Analysis

  • max time kernel
    154s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 13:37

General

  • Target

    f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe

  • Size

    72KB

  • MD5

    042d75e937125f109accc584ca4b3629

  • SHA1

    dd85fcecd49976e4b8b4e955b4d8ca94025d0b21

  • SHA256

    f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325

  • SHA512

    4b327c5f77a5c1b618c1c943340804297f525de4b10e867c89f93f6837cfdb2a2c803be2e9ad627d50637cd158424c0daadded107b3bffb3dd5e67f1bb0ce8cd

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2t:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPZ

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 61 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 62 IoCs
  • Drops file in Program Files directory 52 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe
    "C:\Users\Admin\AppData\Local\Temp\f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\266813471\backup.exe
      C:\Users\Admin\AppData\Local\Temp\266813471\backup.exe C:\Users\Admin\AppData\Local\Temp\266813471\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3632
      • C:\backup.exe
        \backup.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\odt\backup.exe
          C:\odt\backup.exe C:\odt\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3268
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3856
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3220
          • C:\Program Files\7-Zip\backup.exe
            "C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:4168
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3988
          • C:\Program Files\Common Files\System Restore.exe
            "C:\Program Files\Common Files\System Restore.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1432
            • C:\Program Files\Common Files\DESIGNER\backup.exe
              "C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:712
            • C:\Program Files\Common Files\microsoft shared\backup.exe
              "C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4208
              • C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe
                "C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:4540
              • C:\Program Files\Common Files\microsoft shared\ink\backup.exe
                "C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:432
                • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:3792
                • C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1352
                • C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\System Restore.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:5100
                • C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1652
                • C:\Program Files\Common Files\microsoft shared\ink\de-DE\update.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\de-DE\update.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4924
                • C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:448
            • C:\Program Files\Common Files\Services\backup.exe
              "C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:4884
            • C:\Program Files\Common Files\System\backup.exe
              "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:884
              • C:\Program Files\Common Files\System\ado\backup.exe
                "C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:2908
                • C:\Program Files\Common Files\System\ado\de-DE\backup.exe
                  "C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4476
                • C:\Program Files\Common Files\System\ado\en-US\backup.exe
                  "C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4580
                • C:\Program Files\Common Files\System\ado\es-ES\backup.exe
                  "C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:2188
          • C:\Program Files\Google\backup.exe
            "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:4752
            • C:\Program Files\Google\Chrome\backup.exe
              "C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3212
              • C:\Program Files\Google\Chrome\Application\backup.exe
                "C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:5064
                • C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe
                  "C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:260
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:4240
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:2964
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:1288
          • C:\Program Files\Internet Explorer\backup.exe
            "C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:4052
            • C:\Program Files\Internet Explorer\de-DE\backup.exe
              "C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:4224
            • C:\Program Files\Internet Explorer\en-US\backup.exe
              "C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3320
            • C:\Program Files\Internet Explorer\es-ES\backup.exe
              "C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4432
            • C:\Program Files\Internet Explorer\fr-FR\backup.exe
              "C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:932
            • C:\Program Files\Internet Explorer\images\backup.exe
              "C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3132
        • C:\Program Files (x86)\backup.exe
          "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4640
          • C:\Program Files (x86)\Adobe\backup.exe
            "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3192
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1504
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4848
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:4708
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:3908
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\System Restore.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:1872
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\System Restore.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1344
          • C:\Program Files (x86)\Common Files\backup.exe
            "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:4800
            • C:\Program Files (x86)\Common Files\Adobe\backup.exe
              "C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              PID:2640
              • C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe
                "C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:2316
              • C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe
                "C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:5116
                • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe
                  "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4960
        • C:\Users\backup.exe
          C:\Users\backup.exe C:\Users\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:5080
          • C:\Users\Admin\backup.exe
            C:\Users\Admin\backup.exe C:\Users\Admin\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:4000
            • C:\Users\Admin\3D Objects\backup.exe
              "C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3512
            • C:\Users\Admin\Contacts\backup.exe
              C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4920
            • C:\Users\Admin\Desktop\backup.exe
              C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1304
            • C:\Users\Admin\Documents\backup.exe
              C:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3012
    • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe
      C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3604
    • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
      C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:552
    • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
      C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4440
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2284
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2860
    • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
      C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    d6214f19531e695ed2524f7ef80b7d01

    SHA1

    455e114f8909a038f82151c1dbed1a3e7b70605e

    SHA256

    ae2dffec0b0d9744f8a6ef2fb3dc210ba5e7fdb0cc7bc58153359b3a5b85944d

    SHA512

    095724eed1633392b7cc5ac7f345539a2ea82a285ff2853b98421727523a041a3980387a404c17253c1bb92dac08c8bc7e8ae398ce6e7df27010aa24ead2a7d5

  • C:\PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    d6214f19531e695ed2524f7ef80b7d01

    SHA1

    455e114f8909a038f82151c1dbed1a3e7b70605e

    SHA256

    ae2dffec0b0d9744f8a6ef2fb3dc210ba5e7fdb0cc7bc58153359b3a5b85944d

    SHA512

    095724eed1633392b7cc5ac7f345539a2ea82a285ff2853b98421727523a041a3980387a404c17253c1bb92dac08c8bc7e8ae398ce6e7df27010aa24ead2a7d5

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe

    Filesize

    72KB

    MD5

    beaabebcf7d081cb6fa359a59e6703a5

    SHA1

    70a335e0423e4a24f5be47dbc572efaa7d019a1d

    SHA256

    ddb491a4c12241d0bc7028ea7bb96ee6660a8b02e11d698b169a03a9b2bb7123

    SHA512

    82293cfe37b37e304f1ac658192afd2c1ff744ecd96d3ca64c9d32c00f5618baebcee1956af6e8d809d3c8eff631a068b8824ee899a476240419f018d20c420d

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe

    Filesize

    72KB

    MD5

    beaabebcf7d081cb6fa359a59e6703a5

    SHA1

    70a335e0423e4a24f5be47dbc572efaa7d019a1d

    SHA256

    ddb491a4c12241d0bc7028ea7bb96ee6660a8b02e11d698b169a03a9b2bb7123

    SHA512

    82293cfe37b37e304f1ac658192afd2c1ff744ecd96d3ca64c9d32c00f5618baebcee1956af6e8d809d3c8eff631a068b8824ee899a476240419f018d20c420d

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe

    Filesize

    72KB

    MD5

    0e2cd6c10f2bd809298b94e1c97bd684

    SHA1

    502ae7638b86755ab824bf087e9d3d578ecc586a

    SHA256

    5d2b709d253fd20d06a911d0946fbacdad0a4e0c14fe08bac665d1ba5f435db4

    SHA512

    482389677d8006bc46f61b517627262d97c015f7b461c44bc68f861f7fa18bbb493177a1664710296759187c608aa5cd3518e87cb841e8c3560fa4c71ad5f5a7

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe

    Filesize

    72KB

    MD5

    0e2cd6c10f2bd809298b94e1c97bd684

    SHA1

    502ae7638b86755ab824bf087e9d3d578ecc586a

    SHA256

    5d2b709d253fd20d06a911d0946fbacdad0a4e0c14fe08bac665d1ba5f435db4

    SHA512

    482389677d8006bc46f61b517627262d97c015f7b461c44bc68f861f7fa18bbb493177a1664710296759187c608aa5cd3518e87cb841e8c3560fa4c71ad5f5a7

  • C:\Program Files (x86)\Adobe\backup.exe

    Filesize

    72KB

    MD5

    4541a57a7710a16692b34e95c3a9feff

    SHA1

    6e4c63cb0eee67a6fbf4ac8b6d30dca06f5211d8

    SHA256

    77be120a1581c14fcedbd26dbd39c7907d9ae21d2bbbf07981733194c331a337

    SHA512

    858bf1a5ddc05ed6170e5ce4248cbc0cbe6ea30cb66670481f22033ad3519feef7dccadaa1ffafd847a45b512cf8da8fe44e9a8f9bdada371e15a1eb27f2edd2

  • C:\Program Files (x86)\Adobe\backup.exe

    Filesize

    72KB

    MD5

    4541a57a7710a16692b34e95c3a9feff

    SHA1

    6e4c63cb0eee67a6fbf4ac8b6d30dca06f5211d8

    SHA256

    77be120a1581c14fcedbd26dbd39c7907d9ae21d2bbbf07981733194c331a337

    SHA512

    858bf1a5ddc05ed6170e5ce4248cbc0cbe6ea30cb66670481f22033ad3519feef7dccadaa1ffafd847a45b512cf8da8fe44e9a8f9bdada371e15a1eb27f2edd2

  • C:\Program Files (x86)\Common Files\Adobe\backup.exe

    Filesize

    72KB

    MD5

    10003b2998a43ff1dbbb8ed590f028e3

    SHA1

    fea17b10f7a3be4e741dfe471e7c38acd7ec459e

    SHA256

    d813379da1fda56f643fa2b575b81c6ba8da391bb508ee86da0e9948d8adaac0

    SHA512

    eabc8ba968c09cea8728c5667a7b1842efd40cd7fef78e85b2ce347e997fc090cadbda0b22b789df7f34429354b907e5636ae41b5112ac87a98ba6a3e2a1b2ef

  • C:\Program Files (x86)\Common Files\Adobe\backup.exe

    Filesize

    72KB

    MD5

    10003b2998a43ff1dbbb8ed590f028e3

    SHA1

    fea17b10f7a3be4e741dfe471e7c38acd7ec459e

    SHA256

    d813379da1fda56f643fa2b575b81c6ba8da391bb508ee86da0e9948d8adaac0

    SHA512

    eabc8ba968c09cea8728c5667a7b1842efd40cd7fef78e85b2ce347e997fc090cadbda0b22b789df7f34429354b907e5636ae41b5112ac87a98ba6a3e2a1b2ef

  • C:\Program Files (x86)\Common Files\backup.exe

    Filesize

    72KB

    MD5

    408deab682222d779cdff7aa7f7187c7

    SHA1

    473d8ec7ae628b1b26b56c8c8e6b79f951dfd251

    SHA256

    ff3487e062787e98ea61510bbdd98ac6ab04a4dd5c331448a937c189a70ed14e

    SHA512

    55c9058fae84298cce7daaa443a4f7bc41814c10028af026acd8c1aa551f1cd27a1a61f12a4df15519157256c9b802921c4f55b012b8c6f5a9939aa4dc0b8ff8

  • C:\Program Files (x86)\Common Files\backup.exe

    Filesize

    72KB

    MD5

    408deab682222d779cdff7aa7f7187c7

    SHA1

    473d8ec7ae628b1b26b56c8c8e6b79f951dfd251

    SHA256

    ff3487e062787e98ea61510bbdd98ac6ab04a4dd5c331448a937c189a70ed14e

    SHA512

    55c9058fae84298cce7daaa443a4f7bc41814c10028af026acd8c1aa551f1cd27a1a61f12a4df15519157256c9b802921c4f55b012b8c6f5a9939aa4dc0b8ff8

  • C:\Program Files (x86)\backup.exe

    Filesize

    72KB

    MD5

    b6640f405d00f3007c0432e1b8649824

    SHA1

    ccc258518100710921e179e2915751f471993bac

    SHA256

    1d72c9d23a5bf3131136098f8c1593ff108172e0c7d1099a29727232f843785c

    SHA512

    a8e6e4facac610cb18af5b1e9c067bb8f1b0ece4c9ff39ab55bcdf522a404b9d1d4a5ebdfc4f62f0dd33ca6a435c3ddcbb705eec8d41ec1145d991b1e4833699

  • C:\Program Files (x86)\backup.exe

    Filesize

    72KB

    MD5

    b6640f405d00f3007c0432e1b8649824

    SHA1

    ccc258518100710921e179e2915751f471993bac

    SHA256

    1d72c9d23a5bf3131136098f8c1593ff108172e0c7d1099a29727232f843785c

    SHA512

    a8e6e4facac610cb18af5b1e9c067bb8f1b0ece4c9ff39ab55bcdf522a404b9d1d4a5ebdfc4f62f0dd33ca6a435c3ddcbb705eec8d41ec1145d991b1e4833699

  • C:\Program Files\7-Zip\Lang\backup.exe

    Filesize

    72KB

    MD5

    e4ddddf22659a64830d311efc0505c37

    SHA1

    ad0198ffd5b8e5f2a28ef5081c425c8f13b825fd

    SHA256

    f41d27ca1222a5edb8a4e80d22a932a426080832e4fe0aab57c0367be741cf2e

    SHA512

    bb048bf826779dae105c83781972fc7bd00d0c96e3be09864dacc70a92b7e33227f028a1bcefe590b90877cfb6a92d109f82d30b2fe3e47f114f8f79c2e028ef

  • C:\Program Files\7-Zip\Lang\backup.exe

    Filesize

    72KB

    MD5

    e4ddddf22659a64830d311efc0505c37

    SHA1

    ad0198ffd5b8e5f2a28ef5081c425c8f13b825fd

    SHA256

    f41d27ca1222a5edb8a4e80d22a932a426080832e4fe0aab57c0367be741cf2e

    SHA512

    bb048bf826779dae105c83781972fc7bd00d0c96e3be09864dacc70a92b7e33227f028a1bcefe590b90877cfb6a92d109f82d30b2fe3e47f114f8f79c2e028ef

  • C:\Program Files\7-Zip\backup.exe

    Filesize

    72KB

    MD5

    34b6e4e095d413fe0c8bc020b7398d42

    SHA1

    3ff3cef1a82ac67b080a0b387a7ee51a665f2f8c

    SHA256

    6c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602

    SHA512

    2c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf

  • C:\Program Files\7-Zip\backup.exe

    Filesize

    72KB

    MD5

    34b6e4e095d413fe0c8bc020b7398d42

    SHA1

    3ff3cef1a82ac67b080a0b387a7ee51a665f2f8c

    SHA256

    6c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602

    SHA512

    2c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf

  • C:\Program Files\Common Files\DESIGNER\backup.exe

    Filesize

    72KB

    MD5

    4c1f44c028400ca3c3838ed6abc4901e

    SHA1

    8e9f17b1beee710815cced32d0723775c012e477

    SHA256

    a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab

    SHA512

    02b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210

  • C:\Program Files\Common Files\DESIGNER\backup.exe

    Filesize

    72KB

    MD5

    4c1f44c028400ca3c3838ed6abc4901e

    SHA1

    8e9f17b1beee710815cced32d0723775c012e477

    SHA256

    a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab

    SHA512

    02b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210

  • C:\Program Files\Common Files\Services\backup.exe

    Filesize

    72KB

    MD5

    45784a2a056b40ca974562842986b3c9

    SHA1

    ef0acb880318fec29204a9a0d3e9a84f1360a830

    SHA256

    30f12347f738b92dc6e8df2b35bb4124ea5587f7659a8e70e77598955adff7fb

    SHA512

    caccf3a4d52b94bf681c2df676ec7e47b5c29e1dd5a2dc6d2f0ff274ab5bc931eebbba0292a96eaf34022d0556db32c12e6e2ccb032d673b0033f76a0ec30ea5

  • C:\Program Files\Common Files\Services\backup.exe

    Filesize

    72KB

    MD5

    45784a2a056b40ca974562842986b3c9

    SHA1

    ef0acb880318fec29204a9a0d3e9a84f1360a830

    SHA256

    30f12347f738b92dc6e8df2b35bb4124ea5587f7659a8e70e77598955adff7fb

    SHA512

    caccf3a4d52b94bf681c2df676ec7e47b5c29e1dd5a2dc6d2f0ff274ab5bc931eebbba0292a96eaf34022d0556db32c12e6e2ccb032d673b0033f76a0ec30ea5

  • C:\Program Files\Common Files\System Restore.exe

    Filesize

    72KB

    MD5

    34b6e4e095d413fe0c8bc020b7398d42

    SHA1

    3ff3cef1a82ac67b080a0b387a7ee51a665f2f8c

    SHA256

    6c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602

    SHA512

    2c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf

  • C:\Program Files\Common Files\System Restore.exe

    Filesize

    72KB

    MD5

    34b6e4e095d413fe0c8bc020b7398d42

    SHA1

    3ff3cef1a82ac67b080a0b387a7ee51a665f2f8c

    SHA256

    6c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602

    SHA512

    2c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe

    Filesize

    72KB

    MD5

    b998713d55365dd0329ad29875f10ae9

    SHA1

    2bf71190e902a6f1964def66d96901c0c8f60625

    SHA256

    617af936716f688d11e0f431c02ca53f0f0f1f04d1ff23da6ad09f23ad52a556

    SHA512

    eb03227d1c6d284e56ba73a3dcd44d7aca28191446f4b88dda299da1dbfbce6f7845bedca0a105df6e007cb6b0f697d23978f59257b3a8e81446ea5b15de978b

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe

    Filesize

    72KB

    MD5

    b998713d55365dd0329ad29875f10ae9

    SHA1

    2bf71190e902a6f1964def66d96901c0c8f60625

    SHA256

    617af936716f688d11e0f431c02ca53f0f0f1f04d1ff23da6ad09f23ad52a556

    SHA512

    eb03227d1c6d284e56ba73a3dcd44d7aca28191446f4b88dda299da1dbfbce6f7845bedca0a105df6e007cb6b0f697d23978f59257b3a8e81446ea5b15de978b

  • C:\Program Files\Common Files\microsoft shared\backup.exe

    Filesize

    72KB

    MD5

    4c1f44c028400ca3c3838ed6abc4901e

    SHA1

    8e9f17b1beee710815cced32d0723775c012e477

    SHA256

    a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab

    SHA512

    02b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210

  • C:\Program Files\Common Files\microsoft shared\backup.exe

    Filesize

    72KB

    MD5

    4c1f44c028400ca3c3838ed6abc4901e

    SHA1

    8e9f17b1beee710815cced32d0723775c012e477

    SHA256

    a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab

    SHA512

    02b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210

  • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe

    Filesize

    72KB

    MD5

    aa7a73c81887cba5304279ffdbc1fc46

    SHA1

    6ee6bbccc9a0bb025b249ad69cd72f216386214f

    SHA256

    57edc9996bd62d7648173abf70c71efc786d7a6868d7f1e0045ded78192854bf

    SHA512

    b414f3b1afcc311376813338968980ec230ae18961d29550c40ac89da907ce84c179765dcde375a05afe5fd5f19750094e90b2953816d8e589d9f6a1e1661ce8

  • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe

    Filesize

    72KB

    MD5

    aa7a73c81887cba5304279ffdbc1fc46

    SHA1

    6ee6bbccc9a0bb025b249ad69cd72f216386214f

    SHA256

    57edc9996bd62d7648173abf70c71efc786d7a6868d7f1e0045ded78192854bf

    SHA512

    b414f3b1afcc311376813338968980ec230ae18961d29550c40ac89da907ce84c179765dcde375a05afe5fd5f19750094e90b2953816d8e589d9f6a1e1661ce8

  • C:\Program Files\Common Files\microsoft shared\ink\backup.exe

    Filesize

    72KB

    MD5

    816064c3556c9784c7cb803c0476ff52

    SHA1

    c336e23799b2141a8902398ffa25a204b224a0ff

    SHA256

    8c771197068301075240e78270be4c00e005548624357b9166929adb28096941

    SHA512

    3cac8201985a769faa86f8a7f0acde1141935b3c4c79a84ab7673f6879c6f8f5bb5227f861f5d41ae28bc22581873f82a932f8dde1d36c349f5e72ac3f201bee

  • C:\Program Files\Common Files\microsoft shared\ink\backup.exe

    Filesize

    72KB

    MD5

    816064c3556c9784c7cb803c0476ff52

    SHA1

    c336e23799b2141a8902398ffa25a204b224a0ff

    SHA256

    8c771197068301075240e78270be4c00e005548624357b9166929adb28096941

    SHA512

    3cac8201985a769faa86f8a7f0acde1141935b3c4c79a84ab7673f6879c6f8f5bb5227f861f5d41ae28bc22581873f82a932f8dde1d36c349f5e72ac3f201bee

  • C:\Program Files\Google\Chrome\Application\backup.exe

    Filesize

    72KB

    MD5

    1527e0cd45add5c7815e84db19f67409

    SHA1

    5bb2cf3883d57b660d109a4a0e5e90c43203b484

    SHA256

    1f7b10ccf3f08f53314e087bfc6efd313cac3f9d537f624110402fc3c30235a3

    SHA512

    f42b1f2800ce47077afd691fa9cf53d610b01ec93082529f0974ea79223a374e257e9109f2b598df283a7b20b0cd65b7878b6ce3eb19fd7a07ee13ca42a48735

  • C:\Program Files\Google\Chrome\Application\backup.exe

    Filesize

    72KB

    MD5

    1527e0cd45add5c7815e84db19f67409

    SHA1

    5bb2cf3883d57b660d109a4a0e5e90c43203b484

    SHA256

    1f7b10ccf3f08f53314e087bfc6efd313cac3f9d537f624110402fc3c30235a3

    SHA512

    f42b1f2800ce47077afd691fa9cf53d610b01ec93082529f0974ea79223a374e257e9109f2b598df283a7b20b0cd65b7878b6ce3eb19fd7a07ee13ca42a48735

  • C:\Program Files\Google\Chrome\backup.exe

    Filesize

    72KB

    MD5

    442094f51f47dbccfd0cd648f67e9c1c

    SHA1

    280b6eaed15845153a0af6932c7f2346606a5e94

    SHA256

    aa900fe33090424479c24be71d9e2099c0f1e543a0a006aaf2ca8cf78b40258d

    SHA512

    a95b773a7b1b06baf62e905f91a612e34aad52cc84b687e41599bdb01da7d86c3c63d1a36075ea1479e63f2ee600e55b0dd5c8d40f6b2130bcbd865231812061

  • C:\Program Files\Google\Chrome\backup.exe

    Filesize

    72KB

    MD5

    442094f51f47dbccfd0cd648f67e9c1c

    SHA1

    280b6eaed15845153a0af6932c7f2346606a5e94

    SHA256

    aa900fe33090424479c24be71d9e2099c0f1e543a0a006aaf2ca8cf78b40258d

    SHA512

    a95b773a7b1b06baf62e905f91a612e34aad52cc84b687e41599bdb01da7d86c3c63d1a36075ea1479e63f2ee600e55b0dd5c8d40f6b2130bcbd865231812061

  • C:\Program Files\Google\backup.exe

    Filesize

    72KB

    MD5

    6a0c2d8477abf6e9d843cf98a16db715

    SHA1

    8bf1ddbcbe16a6278440e2a0abbef9f191285a68

    SHA256

    09dc84d8733473ab966e9371f33c85e9203e9413b5ca1490095278c1c06052c4

    SHA512

    227f33078d24149e2b6df91b852bf0aa14934c3813b5d8d3f7f0e3419aa10b6e609fa009902e7e09ca9aae500c949b34c6ee35bfb69dfe953fe70cb3ce5ddab7

  • C:\Program Files\Google\backup.exe

    Filesize

    72KB

    MD5

    6a0c2d8477abf6e9d843cf98a16db715

    SHA1

    8bf1ddbcbe16a6278440e2a0abbef9f191285a68

    SHA256

    09dc84d8733473ab966e9371f33c85e9203e9413b5ca1490095278c1c06052c4

    SHA512

    227f33078d24149e2b6df91b852bf0aa14934c3813b5d8d3f7f0e3419aa10b6e609fa009902e7e09ca9aae500c949b34c6ee35bfb69dfe953fe70cb3ce5ddab7

  • C:\Program Files\Internet Explorer\backup.exe

    Filesize

    72KB

    MD5

    04d243a82e96a90eca317fa3997742bb

    SHA1

    f5c3c30f8aeec6a2d25ad55a89e2c06bbaa601fe

    SHA256

    b10acdb97f1ab640349ec187651c5237266aa351f012329f80aec1f20a18bc2e

    SHA512

    eef9f1b4d256e504c1d4a6ea658c75e5117cf27353c146bd7bd523453c7ffd2161b2a55cb795dcca8c62db249b05cdea5d598a73b73e274b25a08077435902b4

  • C:\Program Files\Internet Explorer\backup.exe

    Filesize

    72KB

    MD5

    04d243a82e96a90eca317fa3997742bb

    SHA1

    f5c3c30f8aeec6a2d25ad55a89e2c06bbaa601fe

    SHA256

    b10acdb97f1ab640349ec187651c5237266aa351f012329f80aec1f20a18bc2e

    SHA512

    eef9f1b4d256e504c1d4a6ea658c75e5117cf27353c146bd7bd523453c7ffd2161b2a55cb795dcca8c62db249b05cdea5d598a73b73e274b25a08077435902b4

  • C:\Program Files\Internet Explorer\de-DE\backup.exe

    Filesize

    72KB

    MD5

    f8456e1e1c119f0fb17045134911d7f3

    SHA1

    d6f343bfe4362a62744f697e2fcb9764d1a8e7bf

    SHA256

    25385e01ae9bc45bf64a10485e280cc7feb77500de0c2b382fa8266b062fc601

    SHA512

    0be32d2a783628e671661ea157fbb87e22920443f3b9d8d46d3ceca5b35eb157e98d3d89eccb9579584d647142992293b71bd4242b976461097732fb716deedd

  • C:\Program Files\Internet Explorer\de-DE\backup.exe

    Filesize

    72KB

    MD5

    f8456e1e1c119f0fb17045134911d7f3

    SHA1

    d6f343bfe4362a62744f697e2fcb9764d1a8e7bf

    SHA256

    25385e01ae9bc45bf64a10485e280cc7feb77500de0c2b382fa8266b062fc601

    SHA512

    0be32d2a783628e671661ea157fbb87e22920443f3b9d8d46d3ceca5b35eb157e98d3d89eccb9579584d647142992293b71bd4242b976461097732fb716deedd

  • C:\Program Files\backup.exe

    Filesize

    72KB

    MD5

    12430884284cce6c27e27e088415fbbe

    SHA1

    f98e1ebed0dd64289dffac4aa39507c190f3577b

    SHA256

    7abe2ede0e51c207536eb999e8f772ec64597bca8f515364253833fe79e33491

    SHA512

    0dc053d4172380e47a6336e55ece2db51947cf59e777afe17fd3f8704586d43c5e69858effd9339c56c6cab62ec0aae450e49767eb81a8514be0413b8f6a063d

  • C:\Program Files\backup.exe

    Filesize

    72KB

    MD5

    12430884284cce6c27e27e088415fbbe

    SHA1

    f98e1ebed0dd64289dffac4aa39507c190f3577b

    SHA256

    7abe2ede0e51c207536eb999e8f772ec64597bca8f515364253833fe79e33491

    SHA512

    0dc053d4172380e47a6336e55ece2db51947cf59e777afe17fd3f8704586d43c5e69858effd9339c56c6cab62ec0aae450e49767eb81a8514be0413b8f6a063d

  • C:\Users\Admin\AppData\Local\Temp\266813471\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\266813471\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

    Filesize

    72KB

    MD5

    e2d3b229c005f8c0841d45aa3fc33d46

    SHA1

    0ef7f71c5932dd0f85761fff488783c7eaec18ce

    SHA256

    40f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7

    SHA512

    7bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df

  • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

    Filesize

    72KB

    MD5

    7f97c5c95ac8659a53123eb9f8735131

    SHA1

    42a40434ccb0a37c66640f01bb7dd7ee3a2a177c

    SHA256

    6b92162e4b1c11a83a9b74c1fac0b68838170258f68bba4e711d8ed17b711d89

    SHA512

    b490da395ba98d5db580c5f1e75cf0caab3a621c575a8cd2993b27b74993088d14a033a26ebf25e32a569aa26e34a99e7a4decae81b09568feb78af1e520d1cc

  • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

    Filesize

    72KB

    MD5

    7f97c5c95ac8659a53123eb9f8735131

    SHA1

    42a40434ccb0a37c66640f01bb7dd7ee3a2a177c

    SHA256

    6b92162e4b1c11a83a9b74c1fac0b68838170258f68bba4e711d8ed17b711d89

    SHA512

    b490da395ba98d5db580c5f1e75cf0caab3a621c575a8cd2993b27b74993088d14a033a26ebf25e32a569aa26e34a99e7a4decae81b09568feb78af1e520d1cc

  • C:\Users\backup.exe

    Filesize

    72KB

    MD5

    0429a4034e185729e7410c7cf85cd2b1

    SHA1

    a9cb619e5a3cb14df24833a95927880a83db474c

    SHA256

    d302f8561609a228f795554c0f8a113c875be85d5b0cffc5ae4ffe758f85a14c

    SHA512

    75b6fd1e17a7f5eef8e58f1cdc608b0b92554a560055653d2f9c1678b4181607e2804c8c2567efdcf60ff0ae0de6fc0b7e457e72200187593a7f36f43abd6c8a

  • C:\Users\backup.exe

    Filesize

    72KB

    MD5

    0429a4034e185729e7410c7cf85cd2b1

    SHA1

    a9cb619e5a3cb14df24833a95927880a83db474c

    SHA256

    d302f8561609a228f795554c0f8a113c875be85d5b0cffc5ae4ffe758f85a14c

    SHA512

    75b6fd1e17a7f5eef8e58f1cdc608b0b92554a560055653d2f9c1678b4181607e2804c8c2567efdcf60ff0ae0de6fc0b7e457e72200187593a7f36f43abd6c8a

  • C:\backup.exe

    Filesize

    72KB

    MD5

    b9466e5befc8f75abd32a6ae3af65754

    SHA1

    cf5d6b1a20d47ced65665042491028fb145f5cbc

    SHA256

    c48b8478e83bdd1e8ca8d1e63953412e731d53c25a5f5d57680769b0bf2f6ae3

    SHA512

    a2daa1d8798546869f48249eba38995988771bcab80c2231c04293b9eb55493afacddd10666f4c04a4ee23ef315703ed844c6262643d62d048fa759ffb80b83b

  • C:\backup.exe

    Filesize

    72KB

    MD5

    b9466e5befc8f75abd32a6ae3af65754

    SHA1

    cf5d6b1a20d47ced65665042491028fb145f5cbc

    SHA256

    c48b8478e83bdd1e8ca8d1e63953412e731d53c25a5f5d57680769b0bf2f6ae3

    SHA512

    a2daa1d8798546869f48249eba38995988771bcab80c2231c04293b9eb55493afacddd10666f4c04a4ee23ef315703ed844c6262643d62d048fa759ffb80b83b

  • C:\odt\backup.exe

    Filesize

    72KB

    MD5

    36cd0c9b232f7af9c8fb5fe19c92f67b

    SHA1

    789abd9e395b4f243b9f6cea8dba8dc2000b571a

    SHA256

    37698666725bd0812a8c69c48753aaf5ada96c61d6348074d233aca89f832f72

    SHA512

    5bd0a7e190f35758c2f2531e548e91f60bd919cc309014ead4213f8ae7ca0bb59bae92ea2701740b55a1c9e9517a0939eb19e9e5af40b2d363e75d08f82fc2bc

  • C:\odt\backup.exe

    Filesize

    72KB

    MD5

    36cd0c9b232f7af9c8fb5fe19c92f67b

    SHA1

    789abd9e395b4f243b9f6cea8dba8dc2000b571a

    SHA256

    37698666725bd0812a8c69c48753aaf5ada96c61d6348074d233aca89f832f72

    SHA512

    5bd0a7e190f35758c2f2531e548e91f60bd919cc309014ead4213f8ae7ca0bb59bae92ea2701740b55a1c9e9517a0939eb19e9e5af40b2d363e75d08f82fc2bc

  • memory/260-287-0x0000000000000000-mapping.dmp

  • memory/432-251-0x0000000000000000-mapping.dmp

  • memory/448-362-0x0000000000000000-mapping.dmp

  • memory/552-144-0x0000000000000000-mapping.dmp

  • memory/712-204-0x0000000000000000-mapping.dmp

  • memory/884-289-0x0000000000000000-mapping.dmp

  • memory/932-346-0x0000000000000000-mapping.dmp

  • memory/1288-365-0x0000000000000000-mapping.dmp

  • memory/1304-348-0x0000000000000000-mapping.dmp

  • memory/1344-364-0x0000000000000000-mapping.dmp

  • memory/1352-304-0x0000000000000000-mapping.dmp

  • memory/1432-199-0x0000000000000000-mapping.dmp

  • memory/1504-234-0x0000000000000000-mapping.dmp

  • memory/1652-327-0x0000000000000000-mapping.dmp

  • memory/1676-169-0x0000000000000000-mapping.dmp

  • memory/1872-345-0x0000000000000000-mapping.dmp

  • memory/2188-366-0x0000000000000000-mapping.dmp

  • memory/2284-154-0x0000000000000000-mapping.dmp

  • memory/2316-325-0x0000000000000000-mapping.dmp

  • memory/2640-285-0x0000000000000000-mapping.dmp

  • memory/2860-159-0x0000000000000000-mapping.dmp

  • memory/2908-313-0x0000000000000000-mapping.dmp

  • memory/2964-342-0x0000000000000000-mapping.dmp

  • memory/3012-369-0x0000000000000000-mapping.dmp

  • memory/3132-368-0x0000000000000000-mapping.dmp

  • memory/3192-219-0x0000000000000000-mapping.dmp

  • memory/3212-223-0x0000000000000000-mapping.dmp

  • memory/3220-184-0x0000000000000000-mapping.dmp

  • memory/3268-174-0x0000000000000000-mapping.dmp

  • memory/3320-305-0x0000000000000000-mapping.dmp

  • memory/3512-310-0x0000000000000000-mapping.dmp

  • memory/3604-139-0x0000000000000000-mapping.dmp

  • memory/3632-134-0x0000000000000000-mapping.dmp

  • memory/3704-164-0x0000000000000000-mapping.dmp

  • memory/3792-279-0x0000000000000000-mapping.dmp

  • memory/3856-179-0x0000000000000000-mapping.dmp

  • memory/3908-324-0x0000000000000000-mapping.dmp

  • memory/3988-194-0x0000000000000000-mapping.dmp

  • memory/4000-288-0x0000000000000000-mapping.dmp

  • memory/4052-246-0x0000000000000000-mapping.dmp

  • memory/4168-189-0x0000000000000000-mapping.dmp

  • memory/4208-221-0x0000000000000000-mapping.dmp

  • memory/4224-284-0x0000000000000000-mapping.dmp

  • memory/4240-322-0x0000000000000000-mapping.dmp

  • memory/4432-323-0x0000000000000000-mapping.dmp

  • memory/4440-149-0x0000000000000000-mapping.dmp

  • memory/4476-326-0x0000000000000000-mapping.dmp

  • memory/4540-236-0x0000000000000000-mapping.dmp

  • memory/4580-343-0x0000000000000000-mapping.dmp

  • memory/4640-206-0x0000000000000000-mapping.dmp

  • memory/4708-303-0x0000000000000000-mapping.dmp

  • memory/4752-207-0x0000000000000000-mapping.dmp

  • memory/4800-249-0x0000000000000000-mapping.dmp

  • memory/4848-274-0x0000000000000000-mapping.dmp

  • memory/4884-245-0x0000000000000000-mapping.dmp

  • memory/4920-321-0x0000000000000000-mapping.dmp

  • memory/4924-344-0x0000000000000000-mapping.dmp

  • memory/4960-367-0x0000000000000000-mapping.dmp

  • memory/5064-238-0x0000000000000000-mapping.dmp

  • memory/5080-243-0x0000000000000000-mapping.dmp

  • memory/5100-318-0x0000000000000000-mapping.dmp

  • memory/5116-347-0x0000000000000000-mapping.dmp