Analysis

  • max time kernel
    191s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 19:59

General

  • Target

    bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe

  • Size

    72KB

  • MD5

    5a1b0008e46d12e2e3be17ada696a6e0

  • SHA1

    5b9ff7f42f4b86bc3599452c2a9dfd06878c2c56

  • SHA256

    bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7

  • SHA512

    d8beea984c9f127358371d6677cab10a9b3736c701dff38a0bbfede2024e9c5f53f22fd5e11c1e20fd0a40928114aff602ed06f894afaac33add8297ece120d3

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2G:ipQNwC3BEddsEqOt/hyJF+x3BEJwRra

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe
    "C:\Users\Admin\AppData\Local\Temp\bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\2455264390\backup.exe
      C:\Users\Admin\AppData\Local\Temp\2455264390\backup.exe C:\Users\Admin\AppData\Local\Temp\2455264390\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\backup.exe
        \backup.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1056
        • C:\PerfLogs\data.exe
          C:\PerfLogs\data.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\PerfLogs\Admin\backup.exe
            C:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1624
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Program Files\7-Zip\System Restore.exe
            "C:\Program Files\7-Zip\System Restore.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:572
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1708
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            PID:524
            • C:\Program Files\Common Files\Microsoft Shared\backup.exe
              "C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              PID:652
              • C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:964
              • C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:1092
                • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\
                  8⤵
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:436
                • C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1968
                • C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1324
                • C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:748
                • C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1720
                • C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\
                  8⤵
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:624
                • C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1348
                • C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\
                  8⤵
                  • Executes dropped EXE
                  PID:1912
                • C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  PID:304
                • C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • System policy modification
                  PID:1680
                • C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  PID:1640
                • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Drops file in Program Files directory
                  • System policy modification
                  PID:748
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • System policy modification
                    PID:948
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    PID:2000
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\
                    9⤵
                    • Disables RegEdit via registry modification
                    PID:276
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\System Restore.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\
                    9⤵
                      PID:1300
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:676
                  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    PID:976
                  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    PID:1504
                  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    PID:1660
                  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\
                    8⤵
                      PID:296
                    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe
                      "C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\
                      8⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      PID:1624
                • C:\Program Files\Common Files\Services\backup.exe
                  "C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\
                  6⤵
                  • Modifies visibility of file extensions in Explorer
                  • System policy modification
                  PID:1620
                • C:\Program Files\Common Files\SpeechEngines\backup.exe
                  "C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\
                  6⤵
                  • Disables RegEdit via registry modification
                  • Drops file in Program Files directory
                  PID:484
                  • C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe
                    "C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\
                    7⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Drops file in Program Files directory
                    PID:1300
                • C:\Program Files\Common Files\System\backup.exe
                  "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
                  6⤵
                    PID:1976
                    • C:\Program Files\Common Files\System\ado\backup.exe
                      "C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\
                      7⤵
                      • Drops file in Program Files directory
                      PID:304
                      • C:\Program Files\Common Files\System\ado\de-DE\backup.exe
                        "C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\
                        8⤵
                        • Modifies visibility of file extensions in Explorer
                        • System policy modification
                        PID:1360
                • C:\Program Files\DVD Maker\backup.exe
                  "C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\
                  5⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:776
                  • C:\Program Files\DVD Maker\de-DE\backup.exe
                    "C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\
                    6⤵
                    • Modifies visibility of file extensions in Explorer
                    • System policy modification
                    PID:1484
                  • C:\Program Files\DVD Maker\en-US\backup.exe
                    "C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\
                    6⤵
                    • Modifies visibility of file extensions in Explorer
                    PID:1004
                  • C:\Program Files\DVD Maker\es-ES\backup.exe
                    "C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\
                    6⤵
                    • Modifies visibility of file extensions in Explorer
                    • System policy modification
                    PID:436
                  • C:\Program Files\DVD Maker\fr-FR\backup.exe
                    "C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\
                    6⤵
                      PID:1720
                • C:\Program Files (x86)\backup.exe
                  "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
                  4⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:812
                  • C:\Program Files (x86)\Adobe\backup.exe
                    "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:888
                    • C:\Program Files (x86)\Adobe\Reader 9.0\System Restore.exe
                      "C:\Program Files (x86)\Adobe\Reader 9.0\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\
                      6⤵
                      • Disables RegEdit via registry modification
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in Program Files directory
                      • Suspicious use of SetWindowsHookEx
                      PID:1340
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\
                        7⤵
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • System policy modification
                        PID:1348
                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe
                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\
                        7⤵
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in Program Files directory
                        • Suspicious use of SetWindowsHookEx
                        PID:1864
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\
                          8⤵
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:816
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:1640
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:1728
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\
                          8⤵
                          • Modifies visibility of file extensions in Explorer
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • Suspicious use of SetWindowsHookEx
                          PID:1696
                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe
                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:1104
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\
                          8⤵
                          • Modifies visibility of file extensions in Explorer
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:644
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\
                          8⤵
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:964
                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe
                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\
                            9⤵
                            • Modifies visibility of file extensions in Explorer
                            • Disables RegEdit via registry modification
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1624
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:1772
                        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\data.exe
                          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\
                          8⤵
                          • Modifies visibility of file extensions in Explorer
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • Suspicious use of SetWindowsHookEx
                          PID:1552
                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe
                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\
                            9⤵
                            • Disables RegEdit via registry modification
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            • Suspicious use of SetWindowsHookEx
                            PID:1660
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1692
                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe
                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\
                            9⤵
                            • Modifies visibility of file extensions in Explorer
                            • Executes dropped EXE
                            PID:1648
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\
                              10⤵
                              • Modifies visibility of file extensions in Explorer
                              • Drops file in Program Files directory
                              • Suspicious use of SetWindowsHookEx
                              PID:368
                              • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe
                                "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\
                                11⤵
                                • Disables RegEdit via registry modification
                                • System policy modification
                                PID:1752
                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe
                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\
                            9⤵
                            • Disables RegEdit via registry modification
                            PID:876
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\
                              10⤵
                              • System policy modification
                              PID:1988
                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\update.exe
                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\
                            9⤵
                            • Drops file in Program Files directory
                            • System policy modification
                            PID:1564
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\
                              10⤵
                                PID:896
                          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe
                            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\
                            8⤵
                            • Modifies visibility of file extensions in Explorer
                            • Disables RegEdit via registry modification
                            • Drops file in Program Files directory
                            PID:1080
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\
                              9⤵
                                PID:748
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\
                              8⤵
                              • Disables RegEdit via registry modification
                              PID:1588
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\
                              8⤵
                                PID:1236
                            • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe
                              "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\
                              7⤵
                              • Disables RegEdit via registry modification
                              • Drops file in Program Files directory
                              • System policy modification
                              PID:1784
                              • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe
                                "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\
                                8⤵
                                • Drops file in Program Files directory
                                PID:1708
                                • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe
                                  "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\
                                  9⤵
                                  • Modifies visibility of file extensions in Explorer
                                  PID:1532
                              • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe
                                "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\
                                8⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                PID:1104
                              • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe
                                "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\
                                8⤵
                                • Modifies visibility of file extensions in Explorer
                                • Drops file in Program Files directory
                                PID:1988
                                • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe
                                  "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\
                                  9⤵
                                  • Disables RegEdit via registry modification
                                  • System policy modification
                                  PID:1348
                                • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe
                                  "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\
                                  9⤵
                                  • Modifies visibility of file extensions in Explorer
                                  • Disables RegEdit via registry modification
                                  • Drops file in Program Files directory
                                  • System policy modification
                                  PID:1236
                                  • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe
                                    "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\
                                    10⤵
                                      PID:1660
                          • C:\Program Files (x86)\Common Files\backup.exe
                            "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
                            5⤵
                            • Modifies visibility of file extensions in Explorer
                            • Disables RegEdit via registry modification
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:1664
                            • C:\Program Files (x86)\Common Files\Adobe\backup.exe
                              "C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\
                              6⤵
                              • Disables RegEdit via registry modification
                              • Drops file in Program Files directory
                              PID:272
                              • C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe
                                "C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\
                                7⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                • Drops file in Program Files directory
                                PID:1304
                              • C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe
                                "C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\
                                7⤵
                                • Modifies visibility of file extensions in Explorer
                                • System policy modification
                                PID:1148
                                • C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe
                                  "C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\
                                  8⤵
                                  • Modifies visibility of file extensions in Explorer
                                  • Drops file in Program Files directory
                                  • System policy modification
                                  PID:1856
                                  • C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe
                                    "C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\
                                    9⤵
                                    • Modifies visibility of file extensions in Explorer
                                    • Drops file in Program Files directory
                                    PID:1828
                                    • C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe
                                      "C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\
                                      10⤵
                                        PID:368
                          • C:\Users\backup.exe
                            C:\Users\backup.exe C:\Users\
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1976
                            • C:\Users\Admin\backup.exe
                              C:\Users\Admin\backup.exe C:\Users\Admin\
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • System policy modification
                              PID:1232
                              • C:\Users\Admin\Contacts\backup.exe
                                C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
                                6⤵
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:332
                              • C:\Users\Admin\Desktop\backup.exe
                                C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:1676
                              • C:\Users\Admin\Documents\backup.exe
                                C:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:776
                              • C:\Users\Admin\Downloads\backup.exe
                                C:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:988
                              • C:\Users\Admin\Favorites\backup.exe
                                C:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:548
                              • C:\Users\Admin\Links\backup.exe
                                C:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\
                                6⤵
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                PID:1648
                              • C:\Users\Admin\Music\backup.exe
                                C:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:296
                              • C:\Users\Admin\Pictures\data.exe
                                C:\Users\Admin\Pictures\data.exe C:\Users\Admin\Pictures\
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:564
                              • C:\Users\Admin\Saved Games\backup.exe
                                "C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\
                                6⤵
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:1616
                              • C:\Users\Admin\Searches\backup.exe
                                C:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1664
                              • C:\Users\Admin\Videos\backup.exe
                                C:\Users\Admin\Videos\backup.exe C:\Users\Admin\Videos\
                                6⤵
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:1800
                            • C:\Users\Public\backup.exe
                              C:\Users\Public\backup.exe C:\Users\Public\
                              5⤵
                              • Modifies visibility of file extensions in Explorer
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              • System policy modification
                              PID:1540
                              • C:\Users\Public\Documents\backup.exe
                                C:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:1460
                              • C:\Users\Public\Downloads\backup.exe
                                C:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1216
                              • C:\Users\Public\Music\backup.exe
                                C:\Users\Public\Music\backup.exe C:\Users\Public\Music\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:744
                                • C:\Users\Public\Music\Sample Music\backup.exe
                                  "C:\Users\Public\Music\Sample Music\backup.exe" C:\Users\Public\Music\Sample Music\
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1456
                              • C:\Users\Public\Pictures\data.exe
                                C:\Users\Public\Pictures\data.exe C:\Users\Public\Pictures\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                • System policy modification
                                PID:1596
                                • C:\Users\Public\Pictures\Sample Pictures\backup.exe
                                  "C:\Users\Public\Pictures\Sample Pictures\backup.exe" C:\Users\Public\Pictures\Sample Pictures\
                                  7⤵
                                  • Modifies visibility of file extensions in Explorer
                                  • System policy modification
                                  PID:572
                              • C:\Users\Public\Recorded TV\backup.exe
                                "C:\Users\Public\Recorded TV\backup.exe" C:\Users\Public\Recorded TV\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • Disables RegEdit via registry modification
                                • System policy modification
                                PID:1656
                                • C:\Users\Public\Recorded TV\Sample Media\backup.exe
                                  "C:\Users\Public\Recorded TV\Sample Media\backup.exe" C:\Users\Public\Recorded TV\Sample Media\
                                  7⤵
                                  • System policy modification
                                  PID:1684
                              • C:\Users\Public\Videos\backup.exe
                                C:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\
                                6⤵
                                • Modifies visibility of file extensions in Explorer
                                • System policy modification
                                PID:1912
                                • C:\Users\Public\Videos\Sample Videos\backup.exe
                                  "C:\Users\Public\Videos\Sample Videos\backup.exe" C:\Users\Public\Videos\Sample Videos\
                                  7⤵
                                    PID:1216
                            • C:\Windows\backup.exe
                              C:\Windows\backup.exe C:\Windows\
                              4⤵
                              • Disables RegEdit via registry modification
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of SetWindowsHookEx
                              PID:772
                              • C:\Windows\addins\backup.exe
                                C:\Windows\addins\backup.exe C:\Windows\addins\
                                5⤵
                                • Disables RegEdit via registry modification
                                PID:1324
                              • C:\Windows\AppCompat\backup.exe
                                C:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\
                                5⤵
                                • System policy modification
                                PID:332
                              • C:\Windows\AppPatch\System Restore.exe
                                "C:\Windows\AppPatch\System Restore.exe" C:\Windows\AppPatch\
                                5⤵
                                • Modifies visibility of file extensions in Explorer
                                • Drops file in Windows directory
                                • System policy modification
                                PID:1232
                                • C:\Windows\AppPatch\AppPatch64\backup.exe
                                  C:\Windows\AppPatch\AppPatch64\backup.exe C:\Windows\AppPatch\AppPatch64\
                                  6⤵
                                  • Modifies visibility of file extensions in Explorer
                                  • Disables RegEdit via registry modification
                                  PID:1752
                                • C:\Windows\AppPatch\Custom\update.exe
                                  C:\Windows\AppPatch\Custom\update.exe C:\Windows\AppPatch\Custom\
                                  6⤵
                                    PID:1552
                          • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
                            C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
                            2⤵
                            • Modifies visibility of file extensions in Explorer
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:928
                          • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
                            C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:660
                          • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
                            "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
                            2⤵
                            • Modifies visibility of file extensions in Explorer
                            • Disables RegEdit via registry modification
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:1676
                          • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
                            "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
                            2⤵
                            • Modifies visibility of file extensions in Explorer
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:776
                          • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
                            C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:1072
                          • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe
                            C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\
                            2⤵
                            • Disables RegEdit via registry modification
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:1972

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\PerfLogs\Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          3fc841852b7582f6638a504e3149d301

                          SHA1

                          1d1ed31aba13c58ce5fe271785fc0657a4892b92

                          SHA256

                          51ee2266b05cdd6c779c154ee8b81ab25fae517b810a7ffdcdc22e48f7dd6077

                          SHA512

                          53a5576734de8b232a60ede67bac04d8bc822d244e7729064d62a8ac7580ad29d58e428a2f89efb69aa599db9f19521745cf1e190b7e2253b18eb18f14d8087d

                        • C:\PerfLogs\data.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • C:\PerfLogs\data.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • C:\Program Files (x86)\Adobe\backup.exe

                          Filesize

                          72KB

                          MD5

                          d62abddaaa4993dfca473fdb005f9f34

                          SHA1

                          ec35cc75a2ad58169590b4bfec0eb1cee914e11b

                          SHA256

                          07fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db

                          SHA512

                          7d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8

                        • C:\Program Files (x86)\Adobe\backup.exe

                          Filesize

                          72KB

                          MD5

                          d62abddaaa4993dfca473fdb005f9f34

                          SHA1

                          ec35cc75a2ad58169590b4bfec0eb1cee914e11b

                          SHA256

                          07fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db

                          SHA512

                          7d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8

                        • C:\Program Files (x86)\backup.exe

                          Filesize

                          72KB

                          MD5

                          52b0bd1c9d387d19175218d8600adbea

                          SHA1

                          011808a4a91756e8b3c873cbfaded6309d98eaa6

                          SHA256

                          c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941

                          SHA512

                          bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598

                        • C:\Program Files (x86)\backup.exe

                          Filesize

                          72KB

                          MD5

                          52b0bd1c9d387d19175218d8600adbea

                          SHA1

                          011808a4a91756e8b3c873cbfaded6309d98eaa6

                          SHA256

                          c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941

                          SHA512

                          bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598

                        • C:\Program Files\7-Zip\Lang\backup.exe

                          Filesize

                          72KB

                          MD5

                          f5ea260c68a3dba9161c44f0bc67c35b

                          SHA1

                          ba44bd464096cff4da1f213a0634ff5ccaff9ee1

                          SHA256

                          67fc7f8ee8bc3f7151e579b4d32f0cf48ff7bb1076b83233e30f6bb390b75b82

                          SHA512

                          7d9dc3379324496f6f18287057bc81077a16498f04d2916198c493da770692782cb3ad68ed63befd038b613f96dfada1bc3294f23179ed6dff663b76f6243c6b

                        • C:\Program Files\7-Zip\System Restore.exe

                          Filesize

                          72KB

                          MD5

                          ff3d9368259fb14d364ec5d6a5d0683b

                          SHA1

                          18f52b5f9de579bb7858c4187838dee6b242c95b

                          SHA256

                          8eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7

                          SHA512

                          1ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1

                        • C:\Program Files\7-Zip\System Restore.exe

                          Filesize

                          72KB

                          MD5

                          ff3d9368259fb14d364ec5d6a5d0683b

                          SHA1

                          18f52b5f9de579bb7858c4187838dee6b242c95b

                          SHA256

                          8eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7

                          SHA512

                          1ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1

                        • C:\Program Files\Common Files\backup.exe

                          Filesize

                          72KB

                          MD5

                          9f4784c1676fc9be983af3d76a9a5b25

                          SHA1

                          052ae1d936edd6bc84dfd4ec4c37157bf321750b

                          SHA256

                          d0a898b9f4570a00bf37e296d2acab43393ffedceed16ab77523dd2963cdb33d

                          SHA512

                          2bbafaffbcfafcc2d99d70b26194b35e6f770375adb702c44e7f970098c3e5e15111311c511402aae95e81db5bb994d48d7aa558bdd4aa8efd732f9341aa2fe3

                        • C:\Program Files\backup.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • C:\Program Files\backup.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • C:\Users\Admin\AppData\Local\Temp\2455264390\backup.exe

                          Filesize

                          72KB

                          MD5

                          65785c1b8e53821a156918891125f095

                          SHA1

                          bfea99b5c39a08a6655449627268ac48a9c631ab

                          SHA256

                          fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e

                          SHA512

                          772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660

                        • C:\Users\Admin\AppData\Local\Temp\2455264390\backup.exe

                          Filesize

                          72KB

                          MD5

                          65785c1b8e53821a156918891125f095

                          SHA1

                          bfea99b5c39a08a6655449627268ac48a9c631ab

                          SHA256

                          fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e

                          SHA512

                          772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660

                        • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

                          Filesize

                          72KB

                          MD5

                          e1784b31450c9c11f650188fa3e9eb17

                          SHA1

                          d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a

                          SHA256

                          4164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa

                          SHA512

                          190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f

                        • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

                          Filesize

                          72KB

                          MD5

                          6bd4fd1b629fd48172ad27495c469e07

                          SHA1

                          a76da089712ebb2561b2234e003a8b20f09cbd31

                          SHA256

                          5c17d1d9cfb05293b96719789a699df237ef4b354510b14a7d854cd8b1b5cbd7

                          SHA512

                          df49c1e23fb1d07f8056afef2ae8f486da774a620def6ea006e1fb27336492056d7c4ad153969bee0b29d052e44bd9020c0a5dbbb4e0b110144569f1d8a909c7

                        • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

                          Filesize

                          72KB

                          MD5

                          e1784b31450c9c11f650188fa3e9eb17

                          SHA1

                          d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a

                          SHA256

                          4164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa

                          SHA512

                          190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f

                        • C:\Users\Admin\Contacts\backup.exe

                          Filesize

                          72KB

                          MD5

                          e5f5b4d52db5b06d08a9c19e0ad9e653

                          SHA1

                          a2faaeb0673d7a01186cefe4b9aef3d46b97a326

                          SHA256

                          d2fb82f0acd0ad5923e010a5aa6537eeaa7588f563dbbb79cd28103ccba8c6c1

                          SHA512

                          f18f59ca8df11d7c991012f14fe1f5f123e4a777a54605580553e1add79835fb351afbac4207c698836d38f6ba454bb6cdaf166df0947fee7b1ed1512fc7c689

                        • C:\Users\Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          7364b070a3eccf33b694f1b49d5a7a1b

                          SHA1

                          334e99f453814cd1c9acbb64c70787b1800c0851

                          SHA256

                          7f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418

                          SHA512

                          6b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42

                        • C:\Users\Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          7364b070a3eccf33b694f1b49d5a7a1b

                          SHA1

                          334e99f453814cd1c9acbb64c70787b1800c0851

                          SHA256

                          7f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418

                          SHA512

                          6b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42

                        • C:\Users\backup.exe

                          Filesize

                          72KB

                          MD5

                          788fe7c5661cc76f189420f69d3e39c4

                          SHA1

                          db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a

                          SHA256

                          8db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce

                          SHA512

                          f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135

                        • C:\Users\backup.exe

                          Filesize

                          72KB

                          MD5

                          788fe7c5661cc76f189420f69d3e39c4

                          SHA1

                          db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a

                          SHA256

                          8db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce

                          SHA512

                          f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135

                        • C:\backup.exe

                          Filesize

                          72KB

                          MD5

                          0cfebb05f69250eb03884b2afb6e4d5c

                          SHA1

                          20fa652f8c796c266fc7b1c761bc6a61aba35988

                          SHA256

                          5afcd3abcdd8752f6d9188f29593b5e5ac322cd820f75de5db9cee66ec77d88b

                          SHA512

                          5dc68b8630f85477cb03a68432f3dc1ea56d1ace4d38f34969cdb8b9d62a72bb11cbe1ac0e20af24bfb28e2c18a3bd8ede32a983f4069b3ca7544f631d3f0e21

                        • C:\backup.exe

                          Filesize

                          72KB

                          MD5

                          0cfebb05f69250eb03884b2afb6e4d5c

                          SHA1

                          20fa652f8c796c266fc7b1c761bc6a61aba35988

                          SHA256

                          5afcd3abcdd8752f6d9188f29593b5e5ac322cd820f75de5db9cee66ec77d88b

                          SHA512

                          5dc68b8630f85477cb03a68432f3dc1ea56d1ace4d38f34969cdb8b9d62a72bb11cbe1ac0e20af24bfb28e2c18a3bd8ede32a983f4069b3ca7544f631d3f0e21

                        • \PerfLogs\Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          3fc841852b7582f6638a504e3149d301

                          SHA1

                          1d1ed31aba13c58ce5fe271785fc0657a4892b92

                          SHA256

                          51ee2266b05cdd6c779c154ee8b81ab25fae517b810a7ffdcdc22e48f7dd6077

                          SHA512

                          53a5576734de8b232a60ede67bac04d8bc822d244e7729064d62a8ac7580ad29d58e428a2f89efb69aa599db9f19521745cf1e190b7e2253b18eb18f14d8087d

                        • \PerfLogs\Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          3fc841852b7582f6638a504e3149d301

                          SHA1

                          1d1ed31aba13c58ce5fe271785fc0657a4892b92

                          SHA256

                          51ee2266b05cdd6c779c154ee8b81ab25fae517b810a7ffdcdc22e48f7dd6077

                          SHA512

                          53a5576734de8b232a60ede67bac04d8bc822d244e7729064d62a8ac7580ad29d58e428a2f89efb69aa599db9f19521745cf1e190b7e2253b18eb18f14d8087d

                        • \PerfLogs\data.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • \PerfLogs\data.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • \Program Files (x86)\Adobe\backup.exe

                          Filesize

                          72KB

                          MD5

                          d62abddaaa4993dfca473fdb005f9f34

                          SHA1

                          ec35cc75a2ad58169590b4bfec0eb1cee914e11b

                          SHA256

                          07fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db

                          SHA512

                          7d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8

                        • \Program Files (x86)\Adobe\backup.exe

                          Filesize

                          72KB

                          MD5

                          d62abddaaa4993dfca473fdb005f9f34

                          SHA1

                          ec35cc75a2ad58169590b4bfec0eb1cee914e11b

                          SHA256

                          07fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db

                          SHA512

                          7d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8

                        • \Program Files (x86)\backup.exe

                          Filesize

                          72KB

                          MD5

                          52b0bd1c9d387d19175218d8600adbea

                          SHA1

                          011808a4a91756e8b3c873cbfaded6309d98eaa6

                          SHA256

                          c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941

                          SHA512

                          bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598

                        • \Program Files (x86)\backup.exe

                          Filesize

                          72KB

                          MD5

                          52b0bd1c9d387d19175218d8600adbea

                          SHA1

                          011808a4a91756e8b3c873cbfaded6309d98eaa6

                          SHA256

                          c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941

                          SHA512

                          bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598

                        • \Program Files\7-Zip\Lang\backup.exe

                          Filesize

                          72KB

                          MD5

                          f5ea260c68a3dba9161c44f0bc67c35b

                          SHA1

                          ba44bd464096cff4da1f213a0634ff5ccaff9ee1

                          SHA256

                          67fc7f8ee8bc3f7151e579b4d32f0cf48ff7bb1076b83233e30f6bb390b75b82

                          SHA512

                          7d9dc3379324496f6f18287057bc81077a16498f04d2916198c493da770692782cb3ad68ed63befd038b613f96dfada1bc3294f23179ed6dff663b76f6243c6b

                        • \Program Files\7-Zip\Lang\backup.exe

                          Filesize

                          72KB

                          MD5

                          f5ea260c68a3dba9161c44f0bc67c35b

                          SHA1

                          ba44bd464096cff4da1f213a0634ff5ccaff9ee1

                          SHA256

                          67fc7f8ee8bc3f7151e579b4d32f0cf48ff7bb1076b83233e30f6bb390b75b82

                          SHA512

                          7d9dc3379324496f6f18287057bc81077a16498f04d2916198c493da770692782cb3ad68ed63befd038b613f96dfada1bc3294f23179ed6dff663b76f6243c6b

                        • \Program Files\7-Zip\System Restore.exe

                          Filesize

                          72KB

                          MD5

                          ff3d9368259fb14d364ec5d6a5d0683b

                          SHA1

                          18f52b5f9de579bb7858c4187838dee6b242c95b

                          SHA256

                          8eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7

                          SHA512

                          1ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1

                        • \Program Files\7-Zip\System Restore.exe

                          Filesize

                          72KB

                          MD5

                          ff3d9368259fb14d364ec5d6a5d0683b

                          SHA1

                          18f52b5f9de579bb7858c4187838dee6b242c95b

                          SHA256

                          8eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7

                          SHA512

                          1ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1

                        • \Program Files\Common Files\backup.exe

                          Filesize

                          72KB

                          MD5

                          9f4784c1676fc9be983af3d76a9a5b25

                          SHA1

                          052ae1d936edd6bc84dfd4ec4c37157bf321750b

                          SHA256

                          d0a898b9f4570a00bf37e296d2acab43393ffedceed16ab77523dd2963cdb33d

                          SHA512

                          2bbafaffbcfafcc2d99d70b26194b35e6f770375adb702c44e7f970098c3e5e15111311c511402aae95e81db5bb994d48d7aa558bdd4aa8efd732f9341aa2fe3

                        • \Program Files\Common Files\backup.exe

                          Filesize

                          72KB

                          MD5

                          9f4784c1676fc9be983af3d76a9a5b25

                          SHA1

                          052ae1d936edd6bc84dfd4ec4c37157bf321750b

                          SHA256

                          d0a898b9f4570a00bf37e296d2acab43393ffedceed16ab77523dd2963cdb33d

                          SHA512

                          2bbafaffbcfafcc2d99d70b26194b35e6f770375adb702c44e7f970098c3e5e15111311c511402aae95e81db5bb994d48d7aa558bdd4aa8efd732f9341aa2fe3

                        • \Program Files\backup.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • \Program Files\backup.exe

                          Filesize

                          72KB

                          MD5

                          33488ec9882579a9b58f4065ff96fe53

                          SHA1

                          55d13500de884384572faee08102b97e78104c26

                          SHA256

                          0b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49

                          SHA512

                          94ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da

                        • \Users\Admin\AppData\Local\Temp\2455264390\backup.exe

                          Filesize

                          72KB

                          MD5

                          65785c1b8e53821a156918891125f095

                          SHA1

                          bfea99b5c39a08a6655449627268ac48a9c631ab

                          SHA256

                          fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e

                          SHA512

                          772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660

                        • \Users\Admin\AppData\Local\Temp\2455264390\backup.exe

                          Filesize

                          72KB

                          MD5

                          65785c1b8e53821a156918891125f095

                          SHA1

                          bfea99b5c39a08a6655449627268ac48a9c631ab

                          SHA256

                          fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e

                          SHA512

                          772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660

                        • \Users\Admin\AppData\Local\Temp\Low\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • \Users\Admin\AppData\Local\Temp\Low\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

                          Filesize

                          72KB

                          MD5

                          e1784b31450c9c11f650188fa3e9eb17

                          SHA1

                          d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a

                          SHA256

                          4164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa

                          SHA512

                          190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f

                        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

                          Filesize

                          72KB

                          MD5

                          e1784b31450c9c11f650188fa3e9eb17

                          SHA1

                          d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a

                          SHA256

                          4164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa

                          SHA512

                          190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f

                        • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

                          Filesize

                          72KB

                          MD5

                          6bd4fd1b629fd48172ad27495c469e07

                          SHA1

                          a76da089712ebb2561b2234e003a8b20f09cbd31

                          SHA256

                          5c17d1d9cfb05293b96719789a699df237ef4b354510b14a7d854cd8b1b5cbd7

                          SHA512

                          df49c1e23fb1d07f8056afef2ae8f486da774a620def6ea006e1fb27336492056d7c4ad153969bee0b29d052e44bd9020c0a5dbbb4e0b110144569f1d8a909c7

                        • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

                          Filesize

                          72KB

                          MD5

                          6bd4fd1b629fd48172ad27495c469e07

                          SHA1

                          a76da089712ebb2561b2234e003a8b20f09cbd31

                          SHA256

                          5c17d1d9cfb05293b96719789a699df237ef4b354510b14a7d854cd8b1b5cbd7

                          SHA512

                          df49c1e23fb1d07f8056afef2ae8f486da774a620def6ea006e1fb27336492056d7c4ad153969bee0b29d052e44bd9020c0a5dbbb4e0b110144569f1d8a909c7

                        • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          45083fc7f10baca47f763bb92d103dbd

                          SHA1

                          63f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0

                          SHA256

                          698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55

                          SHA512

                          3586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88

                        • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

                          Filesize

                          72KB

                          MD5

                          e1784b31450c9c11f650188fa3e9eb17

                          SHA1

                          d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a

                          SHA256

                          4164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa

                          SHA512

                          190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f

                        • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

                          Filesize

                          72KB

                          MD5

                          e1784b31450c9c11f650188fa3e9eb17

                          SHA1

                          d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a

                          SHA256

                          4164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa

                          SHA512

                          190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f

                        • \Users\Admin\Contacts\backup.exe

                          Filesize

                          72KB

                          MD5

                          e5f5b4d52db5b06d08a9c19e0ad9e653

                          SHA1

                          a2faaeb0673d7a01186cefe4b9aef3d46b97a326

                          SHA256

                          d2fb82f0acd0ad5923e010a5aa6537eeaa7588f563dbbb79cd28103ccba8c6c1

                          SHA512

                          f18f59ca8df11d7c991012f14fe1f5f123e4a777a54605580553e1add79835fb351afbac4207c698836d38f6ba454bb6cdaf166df0947fee7b1ed1512fc7c689

                        • \Users\Admin\Contacts\backup.exe

                          Filesize

                          72KB

                          MD5

                          e5f5b4d52db5b06d08a9c19e0ad9e653

                          SHA1

                          a2faaeb0673d7a01186cefe4b9aef3d46b97a326

                          SHA256

                          d2fb82f0acd0ad5923e010a5aa6537eeaa7588f563dbbb79cd28103ccba8c6c1

                          SHA512

                          f18f59ca8df11d7c991012f14fe1f5f123e4a777a54605580553e1add79835fb351afbac4207c698836d38f6ba454bb6cdaf166df0947fee7b1ed1512fc7c689

                        • \Users\Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          7364b070a3eccf33b694f1b49d5a7a1b

                          SHA1

                          334e99f453814cd1c9acbb64c70787b1800c0851

                          SHA256

                          7f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418

                          SHA512

                          6b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42

                        • \Users\Admin\backup.exe

                          Filesize

                          72KB

                          MD5

                          7364b070a3eccf33b694f1b49d5a7a1b

                          SHA1

                          334e99f453814cd1c9acbb64c70787b1800c0851

                          SHA256

                          7f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418

                          SHA512

                          6b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42

                        • \Users\backup.exe

                          Filesize

                          72KB

                          MD5

                          788fe7c5661cc76f189420f69d3e39c4

                          SHA1

                          db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a

                          SHA256

                          8db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce

                          SHA512

                          f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135

                        • \Users\backup.exe

                          Filesize

                          72KB

                          MD5

                          788fe7c5661cc76f189420f69d3e39c4

                          SHA1

                          db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a

                          SHA256

                          8db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce

                          SHA512

                          f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135

                        • memory/296-234-0x0000000000000000-mapping.dmp

                        • memory/332-168-0x0000000000000000-mapping.dmp

                        • memory/436-206-0x0000000000000000-mapping.dmp

                        • memory/524-172-0x0000000000000000-mapping.dmp

                        • memory/548-212-0x0000000000000000-mapping.dmp

                        • memory/564-238-0x0000000000000000-mapping.dmp

                        • memory/572-133-0x0000000000000000-mapping.dmp

                        • memory/624-248-0x0000000000000000-mapping.dmp

                        • memory/644-252-0x0000000000000000-mapping.dmp

                        • memory/652-182-0x0000000000000000-mapping.dmp

                        • memory/660-70-0x0000000000000000-mapping.dmp

                        • memory/744-290-0x0000000000000000-mapping.dmp

                        • memory/748-231-0x0000000000000000-mapping.dmp

                        • memory/776-196-0x0000000000000000-mapping.dmp

                        • memory/776-84-0x0000000000000000-mapping.dmp

                        • memory/812-126-0x0000000000000000-mapping.dmp

                        • memory/816-207-0x0000000000000000-mapping.dmp

                        • memory/888-154-0x0000000000000000-mapping.dmp

                        • memory/928-64-0x0000000000000000-mapping.dmp

                        • memory/964-191-0x0000000000000000-mapping.dmp

                        • memory/964-261-0x0000000000000000-mapping.dmp

                        • memory/988-203-0x0000000000000000-mapping.dmp

                        • memory/1036-113-0x0000000000000000-mapping.dmp

                        • memory/1056-82-0x0000000000000000-mapping.dmp

                        • memory/1072-107-0x0000000000000000-mapping.dmp

                        • memory/1080-303-0x0000000000000000-mapping.dmp

                        • memory/1092-200-0x0000000000000000-mapping.dmp

                        • memory/1104-243-0x0000000000000000-mapping.dmp

                        • memory/1216-284-0x0000000000000000-mapping.dmp

                        • memory/1232-149-0x0000000000000000-mapping.dmp

                        • memory/1324-224-0x0000000000000000-mapping.dmp

                        • memory/1340-179-0x0000000000000000-mapping.dmp

                        • memory/1348-258-0x0000000000000000-mapping.dmp

                        • memory/1348-185-0x0000000000000000-mapping.dmp

                        • memory/1352-58-0x0000000000000000-mapping.dmp

                        • memory/1456-297-0x0000000000000000-mapping.dmp

                        • memory/1460-277-0x0000000000000000-mapping.dmp

                        • memory/1540-274-0x0000000000000000-mapping.dmp

                        • memory/1552-278-0x0000000000000000-mapping.dmp

                        • memory/1592-94-0x0000000000000000-mapping.dmp

                        • memory/1616-244-0x0000000000000000-mapping.dmp

                        • memory/1620-302-0x0000000000000000-mapping.dmp

                        • memory/1624-265-0x0000000000000000-mapping.dmp

                        • memory/1624-101-0x0000000000000000-mapping.dmp

                        • memory/1640-215-0x0000000000000000-mapping.dmp

                        • memory/1648-296-0x0000000000000000-mapping.dmp

                        • memory/1648-225-0x0000000000000000-mapping.dmp

                        • memory/1660-283-0x0000000000000000-mapping.dmp

                        • memory/1664-255-0x0000000000000000-mapping.dmp

                        • memory/1676-183-0x0000000000000000-mapping.dmp

                        • memory/1676-76-0x0000000000000000-mapping.dmp

                        • memory/1688-123-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

                          Filesize

                          8KB

                        • memory/1688-162-0x0000000074B21000-0x0000000074B23000-memory.dmp

                          Filesize

                          8KB

                        • memory/1692-289-0x0000000000000000-mapping.dmp

                        • memory/1696-228-0x0000000000000000-mapping.dmp

                        • memory/1708-151-0x0000000000000000-mapping.dmp

                        • memory/1720-237-0x0000000000000000-mapping.dmp

                        • memory/1728-218-0x0000000000000000-mapping.dmp

                        • memory/1772-271-0x0000000000000000-mapping.dmp

                        • memory/1784-304-0x0000000000000000-mapping.dmp

                        • memory/1800-264-0x0000000000000000-mapping.dmp

                        • memory/1864-194-0x0000000000000000-mapping.dmp

                        • memory/1912-266-0x0000000000000000-mapping.dmp

                        • memory/1968-221-0x0000000000000000-mapping.dmp

                        • memory/1972-118-0x0000000000000000-mapping.dmp

                        • memory/1976-139-0x0000000000000000-mapping.dmp