Analysis

  • max time kernel
    217s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 20:28

General

  • Target

    1d96b5517c83f9525e822b308ad19a4c3d3666c2690912e46e512a85788dbf96.exe

  • Size

    72KB

  • MD5

    00dddbbffcf11c6d4fc8eb62a916b0f0

  • SHA1

    c32b268b59c8816c68e7cbd4e368d2ddc6eec0e2

  • SHA256

    1d96b5517c83f9525e822b308ad19a4c3d3666c2690912e46e512a85788dbf96

  • SHA512

    d81cb40b205277101c8a29a23eec79bf35a2a89ea54daea7a7f40f01b2c4a80d6aa069e12734d2d92a5dc65620ace5915facc91c216e5c15650fc46a0af1c7ef

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2e:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPq

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 50 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 62 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in Program Files directory 42 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 62 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d96b5517c83f9525e822b308ad19a4c3d3666c2690912e46e512a85788dbf96.exe
    "C:\Users\Admin\AppData\Local\Temp\1d96b5517c83f9525e822b308ad19a4c3d3666c2690912e46e512a85788dbf96.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1524
    • C:\Users\Admin\AppData\Local\Temp\3654185654\backup.exe
      C:\Users\Admin\AppData\Local\Temp\3654185654\backup.exe C:\Users\Admin\AppData\Local\Temp\3654185654\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1108
      • C:\backup.exe
        \backup.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:992
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1924
          • C:\PerfLogs\Admin\backup.exe
            C:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:960
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1684
          • C:\Program Files\7-Zip\backup.exe
            "C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1976
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:2044
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1708
            • C:\Program Files\Common Files\Microsoft Shared\update.exe
              "C:\Program Files\Common Files\Microsoft Shared\update.exe" C:\Program Files\Common Files\Microsoft Shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              PID:1936
              • C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe
                "C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1744
              • C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1496
                • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1736
                • C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:844
              • C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:904
            • C:\Program Files\Common Files\Services\data.exe
              "C:\Program Files\Common Files\Services\data.exe" C:\Program Files\Common Files\Services\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1116
            • C:\Program Files\Common Files\SpeechEngines\backup.exe
              "C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:968
              • C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe
                "C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1628
            • C:\Program Files\Common Files\System\backup.exe
              "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:756
              • C:\Program Files\Common Files\System\ado\backup.exe
                "C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1812
              • C:\Program Files\Common Files\System\de-DE\backup.exe
                "C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1724
          • C:\Program Files\DVD Maker\backup.exe
            "C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1612
            • C:\Program Files\DVD Maker\de-DE\backup.exe
              "C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:676
            • C:\Program Files\DVD Maker\en-US\System Restore.exe
              "C:\Program Files\DVD Maker\en-US\System Restore.exe" C:\Program Files\DVD Maker\en-US\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:592
            • C:\Program Files\DVD Maker\es-ES\backup.exe
              "C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:2028
            • C:\Program Files\DVD Maker\fr-FR\backup.exe
              "C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1572
            • C:\Program Files\DVD Maker\it-IT\backup.exe
              "C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2044
          • C:\Program Files\Google\backup.exe
            "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            PID:808
            • C:\Program Files\Google\Chrome\backup.exe
              "C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:188
              • C:\Program Files\Google\Chrome\Application\update.exe
                "C:\Program Files\Google\Chrome\Application\update.exe" C:\Program Files\Google\Chrome\Application\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1916
                • C:\Program Files\Google\Chrome\Application\89.0.4389.114\System Restore.exe
                  "C:\Program Files\Google\Chrome\Application\89.0.4389.114\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:476
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:1624
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\System Restore.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1628
                • C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe
                  "C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1204
          • C:\Program Files\Internet Explorer\backup.exe
            "C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:996
            • C:\Program Files\Internet Explorer\de-DE\backup.exe
              "C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1364
            • C:\Program Files\Internet Explorer\en-US\backup.exe
              "C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1640
            • C:\Program Files\Internet Explorer\es-ES\backup.exe
              "C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\
              6⤵
              • Executes dropped EXE
              PID:1608
          • C:\Program Files\Java\backup.exe
            "C:\Program Files\Java\backup.exe" C:\Program Files\Java\
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1576
        • C:\Program Files (x86)\backup.exe
          "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1256
          • C:\Program Files (x86)\Adobe\backup.exe
            "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            PID:392
            • C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe
              "C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1180
              • C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe
                "C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1340
              • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe
                "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1716
              • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe
                "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1744
        • C:\Users\backup.exe
          C:\Users\backup.exe C:\Users\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1100
          • C:\Users\Admin\backup.exe
            C:\Users\Admin\backup.exe C:\Users\Admin\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1552
            • C:\Users\Admin\Contacts\backup.exe
              C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1668
            • C:\Users\Admin\Desktop\backup.exe
              C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:336
            • C:\Users\Admin\Documents\backup.exe
              C:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1500
            • C:\Users\Admin\Downloads\backup.exe
              C:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:852
            • C:\Users\Admin\Favorites\backup.exe
              C:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1212
        • C:\Windows\backup.exe
          C:\Windows\backup.exe C:\Windows\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1800
          • C:\Windows\addins\backup.exe
            C:\Windows\addins\backup.exe C:\Windows\addins\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1988
          • C:\Windows\AppCompat\backup.exe
            C:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:556
          • C:\Windows\AppPatch\backup.exe
            C:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:960
          • C:\Windows\assembly\backup.exe
            C:\Windows\assembly\backup.exe C:\Windows\assembly\
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:760
    • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
      C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1488
    • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
      C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:876
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1208
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:964
    • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
      C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1156
    • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe
      C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\Admin\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • C:\PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • C:\PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • C:\Program Files (x86)\backup.exe

    Filesize

    72KB

    MD5

    5b821a2e186b63d21f07108665a07a96

    SHA1

    e86917bbd9d4c0290a280363fd28e42a7b1ecc2f

    SHA256

    3c221470ed0c304d7d71b7cb33a1b3b22cd507c7f64e38630a499a10a118a53c

    SHA512

    cb15cd4b1a8bfe067e27cc416844d6a39c3e1b3f545c0d4778c6bdb0e969c890d993e0c63c7bf3aa93a3834451126154a24be52dd73eb7829cca275f7a49ff57

  • C:\Program Files\7-Zip\Lang\backup.exe

    Filesize

    72KB

    MD5

    144f8a6f7af93f9aa8787af555086879

    SHA1

    091ed9187005a1ec1eb2630e93ba0f43e7b17dea

    SHA256

    9c390e2f304087f01c936c4438b31c053c1eee3a204bbe5b3811856149b1cad6

    SHA512

    a2d0308e0e434179c5010188c9e78215d989583c2efaacc88b88910c7d0b50b0e32f9fd4e2e037b2e5326237a23c3b48f52e583cf7631ca3a46aaef5062c8064

  • C:\Program Files\7-Zip\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • C:\Program Files\7-Zip\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • C:\Program Files\Common Files\Microsoft Shared\update.exe

    Filesize

    72KB

    MD5

    a8d68fc37481c224452a37a72f7b3dde

    SHA1

    ed91f4f83dcc4155efb4ff8dc60c2e7d72a42059

    SHA256

    88e87877a99a034611b53a7e171f65490c402663b509602ce341ff69814034c3

    SHA512

    258b1172dc9b7d546d0a6ec4ce748e1cb620253ecb3c11118925e3bfc3d67b2875d357a57cd0fad8f617535a99de052612a074258d488737752a4f919ed5d963

  • C:\Program Files\Common Files\Microsoft Shared\update.exe

    Filesize

    72KB

    MD5

    a8d68fc37481c224452a37a72f7b3dde

    SHA1

    ed91f4f83dcc4155efb4ff8dc60c2e7d72a42059

    SHA256

    88e87877a99a034611b53a7e171f65490c402663b509602ce341ff69814034c3

    SHA512

    258b1172dc9b7d546d0a6ec4ce748e1cb620253ecb3c11118925e3bfc3d67b2875d357a57cd0fad8f617535a99de052612a074258d488737752a4f919ed5d963

  • C:\Program Files\Common Files\Services\data.exe

    Filesize

    72KB

    MD5

    a8d68fc37481c224452a37a72f7b3dde

    SHA1

    ed91f4f83dcc4155efb4ff8dc60c2e7d72a42059

    SHA256

    88e87877a99a034611b53a7e171f65490c402663b509602ce341ff69814034c3

    SHA512

    258b1172dc9b7d546d0a6ec4ce748e1cb620253ecb3c11118925e3bfc3d67b2875d357a57cd0fad8f617535a99de052612a074258d488737752a4f919ed5d963

  • C:\Program Files\Common Files\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • C:\Program Files\Common Files\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • C:\Program Files\DVD Maker\backup.exe

    Filesize

    72KB

    MD5

    d2acc7e2052ed96193cd409c7cd69bfe

    SHA1

    40b32f34ee1776886abdd64004654f7b92f57c6b

    SHA256

    c19aa1a4d28755d0fb65c63517c0d2b68d755f285531f8f8f7fc6d12868d61ca

    SHA512

    b891f6dbd0a725fc6ec430a19b4b1f8df311b21be24fbfbc1f8e96825f952185445952e004016227fb4487d89dc59461939b5161f81d6cef5485c1292e027cdd

  • C:\Program Files\Google\backup.exe

    Filesize

    72KB

    MD5

    9b04ab0dd0818fa60a7c6f936ee6d1ca

    SHA1

    9f5b89495083316f609e6f93827d2c72204f52f4

    SHA256

    87cbb5390ecbaac0e89edd33aa4348a9d3fe881328f4f497e6f48f3bc59a9a08

    SHA512

    8cf6f2125618fb4c652a1b81c2ac594c6556aeeb4aa09ba8ede6abda709968ad274abf5473494315f4814086f06ede516c7458235084da9d51028bbee569c1bc

  • C:\Program Files\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • C:\Program Files\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • C:\Users\Admin\AppData\Local\Temp\3654185654\backup.exe

    Filesize

    72KB

    MD5

    0516b016d3abc445014b8d52408ff7b8

    SHA1

    54d0bf18ac543ac006011b0f536cef30783fc341

    SHA256

    4847d627350bad7f9ae7d803a63f8b248da2cf6a6e17f45322dc4886e7f4e402

    SHA512

    02acbefd8b3ea5f02eb7842f238914b3026a3897bf7c43093a8b67a258f6e1159fb53187249096238348ee7a9e703c033141ca9686c3e92b7304000d876c96a2

  • C:\Users\Admin\AppData\Local\Temp\3654185654\backup.exe

    Filesize

    72KB

    MD5

    0516b016d3abc445014b8d52408ff7b8

    SHA1

    54d0bf18ac543ac006011b0f536cef30783fc341

    SHA256

    4847d627350bad7f9ae7d803a63f8b248da2cf6a6e17f45322dc4886e7f4e402

    SHA512

    02acbefd8b3ea5f02eb7842f238914b3026a3897bf7c43093a8b67a258f6e1159fb53187249096238348ee7a9e703c033141ca9686c3e92b7304000d876c96a2

  • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

    Filesize

    72KB

    MD5

    505e45dd3f78b169b0f3191e8a2d3218

    SHA1

    6a099d434e2008458bf4ee10ea67c8b4def1b0f4

    SHA256

    7588095202364f6ba3d452ca064aa8373e021c42a179cd713392b141f75eac18

    SHA512

    190e52d4c895f79521e609a18a9eb6faf875b5abca6c1c88fbeea8129e4d44ef1fbe50d0ae269f46aa9fe1ac338d304337fb6bd08202437f4e2dbe300c94d3ff

  • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • C:\Users\backup.exe

    Filesize

    72KB

    MD5

    d9821f372f233bbdf8a6c7bd1f51c41a

    SHA1

    b733fc9cb5ac52f541678dbf2e58c1e0a97e74ea

    SHA256

    4d7b121ef4f85d0f8c2965390495086d92ed6e5f3154b5ac690411ce9cade66e

    SHA512

    9d1f37a728ad845c2ef656f1eca3afcfc51ecc83dc2efa43b8853d5d629eaf1dd89ee606e6161774494fd1e54628687aae9dda70408caedb89d6d551c724117c

  • C:\backup.exe

    Filesize

    72KB

    MD5

    270514b5b1647d133c828d1ce80bc238

    SHA1

    650bb6389e76000c62aac3051dd53f38d2e15144

    SHA256

    636e9785dfeb40b58b321328d081db5b97290ae2b55ded61b8c66c098ced56ea

    SHA512

    b479bb37fae95e21747d7d641616cf094d71d60e4d702b3b76e17687c4e3e62b84c133d28d1897651e94843fd1368cdf8cf407504f18b1f365b96efb6b01a89e

  • C:\backup.exe

    Filesize

    72KB

    MD5

    270514b5b1647d133c828d1ce80bc238

    SHA1

    650bb6389e76000c62aac3051dd53f38d2e15144

    SHA256

    636e9785dfeb40b58b321328d081db5b97290ae2b55ded61b8c66c098ced56ea

    SHA512

    b479bb37fae95e21747d7d641616cf094d71d60e4d702b3b76e17687c4e3e62b84c133d28d1897651e94843fd1368cdf8cf407504f18b1f365b96efb6b01a89e

  • \PerfLogs\Admin\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • \PerfLogs\Admin\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • \PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • \PerfLogs\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • \Program Files (x86)\backup.exe

    Filesize

    72KB

    MD5

    5b821a2e186b63d21f07108665a07a96

    SHA1

    e86917bbd9d4c0290a280363fd28e42a7b1ecc2f

    SHA256

    3c221470ed0c304d7d71b7cb33a1b3b22cd507c7f64e38630a499a10a118a53c

    SHA512

    cb15cd4b1a8bfe067e27cc416844d6a39c3e1b3f545c0d4778c6bdb0e969c890d993e0c63c7bf3aa93a3834451126154a24be52dd73eb7829cca275f7a49ff57

  • \Program Files (x86)\backup.exe

    Filesize

    72KB

    MD5

    5b821a2e186b63d21f07108665a07a96

    SHA1

    e86917bbd9d4c0290a280363fd28e42a7b1ecc2f

    SHA256

    3c221470ed0c304d7d71b7cb33a1b3b22cd507c7f64e38630a499a10a118a53c

    SHA512

    cb15cd4b1a8bfe067e27cc416844d6a39c3e1b3f545c0d4778c6bdb0e969c890d993e0c63c7bf3aa93a3834451126154a24be52dd73eb7829cca275f7a49ff57

  • \Program Files\7-Zip\Lang\backup.exe

    Filesize

    72KB

    MD5

    144f8a6f7af93f9aa8787af555086879

    SHA1

    091ed9187005a1ec1eb2630e93ba0f43e7b17dea

    SHA256

    9c390e2f304087f01c936c4438b31c053c1eee3a204bbe5b3811856149b1cad6

    SHA512

    a2d0308e0e434179c5010188c9e78215d989583c2efaacc88b88910c7d0b50b0e32f9fd4e2e037b2e5326237a23c3b48f52e583cf7631ca3a46aaef5062c8064

  • \Program Files\7-Zip\Lang\backup.exe

    Filesize

    72KB

    MD5

    144f8a6f7af93f9aa8787af555086879

    SHA1

    091ed9187005a1ec1eb2630e93ba0f43e7b17dea

    SHA256

    9c390e2f304087f01c936c4438b31c053c1eee3a204bbe5b3811856149b1cad6

    SHA512

    a2d0308e0e434179c5010188c9e78215d989583c2efaacc88b88910c7d0b50b0e32f9fd4e2e037b2e5326237a23c3b48f52e583cf7631ca3a46aaef5062c8064

  • \Program Files\7-Zip\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • \Program Files\7-Zip\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • \Program Files\Common Files\Microsoft Shared\update.exe

    Filesize

    72KB

    MD5

    a8d68fc37481c224452a37a72f7b3dde

    SHA1

    ed91f4f83dcc4155efb4ff8dc60c2e7d72a42059

    SHA256

    88e87877a99a034611b53a7e171f65490c402663b509602ce341ff69814034c3

    SHA512

    258b1172dc9b7d546d0a6ec4ce748e1cb620253ecb3c11118925e3bfc3d67b2875d357a57cd0fad8f617535a99de052612a074258d488737752a4f919ed5d963

  • \Program Files\Common Files\Services\data.exe

    Filesize

    72KB

    MD5

    a8d68fc37481c224452a37a72f7b3dde

    SHA1

    ed91f4f83dcc4155efb4ff8dc60c2e7d72a42059

    SHA256

    88e87877a99a034611b53a7e171f65490c402663b509602ce341ff69814034c3

    SHA512

    258b1172dc9b7d546d0a6ec4ce748e1cb620253ecb3c11118925e3bfc3d67b2875d357a57cd0fad8f617535a99de052612a074258d488737752a4f919ed5d963

  • \Program Files\Common Files\Services\data.exe

    Filesize

    72KB

    MD5

    a8d68fc37481c224452a37a72f7b3dde

    SHA1

    ed91f4f83dcc4155efb4ff8dc60c2e7d72a42059

    SHA256

    88e87877a99a034611b53a7e171f65490c402663b509602ce341ff69814034c3

    SHA512

    258b1172dc9b7d546d0a6ec4ce748e1cb620253ecb3c11118925e3bfc3d67b2875d357a57cd0fad8f617535a99de052612a074258d488737752a4f919ed5d963

  • \Program Files\Common Files\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • \Program Files\Common Files\backup.exe

    Filesize

    72KB

    MD5

    16b6b2b88bf4127d39377c337181ff17

    SHA1

    a54745465ab570f8e7ffe634638b935455a8df81

    SHA256

    211d3e417088ec63d2457ce71bc4870027d855c96ac50192a1fea114e4bc6f80

    SHA512

    6c2484de91bf02fe65c429a7f5ae7548726aca08de5b95a8f74e7318c4aa77a96cd9ead1b518743ca4a7d71f49b060d474be2e716a90b2a5082e8f3467cde4f7

  • \Program Files\DVD Maker\backup.exe

    Filesize

    72KB

    MD5

    d2acc7e2052ed96193cd409c7cd69bfe

    SHA1

    40b32f34ee1776886abdd64004654f7b92f57c6b

    SHA256

    c19aa1a4d28755d0fb65c63517c0d2b68d755f285531f8f8f7fc6d12868d61ca

    SHA512

    b891f6dbd0a725fc6ec430a19b4b1f8df311b21be24fbfbc1f8e96825f952185445952e004016227fb4487d89dc59461939b5161f81d6cef5485c1292e027cdd

  • \Program Files\DVD Maker\backup.exe

    Filesize

    72KB

    MD5

    d2acc7e2052ed96193cd409c7cd69bfe

    SHA1

    40b32f34ee1776886abdd64004654f7b92f57c6b

    SHA256

    c19aa1a4d28755d0fb65c63517c0d2b68d755f285531f8f8f7fc6d12868d61ca

    SHA512

    b891f6dbd0a725fc6ec430a19b4b1f8df311b21be24fbfbc1f8e96825f952185445952e004016227fb4487d89dc59461939b5161f81d6cef5485c1292e027cdd

  • \Program Files\Google\backup.exe

    Filesize

    72KB

    MD5

    9b04ab0dd0818fa60a7c6f936ee6d1ca

    SHA1

    9f5b89495083316f609e6f93827d2c72204f52f4

    SHA256

    87cbb5390ecbaac0e89edd33aa4348a9d3fe881328f4f497e6f48f3bc59a9a08

    SHA512

    8cf6f2125618fb4c652a1b81c2ac594c6556aeeb4aa09ba8ede6abda709968ad274abf5473494315f4814086f06ede516c7458235084da9d51028bbee569c1bc

  • \Program Files\Google\backup.exe

    Filesize

    72KB

    MD5

    9b04ab0dd0818fa60a7c6f936ee6d1ca

    SHA1

    9f5b89495083316f609e6f93827d2c72204f52f4

    SHA256

    87cbb5390ecbaac0e89edd33aa4348a9d3fe881328f4f497e6f48f3bc59a9a08

    SHA512

    8cf6f2125618fb4c652a1b81c2ac594c6556aeeb4aa09ba8ede6abda709968ad274abf5473494315f4814086f06ede516c7458235084da9d51028bbee569c1bc

  • \Program Files\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • \Program Files\backup.exe

    Filesize

    72KB

    MD5

    026992dafae483ecaa1d47bd50e0d26e

    SHA1

    6743503220fffc4b5d736ede92c99bd3ee804169

    SHA256

    19bac4709859e0e7c82f448404c8b4d042f9d0c1cc273207455e822f332d3b08

    SHA512

    d1c3d94792be492aeb2d0745883472a5fd197801585a770d4eaa153e03a7f5dd5c993653a67012595f7a88cfba32eba3418da493e1a980070742733b91f88cde

  • \Users\Admin\AppData\Local\Temp\3654185654\backup.exe

    Filesize

    72KB

    MD5

    0516b016d3abc445014b8d52408ff7b8

    SHA1

    54d0bf18ac543ac006011b0f536cef30783fc341

    SHA256

    4847d627350bad7f9ae7d803a63f8b248da2cf6a6e17f45322dc4886e7f4e402

    SHA512

    02acbefd8b3ea5f02eb7842f238914b3026a3897bf7c43093a8b67a258f6e1159fb53187249096238348ee7a9e703c033141ca9686c3e92b7304000d876c96a2

  • \Users\Admin\AppData\Local\Temp\3654185654\backup.exe

    Filesize

    72KB

    MD5

    0516b016d3abc445014b8d52408ff7b8

    SHA1

    54d0bf18ac543ac006011b0f536cef30783fc341

    SHA256

    4847d627350bad7f9ae7d803a63f8b248da2cf6a6e17f45322dc4886e7f4e402

    SHA512

    02acbefd8b3ea5f02eb7842f238914b3026a3897bf7c43093a8b67a258f6e1159fb53187249096238348ee7a9e703c033141ca9686c3e92b7304000d876c96a2

  • \Users\Admin\AppData\Local\Temp\Low\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\Low\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

    Filesize

    72KB

    MD5

    505e45dd3f78b169b0f3191e8a2d3218

    SHA1

    6a099d434e2008458bf4ee10ea67c8b4def1b0f4

    SHA256

    7588095202364f6ba3d452ca064aa8373e021c42a179cd713392b141f75eac18

    SHA512

    190e52d4c895f79521e609a18a9eb6faf875b5abca6c1c88fbeea8129e4d44ef1fbe50d0ae269f46aa9fe1ac338d304337fb6bd08202437f4e2dbe300c94d3ff

  • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

    Filesize

    72KB

    MD5

    505e45dd3f78b169b0f3191e8a2d3218

    SHA1

    6a099d434e2008458bf4ee10ea67c8b4def1b0f4

    SHA256

    7588095202364f6ba3d452ca064aa8373e021c42a179cd713392b141f75eac18

    SHA512

    190e52d4c895f79521e609a18a9eb6faf875b5abca6c1c88fbeea8129e4d44ef1fbe50d0ae269f46aa9fe1ac338d304337fb6bd08202437f4e2dbe300c94d3ff

  • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

    Filesize

    72KB

    MD5

    d911a8b596bf1d8586a5bd6af50397b8

    SHA1

    0e5d704c228b2d03dd4933a453eef82065829044

    SHA256

    f377a8d6135abba2f84a88fc894befdfe30dbe7baa8b7501bf6e54a6c06c1359

    SHA512

    0a238040b8f27f8a1f0e39dd96acc0928cb709bcb903a27604d127f6c6f3b6abb8fdffdb01e0cfedf65e16d0a0356bb046eb8b21d299cdda015bbac7183f39ec

  • \Users\backup.exe

    Filesize

    72KB

    MD5

    d9821f372f233bbdf8a6c7bd1f51c41a

    SHA1

    b733fc9cb5ac52f541678dbf2e58c1e0a97e74ea

    SHA256

    4d7b121ef4f85d0f8c2965390495086d92ed6e5f3154b5ac690411ce9cade66e

    SHA512

    9d1f37a728ad845c2ef656f1eca3afcfc51ecc83dc2efa43b8853d5d629eaf1dd89ee606e6161774494fd1e54628687aae9dda70408caedb89d6d551c724117c

  • \Users\backup.exe

    Filesize

    72KB

    MD5

    d9821f372f233bbdf8a6c7bd1f51c41a

    SHA1

    b733fc9cb5ac52f541678dbf2e58c1e0a97e74ea

    SHA256

    4d7b121ef4f85d0f8c2965390495086d92ed6e5f3154b5ac690411ce9cade66e

    SHA512

    9d1f37a728ad845c2ef656f1eca3afcfc51ecc83dc2efa43b8853d5d629eaf1dd89ee606e6161774494fd1e54628687aae9dda70408caedb89d6d551c724117c

  • memory/1524-100-0x0000000074401000-0x0000000074403000-memory.dmp

    Filesize

    8KB

  • memory/1524-98-0x0000000076391000-0x0000000076393000-memory.dmp

    Filesize

    8KB