e88b32e54b9e3ad236bd8b21a519c238e683d1ba8d8842e4f0593c90183302adb6722a673f1277ad0bbee037c0c9fc4b023c

  • C:\Program Files\Common Files\backup.exe

    Filesize

    72KB

    MD5

    03585caff4479ab3f79d5e38eae1791a

    SHA1

    6ccc5b6709fe909004dfe57f85546dcaa6958ec1

    SHA256

    5bf6c8dee576ff8a18246dad28b59b6bf107d7b1ca6c8a0aeb0c70b329f9f82f

    SHA512

    4adda2403562eb15ad4b4a23a9e992ed3d9936a0efb935b89d792ffda28bfc6e835754dcea4e0769529a6d1f84124b73fa0d030bffc204c0158b5308807a26f4

  • C:\Program Files\Common Files\backup.exe

    Filesize

    72KB

    MD5

    03585caff4479ab3f79d5e38eae1791a

    SHA1

    6ccc5b6709fe909004dfe57f85546dcaa6958ec1

    SHA256

    5bf6c8dee576ff8a18246dad28b59b6bf107d7b1ca6c8a0aeb0c70b329f9f82f

    SHA512

    4adda2403562eb15ad4b4a23a9e992ed3d9936a0efb935b89d792ffda28bfc6e835754dcea4e0769529a6d1f84124b73fa0d030bffc204c0158b5308807a26f4

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe

    Filesize

    72KB

    MD5

    43969d53535f3230e915fb1f4ff0a87b

    SHA1

    15323e1b7406f93777c7a84453e5faeb0d06a476

    SHA256

    1977698161d52a7069ddfe573ceb3ea54a042709b0b990c496d9de489062867f

    SHA512

    597dd21673b72031693ed9c39c30dcfd9aafdea923934bd56a176f2fd4e9ac2cbab859ea42c49c3c5167b139ee80bb5c21ed107f8d52df7b9491cbdcc3cf5d71

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe

    Filesize

    72KB

    MD5

    43969d53535f3230e915fb1f4ff0a87b

    SHA1

    15323e1b7406f93777c7a84453e5faeb0d06a476

    SHA256

    1977698161d52a7069ddfe573ceb3ea54a042709b0b990c496d9de489062867f

    SHA512

    597dd21673b72031693ed9c39c30dcfd9aafdea923934bd56a176f2fd4e9ac2cbab859ea42c49c3c5167b139ee80bb5c21ed107f8d52df7b9491cbdcc3cf5d71

  • C:\Program Files\Common Files\microsoft shared\backup.exe

    Filesize

    72KB

    MD5

    05ee2a6ca0d3f95f22b4e915353b5223

    SHA1

    c87a29a49017cb01922e2e3df9867ec55e2a319a

    SHA256

    624bf290521889a70873bb06127125415a9ffb9e66dbfbc0ac515082f9bc82d8

    SHA512

    136359982aee3defca1fa30c49cf11e38f56fc9ac7b2f61d48b52de58c362d00a69a784c5e877356c7c5e9f404356a46ce0d374a4f1465c62eb33de5832f9e8b

  • C:\Program Files\Common Files\microsoft shared\backup.exe

    Filesize

    72KB

    MD5

    05ee2a6ca0d3f95f22b4e915353b5223

    SHA1

    c87a29a49017cb01922e2e3df9867ec55e2a319a

    SHA256

    624bf290521889a70873bb06127125415a9ffb9e66dbfbc0ac515082f9bc82d8

    SHA512

    136359982aee3defca1fa30c49cf11e38f56fc9ac7b2f61d48b52de58c362d00a69a784c5e877356c7c5e9f404356a46ce0d374a4f1465c62eb33de5832f9e8b

  • C:\Program Files\Common Files\microsoft shared\ink\System Restore.exe

    Filesize

    72KB

    MD5

    43969d53535f3230e915fb1f4ff0a87b

    SHA1

    15323e1b7406f93777c7a84453e5faeb0d06a476

    SHA256

    1977698161d52a7069ddfe573ceb3ea54a042709b0b990c496d9de489062867f

    SHA512

    597dd21673b72031693ed9c39c30dcfd9aafdea923934bd56a176f2fd4e9ac2cbab859ea42c49c3c5167b139ee80bb5c21ed107f8d52df7b9491cbdcc3cf5d71

  • C:\Program Files\Common Files\microsoft shared\ink\System Restore.exe

    Filesize

    72KB

    MD5

    43969d53535f3230e915fb1f4ff0a87b

    SHA1

    15323e1b7406f93777c7a84453e5faeb0d06a476

    SHA256

    1977698161d52a7069ddfe573ceb3ea54a042709b0b990c496d9de489062867f

    SHA512

    597dd21673b72031693ed9c39c30dcfd9aafdea923934bd56a176f2fd4e9ac2cbab859ea42c49c3c5167b139ee80bb5c21ed107f8d52df7b9491cbdcc3cf5d71

  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe

    Filesize

    72KB

    MD5

    495220eb4acf5fda4791b6b4517a79b5

    SHA1

    744daf25fe45df6c7595f69828a4a802380a4ed1

    SHA256

    b92311cf966f1e86f0d0dfd4a23f5f32b0e9c63f925bdbab68011f23586ba96a

    SHA512

    d82141e8b79034ba6a1f7efc2c3aba48dc4472ff5bc276cff734b9d98f93841c3644ae352dac9b3f1e52f1b23ee9fd29d3ee63c50377bb85480a7a82b99f0860

  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe

    Filesize

    72KB

    MD5

    495220eb4acf5fda4791b6b4517a79b5

    SHA1

    744daf25fe45df6c7595f69828a4a802380a4ed1

    SHA256

    b92311cf966f1e86f0d0dfd4a23f5f32b0e9c63f925bdbab68011f23586ba96a

    SHA512

    d82141e8b79034ba6a1f7efc2c3aba48dc4472ff5bc276cff734b9d98f93841c3644ae352dac9b3f1e52f1b23ee9fd29d3ee63c50377bb85480a7a82b99f0860

  • C:\Program Files\Google\Chrome\Application\backup.exe

    Filesize

    72KB

    MD5

    1e8dce127f04454d5cbf77a65103e72b

    SHA1

    76715ee89420e2732c40c36149463757e899965e

    SHA256

    a1246619508d12b40c329b3b10d15460a31ac03a3e43b4360c2421ab62e3330d

    SHA512

    415263e1b4f193589adf62a2aafbf6253dc680e9828ea4e30d1f5cb1928a470421a0510cfda6134631d36b6b2fcb7495e86d2730256d950660f0f2fb7da576d9

  • C:\Program Files\Google\Chrome\Application\backup.exe

    Filesize

    72KB

    MD5

    1e8dce127f04454d5cbf77a65103e72b

    SHA1

    76715ee89420e2732c40c36149463757e899965e

    SHA256

    a1246619508d12b40c329b3b10d15460a31ac03a3e43b4360c2421ab62e3330d

    SHA512

    415263e1b4f193589adf62a2aafbf6253dc680e9828ea4e30d1f5cb1928a470421a0510cfda6134631d36b6b2fcb7495e86d2730256d950660f0f2fb7da576d9

  • C:\Program Files\Google\Chrome\System Restore.exe

    Filesize

    72KB

    MD5

    33f345179b6e512b3a68a9a7c991bbda

    SHA1

    eb7c26d68ffbe6a1a80bb7598e17b88bb0cde0c2

    SHA256

    9a9053e6163e63a85829d205bec7642089d936e91048656503e379aeae95b2b2

    SHA512

    f5d7a29270cdf168a105a9644d07a4b8de7948175cb3a6ac3e722cbe3e58344c409de91b0004b1eee61ba6dba0d22b92234082dee33e17b111120468594255bb

  • C:\Program Files\Google\Chrome\System Restore.exe

    Filesize

    72KB

    MD5

    33f345179b6e512b3a68a9a7c991bbda

    SHA1

    eb7c26d68ffbe6a1a80bb7598e17b88bb0cde0c2

    SHA256

    9a9053e6163e63a85829d205bec7642089d936e91048656503e379aeae95b2b2

    SHA512

    f5d7a29270cdf168a105a9644d07a4b8de7948175cb3a6ac3e722cbe3e58344c409de91b0004b1eee61ba6dba0d22b92234082dee33e17b111120468594255bb

  • C:\Program Files\Google\backup.exe

    Filesize

    72KB

    MD5

    a50d2f53bad1e8ed578d635137c10e9c

    SHA1

    e03ee8dc09860b8843a55aa562f0b6aaa9b21df1

    SHA256

    7910a7886b8fdb389c8199c026fe272fec4729e0ab1c61be36a639f6a663bc61

    SHA512

    d3cf0e333c913b20349c8a7a8489364c9ed263b6d558f20bea3ce72e761917c70b87a64b1fe25a5745aa2d1dd07543effeb054244667406fba643d3e077fdb84

  • C:\Program Files\Google\backup.exe

    Filesize

    72KB

    MD5

    a50d2f53bad1e8ed578d635137c10e9c

    SHA1

    e03ee8dc09860b8843a55aa562f0b6aaa9b21df1

    SHA256

    7910a7886b8fdb389c8199c026fe272fec4729e0ab1c61be36a639f6a663bc61

    SHA512

    d3cf0e333c913b20349c8a7a8489364c9ed263b6d558f20bea3ce72e761917c70b87a64b1fe25a5745aa2d1dd07543effeb054244667406fba643d3e077fdb84

  • C:\Program Files\backup.exe

    Filesize

    72KB

    MD5

    46e46578197a94af04607ab71e25fb7f

    SHA1

    513b054c24b63d898dae1637c2a160abc3a33083

    SHA256

    acf0d6a86bc93dcaaeadd759f165e15a7f87269d6992f81621442772937e5ec4

    SHA512

    1a441170292f0007c0feed69a1ab4670e9ae7111fb8e3af8045f8ab3fbeb3c87534f0d05dc3b733681ffd22812673d7bedea6bd4f851f9d6643d697057a4da36

  • C:\Program Files\backup.exe

    Filesize

    72KB

    MD5

    46e46578197a94af04607ab71e25fb7f

    SHA1

    513b054c24b63d898dae1637c2a160abc3a33083

    SHA256

    acf0d6a86bc93dcaaeadd759f165e15a7f87269d6992f81621442772937e5ec4

    SHA512

    1a441170292f0007c0feed69a1ab4670e9ae7111fb8e3af8045f8ab3fbeb3c87534f0d05dc3b733681ffd22812673d7bedea6bd4f851f9d6643d697057a4da36

  • C:\Users\Admin\3D Objects\backup.exe

    Filesize

    72KB

    MD5

    a64d85257e58baa6b6b622c0efdf773c

    SHA1

    5f0c1f6e301c235e61ff8fac1a21fbfd16459840

    SHA256

    f3962c4d97d90fc20ced9325e8969a0d0e037007f55fc8526716668642e5e0c8

    SHA512

    acb871d90fa907197aa535330d520d582a99626d71f90ed878b26f92928300b45c3506d60330106b9f424d555ecf196316ed4ee5e7342f2f87781112270919b2

  • C:\Users\Admin\3D Objects\backup.exe

    Filesize

    72KB

    MD5

    a64d85257e58baa6b6b622c0efdf773c

    SHA1

    5f0c1f6e301c235e61ff8fac1a21fbfd16459840

    SHA256

    f3962c4d97d90fc20ced9325e8969a0d0e037007f55fc8526716668642e5e0c8

    SHA512

    acb871d90fa907197aa535330d520d582a99626d71f90ed878b26f92928300b45c3506d60330106b9f424d555ecf196316ed4ee5e7342f2f87781112270919b2

  • C:\Users\Admin\AppData\Local\Temp\1238733345\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\1238733345\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    ec33c6cb825a8ebbaefd9c83b674d209

    SHA1

    56dcf92bcd7a35161561ba2295f4927b81905380

    SHA256

    13d21c7f47e5ed9e6e744b21434065b7f33468436495c98acd8d58971e7b0175

    SHA512

    6165f3a7e6cff287746cc39e8a3b4a4263dd346f52db28cbf7886ab1c02cffe7f327fb44f8d80a6bc963923fcd12ab5e3b1e316e4a1cff0be0527867de065c2f

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    ec33c6cb825a8ebbaefd9c83b674d209

    SHA1

    56dcf92bcd7a35161561ba2295f4927b81905380

    SHA256

    13d21c7f47e5ed9e6e744b21434065b7f33468436495c98acd8d58971e7b0175

    SHA512

    6165f3a7e6cff287746cc39e8a3b4a4263dd346f52db28cbf7886ab1c02cffe7f327fb44f8d80a6bc963923fcd12ab5e3b1e316e4a1cff0be0527867de065c2f

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    8eae9eb696bb37014d1d7af20f4d9b4f

    SHA1

    564d0973f5cc09b884cd53a6767623f7a26be471

    SHA256

    50e37ca3e5147080472373b731ecd5be015166074de4a17a4479ae6427f8ffc7

    SHA512

    44b47c98b8aff8e6e2a9cf78a497ab7ef71f67e24b330b1bf5154f8ea900aac0db0692d3453987d234e1b10ab03e6b770c3030557565006d45e0115639484eb5

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    8eae9eb696bb37014d1d7af20f4d9b4f

    SHA1

    564d0973f5cc09b884cd53a6767623f7a26be471

    SHA256

    50e37ca3e5147080472373b731ecd5be015166074de4a17a4479ae6427f8ffc7

    SHA512

    44b47c98b8aff8e6e2a9cf78a497ab7ef71f67e24b330b1bf5154f8ea900aac0db0692d3453987d234e1b10ab03e6b770c3030557565006d45e0115639484eb5

  • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

    Filesize

    72KB

    MD5

    3a3d9514d18cbfacd4110b301728db49

    SHA1

    5f092ca8698e3fe330cf38caffff5b7781ad5039

    SHA256

    ec239a0e3225a98a66bc4c66c081330ae7fa954d8e990d4d56e777c97444b6bf

    SHA512

    58c12eb0cb8c01b23fc09ae0f9b8f7622b46850693dc8dc18883bd91f0b4ee0b3deab065e1fc65f42eb672ef87a7a23a7add4615634023800a769781928fab59

  • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

    Filesize

    72KB

    MD5

    536f6fec23f209ff9d3f872e99f6ce33

    SHA1

    d13e8cdfc1ab2960033676c011ac63c45b1254e3

    SHA256

    6dc5823cf794c45799ecb2bf797bf0351867bd8cb61a4e3278696cd95f528b10

    SHA512

    4a79a9916d729063ebd4ebe4cb51dad8aab166a9f6c7abfee535bbaf5a306bad1efd77089741e4792d3ed2e2c4fd2be2ff3d65e9a15d313a0a7b15b4e2d62e84

  • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

    Filesize

    72KB

    MD5

    536f6fec23f209ff9d3f872e99f6ce33

    SHA1

    d13e8cdfc1ab2960033676c011ac63c45b1254e3

    SHA256

    6dc5823cf794c45799ecb2bf797bf0351867bd8cb61a4e3278696cd95f528b10

    SHA512

    4a79a9916d729063ebd4ebe4cb51dad8aab166a9f6c7abfee535bbaf5a306bad1efd77089741e4792d3ed2e2c4fd2be2ff3d65e9a15d313a0a7b15b4e2d62e84

  • C:\Users\Admin\Contacts\backup.exe

    Filesize

    72KB

    MD5

    3177cef484669c850421d70a3bdc8d05

    SHA1

    77f7f3b5008b4bd7dcebcf1094e87e5e4b2d9cad

    SHA256

    06b7919504de06470630ef361743404d55efffa709aa1165ab11fb9431686d9f

    SHA512

    941e56becb34584f89b2e206756cdf61254778cad976cbf4831ba914d5ae2366fa01c57c20120228b18a7ba3b1ffc6b965904ef348c07b7493a586e8cf850fa2

  • C:\Users\Admin\Contacts\backup.exe

    Filesize

    72KB

    MD5

    3177cef484669c850421d70a3bdc8d05

    SHA1

    77f7f3b5008b4bd7dcebcf1094e87e5e4b2d9cad

    SHA256

    06b7919504de06470630ef361743404d55efffa709aa1165ab11fb9431686d9f

    SHA512

    941e56becb34584f89b2e206756cdf61254778cad976cbf4831ba914d5ae2366fa01c57c20120228b18a7ba3b1ffc6b965904ef348c07b7493a586e8cf850fa2

  • C:\Users\Admin\Desktop\backup.exe

    Filesize

    72KB

    MD5

    3177cef484669c850421d70a3bdc8d05

    SHA1

    77f7f3b5008b4bd7dcebcf1094e87e5e4b2d9cad

    SHA256

    06b7919504de06470630ef361743404d55efffa709aa1165ab11fb9431686d9f

    SHA512

    941e56becb34584f89b2e206756cdf61254778cad976cbf4831ba914d5ae2366fa01c57c20120228b18a7ba3b1ffc6b965904ef348c07b7493a586e8cf850fa2

  • C:\Users\Admin\Desktop\backup.exe

    Filesize

    72KB

    MD5

    3177cef484669c850421d70a3bdc8d05

    SHA1

    77f7f3b5008b4bd7dcebcf1094e87e5e4b2d9cad

    SHA256

    06b7919504de06470630ef361743404d55efffa709aa1165ab11fb9431686d9f

    SHA512

    941e56becb34584f89b2e206756cdf61254778cad976cbf4831ba914d5ae2366fa01c57c20120228b18a7ba3b1ffc6b965904ef348c07b7493a586e8cf850fa2

  • C:\Users\Admin\data.exe

    Filesize

    72KB

    MD5

    fd95645e3183723740fe0c8cefedad63

    SHA1

    af68a242240390cc05f21d2302280aad8b3e14a7

    SHA256

    6875066f72063d34528b9ff90da8cada753286ea218c194b997a26b8e9e05823

    SHA512

    c35a5d2c46a04e545477f71d2ae72289610043389ec4f45ae2a0fec1a614fddadf9a0c77da69e172bbc0f21f63fc4d47b4e0a05b669e02bf2ee38d4856170caf

  • C:\Users\Admin\data.exe

    Filesize

    72KB

    MD5

    fd95645e3183723740fe0c8cefedad63

    SHA1

    af68a242240390cc05f21d2302280aad8b3e14a7

    SHA256

    6875066f72063d34528b9ff90da8cada753286ea218c194b997a26b8e9e05823

    SHA512

    c35a5d2c46a04e545477f71d2ae72289610043389ec4f45ae2a0fec1a614fddadf9a0c77da69e172bbc0f21f63fc4d47b4e0a05b669e02bf2ee38d4856170caf

  • C:\Users\backup.exe

    Filesize

    72KB

    MD5

    60bd5def8525e47d66b0041611da90a1

    SHA1

    d7d54410cc00afab626d7fad4790105feb88f9d6

    SHA256

    138553ebf6215ea80282f92d8b2a7a031c04b5ae3d1f32992b9693594290c7db

    SHA512

    eff5478ffb2976f68ffc530e27aa477d5990bd085a3cec85df0f6210ce3efd0d083828c26d5a993b9115f5d2956be6e56cfa6e566ed7691e27a9f13330c2101a

  • C:\Users\backup.exe

    Filesize

    72KB

    MD5

    60bd5def8525e47d66b0041611da90a1

    SHA1

    d7d54410cc00afab626d7fad4790105feb88f9d6

    SHA256

    138553ebf6215ea80282f92d8b2a7a031c04b5ae3d1f32992b9693594290c7db

    SHA512

    eff5478ffb2976f68ffc530e27aa477d5990bd085a3cec85df0f6210ce3efd0d083828c26d5a993b9115f5d2956be6e56cfa6e566ed7691e27a9f13330c2101a

  • C:\backup.exe

    Filesize

    72KB

    MD5

    db10cabf9dc2cd4cec417a1877d70cbc

    SHA1

    720418b985ebcdf48b097ca6c4c2de0266cc8d6e

    SHA256

    c365d3fa3bd9eb7a1281dc2a42212edbb07ce6dbc49fc38d68edbf74ec2c033e

    SHA512

    3332048088f51e48eee31b7ebf23d4a9924bf43e614d5f3678788475c7c9bdfbe24d27a59384479f8b29502c5801648a66a73f623ee6517fc37fb0ee2f95d49d

  • C:\backup.exe

    Filesize

    72KB

    MD5

    db10cabf9dc2cd4cec417a1877d70cbc

    SHA1

    720418b985ebcdf48b097ca6c4c2de0266cc8d6e

    SHA256

    c365d3fa3bd9eb7a1281dc2a42212edbb07ce6dbc49fc38d68edbf74ec2c033e

    SHA512

    3332048088f51e48eee31b7ebf23d4a9924bf43e614d5f3678788475c7c9bdfbe24d27a59384479f8b29502c5801648a66a73f623ee6517fc37fb0ee2f95d49d

  • C:\odt\backup.exe

    Filesize

    72KB

    MD5

    28c74ea0766971fb7748fdd42d183d48

    SHA1

    073851d47198e3970b6c0cd06a45b9eb7dc8cab9

    SHA256

    03507484d94ec66f3043ebe02521d076a56c7744ebd17513bbac41d40dce76b5

    SHA512

    1937018abcb42368a82eca247a93b9eb64bf6eb8c04438d7f4630600dcf5f914eb3ef2a3038481fdfec5a5f16b4c1405849f31c277741d00d416a2447d0ffc1c

  • C:\odt\backup.exe

    Filesize

    72KB

    MD5

    28c74ea0766971fb7748fdd42d183d48

    SHA1

    073851d47198e3970b6c0cd06a45b9eb7dc8cab9

    SHA256

    03507484d94ec66f3043ebe02521d076a56c7744ebd17513bbac41d40dce76b5

    SHA512

    1937018abcb42368a82eca247a93b9eb64bf6eb8c04438d7f4630600dcf5f914eb3ef2a3038481fdfec5a5f16b4c1405849f31c277741d00d416a2447d0ffc1c