Analysis

  • max time kernel
    202s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 16:39

General

  • Target

    e0ca4a9a7aedf331c4427e7244c0b6b57bc3a18691a2a6947dafb3541c95786b.exe

  • Size

    72KB

  • MD5

    06a3d5ad999a6a4d2ee36f3a2a5b2529

  • SHA1

    8b89024e2be5032c0ccb9bd6935b16d1e3c1c709

  • SHA256

    e0ca4a9a7aedf331c4427e7244c0b6b57bc3a18691a2a6947dafb3541c95786b

  • SHA512

    37a32d050828da1a6e0de72046afbbca3b78797bc7b5ecf51554dd49aade9ff4767a26cc59f89c5a003591b3a8de32fc472807ba95fedfb6c273a0642b4ce2ca

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf22:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPC

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 43 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in Program Files directory 49 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0ca4a9a7aedf331c4427e7244c0b6b57bc3a18691a2a6947dafb3541c95786b.exe
    "C:\Users\Admin\AppData\Local\Temp\e0ca4a9a7aedf331c4427e7244c0b6b57bc3a18691a2a6947dafb3541c95786b.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\410628726\backup.exe
      C:\Users\Admin\AppData\Local\Temp\410628726\backup.exe C:\Users\Admin\AppData\Local\Temp\410628726\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1328
      • C:\update.exe
        \update.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:692
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\PerfLogs\Admin\backup.exe
            C:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1736
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1108
          • C:\Program Files\7-Zip\backup.exe
            "C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:908
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1604
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1436
            • C:\Program Files\Common Files\Microsoft Shared\backup.exe
              "C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1248
              • C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1008
              • C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:784
                • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1068
                • C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1788
                • C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1364
                • C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:936
                • C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:268
                • C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1636
                • C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1008
                • C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\
                  8⤵
                  • Executes dropped EXE
                  PID:1976
              • C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:600
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\System Restore.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1360
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1348
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2032
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:388
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\
                  8⤵
                    PID:1464
                • C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:544
                  • C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:1548
                • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1976
                • C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1612
                • C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1692
                • C:\Program Files\Common Files\Microsoft Shared\Triedit\data.exe
                  "C:\Program Files\Common Files\Microsoft Shared\Triedit\data.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\
                  7⤵
                  • Executes dropped EXE
                  PID:2028
                • C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\
                  7⤵
                  • Executes dropped EXE
                  PID:1856
              • C:\Program Files\Common Files\Services\System Restore.exe
                "C:\Program Files\Common Files\Services\System Restore.exe" C:\Program Files\Common Files\Services\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:856
              • C:\Program Files\Common Files\SpeechEngines\backup.exe
                "C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1596
                • C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe
                  "C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1748
              • C:\Program Files\Common Files\System\backup.exe
                "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:680
            • C:\Program Files\DVD Maker\backup.exe
              "C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:592
              • C:\Program Files\DVD Maker\de-DE\backup.exe
                "C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1796
              • C:\Program Files\DVD Maker\en-US\backup.exe
                "C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:876
              • C:\Program Files\DVD Maker\es-ES\backup.exe
                "C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1272
            • C:\Program Files\Google\backup.exe
              "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1984
              • C:\Program Files\Google\Chrome\backup.exe
                "C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1052
                • C:\Program Files\Google\Chrome\Application\backup.exe
                  "C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1336
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:596
            • C:\Program Files\Internet Explorer\backup.exe
              "C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\
              5⤵
              • Executes dropped EXE
              PID:1656
            • C:\Program Files\Java\backup.exe
              "C:\Program Files\Java\backup.exe" C:\Program Files\Java\
              5⤵
              • Executes dropped EXE
              PID:1268
            • C:\Program Files\Microsoft Games\backup.exe
              "C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\
              5⤵
              • Executes dropped EXE
              PID:568
          • C:\Program Files (x86)\backup.exe
            "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
            4⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1516
            • C:\Program Files (x86)\Adobe\backup.exe
              "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
              5⤵
              • Executes dropped EXE
              PID:1104
            • C:\Program Files (x86)\Common Files\backup.exe
              "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1564
            • C:\Program Files (x86)\Google\backup.exe
              "C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1964
            • C:\Program Files (x86)\Internet Explorer\backup.exe
              "C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\
              5⤵
                PID:1584
            • C:\Users\backup.exe
              C:\Users\backup.exe C:\Users\
              4⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1120
              • C:\Users\Admin\backup.exe
                C:\Users\Admin\backup.exe C:\Users\Admin\
                5⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:2024
                • C:\Users\Admin\Contacts\backup.exe
                  C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1184
                • C:\Users\Admin\Desktop\backup.exe
                  C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
                  6⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1648
                • C:\Users\Admin\Documents\System Restore.exe
                  "C:\Users\Admin\Documents\System Restore.exe" C:\Users\Admin\Documents\
                  6⤵
                  • Executes dropped EXE
                  PID:1760
                • C:\Users\Admin\Downloads\backup.exe
                  C:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\
                  6⤵
                    PID:1588
                • C:\Users\Public\backup.exe
                  C:\Users\Public\backup.exe C:\Users\Public\
                  5⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1696
                  • C:\Users\Public\Documents\backup.exe
                    C:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\
                    6⤵
                    • Executes dropped EXE
                    PID:1500
              • C:\Windows\backup.exe
                C:\Windows\backup.exe C:\Windows\
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1680
          • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
            C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1324
          • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
            C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1116
          • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
            "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1484
          • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
            "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:592
          • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
            C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1912
          • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe
            C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1152

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PerfLogs\Admin\backup.exe

          Filesize

          72KB

          MD5

          04359ee98aef6208e83baaa1009c13c8

          SHA1

          24fb523df772a6a7aaa662f09b2538121c2fda93

          SHA256

          a5c582b09579963d48a8e6b6eea1ea762bb6cf04561ecad38cb7a44201fc8200

          SHA512

          394c56889963699dae11eac63cbea1a00a9eef13262e2467f2ce12e03c8b424fad28e6e633ea5d82553e12a0d12da7a06ab22bf79b7e7b59f8187b5c921b92be

        • C:\PerfLogs\Admin\backup.exe

          Filesize

          72KB

          MD5

          04359ee98aef6208e83baaa1009c13c8

          SHA1

          24fb523df772a6a7aaa662f09b2538121c2fda93

          SHA256

          a5c582b09579963d48a8e6b6eea1ea762bb6cf04561ecad38cb7a44201fc8200

          SHA512

          394c56889963699dae11eac63cbea1a00a9eef13262e2467f2ce12e03c8b424fad28e6e633ea5d82553e12a0d12da7a06ab22bf79b7e7b59f8187b5c921b92be

        • C:\PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          d0984109a88a4b7014a91bb1618ddb33

          SHA1

          5d5ec698e54adff17fc7aef494c4b08d2df2e2ec

          SHA256

          22f719e818b30ec900d586598ca63d9515ceaf1564e49f94b80439ca5af8d492

          SHA512

          c34d3507166278cff6fe92b7f5822ae670025c8bb1052f61efe1e13e2807394734e60c5f2d03eed1eeabe553db3128066dffd679d693b9e218590dbf702e041b

        • C:\PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          d0984109a88a4b7014a91bb1618ddb33

          SHA1

          5d5ec698e54adff17fc7aef494c4b08d2df2e2ec

          SHA256

          22f719e818b30ec900d586598ca63d9515ceaf1564e49f94b80439ca5af8d492

          SHA512

          c34d3507166278cff6fe92b7f5822ae670025c8bb1052f61efe1e13e2807394734e60c5f2d03eed1eeabe553db3128066dffd679d693b9e218590dbf702e041b

        • C:\Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          69c37a32f1a81ecc330a769682e2e4a0

          SHA1

          8fedc24cf6dfc9511910688a74a867653bf2ec01

          SHA256

          ae17dc9512c1c11d1263192f80dfb6321f5457e0f37366d076423fe9609ce9a8

          SHA512

          a15842e39a270d73fdd9d9788cab87f1be7a699ed9ddadfdf775a1319a97633bf7abbff531e208d63f09b94c22c6ef6c262efcd5b520803e55f86ffb56904ce7

        • C:\Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          69c37a32f1a81ecc330a769682e2e4a0

          SHA1

          8fedc24cf6dfc9511910688a74a867653bf2ec01

          SHA256

          ae17dc9512c1c11d1263192f80dfb6321f5457e0f37366d076423fe9609ce9a8

          SHA512

          a15842e39a270d73fdd9d9788cab87f1be7a699ed9ddadfdf775a1319a97633bf7abbff531e208d63f09b94c22c6ef6c262efcd5b520803e55f86ffb56904ce7

        • C:\Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • C:\Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • C:\Program Files\Common Files\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • C:\Program Files\Common Files\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • C:\Program Files\backup.exe

          Filesize

          72KB

          MD5

          e50862a8dbcbe6b117f522c7c59246a1

          SHA1

          30cd7894c2fbd7aaab91378b56400d3a569b1c78

          SHA256

          2da562128f776a4d62879577f7cd2a60c43e401883f7824b6956bf7f0a4630f7

          SHA512

          cbdee769adaf9ac3d4f2a6698b75bcc1133390e74a8c7b3efc4503bad81b2927e0a8a4bb93e533dd89d950b5831c0472a48f3b4c702937299f27856842048279

        • C:\Program Files\backup.exe

          Filesize

          72KB

          MD5

          e50862a8dbcbe6b117f522c7c59246a1

          SHA1

          30cd7894c2fbd7aaab91378b56400d3a569b1c78

          SHA256

          2da562128f776a4d62879577f7cd2a60c43e401883f7824b6956bf7f0a4630f7

          SHA512

          cbdee769adaf9ac3d4f2a6698b75bcc1133390e74a8c7b3efc4503bad81b2927e0a8a4bb93e533dd89d950b5831c0472a48f3b4c702937299f27856842048279

        • C:\Users\Admin\AppData\Local\Temp\410628726\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • C:\Users\Admin\AppData\Local\Temp\410628726\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

          Filesize

          72KB

          MD5

          50b5e8ab1fc1c4f0f6cae14819aa1eda

          SHA1

          8a98dabcca287c6f20ac6a4558b659a70c69c279

          SHA256

          957832aa46700a927b731dddbc011604ab69b1d3771d0cfe70a2fc6333fe833f

          SHA512

          65e7b737931ddb202ef586858e68ef348c4c415d31b4aaf997dcb1739cc5a9495c454fe04aeb6b53cf4ff3cba31bea786d5393cf3aa8e368983060eb93acc7aa

        • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

          Filesize

          72KB

          MD5

          50b5e8ab1fc1c4f0f6cae14819aa1eda

          SHA1

          8a98dabcca287c6f20ac6a4558b659a70c69c279

          SHA256

          957832aa46700a927b731dddbc011604ab69b1d3771d0cfe70a2fc6333fe833f

          SHA512

          65e7b737931ddb202ef586858e68ef348c4c415d31b4aaf997dcb1739cc5a9495c454fe04aeb6b53cf4ff3cba31bea786d5393cf3aa8e368983060eb93acc7aa

        • C:\update.exe

          Filesize

          72KB

          MD5

          837cdd0c69f198d073288d18f9f2e3be

          SHA1

          851bf272fd0cf0bddac7bbb2d541d5dce64319eb

          SHA256

          a084fdcc14c8b560e5c48f873e3ccb8364739f411e4b5e514fa24e8d68fe96cf

          SHA512

          82c8758dbaaf2b49c580ca488888f707bbcb468e9e253c811bf2c57af0387c006c86abea15a49de4c8a5049306adbdbb3a5fbcd637b6aab457e4e5127dc76ce1

        • C:\update.exe

          Filesize

          72KB

          MD5

          837cdd0c69f198d073288d18f9f2e3be

          SHA1

          851bf272fd0cf0bddac7bbb2d541d5dce64319eb

          SHA256

          a084fdcc14c8b560e5c48f873e3ccb8364739f411e4b5e514fa24e8d68fe96cf

          SHA512

          82c8758dbaaf2b49c580ca488888f707bbcb468e9e253c811bf2c57af0387c006c86abea15a49de4c8a5049306adbdbb3a5fbcd637b6aab457e4e5127dc76ce1

        • \PerfLogs\Admin\backup.exe

          Filesize

          72KB

          MD5

          04359ee98aef6208e83baaa1009c13c8

          SHA1

          24fb523df772a6a7aaa662f09b2538121c2fda93

          SHA256

          a5c582b09579963d48a8e6b6eea1ea762bb6cf04561ecad38cb7a44201fc8200

          SHA512

          394c56889963699dae11eac63cbea1a00a9eef13262e2467f2ce12e03c8b424fad28e6e633ea5d82553e12a0d12da7a06ab22bf79b7e7b59f8187b5c921b92be

        • \PerfLogs\Admin\backup.exe

          Filesize

          72KB

          MD5

          04359ee98aef6208e83baaa1009c13c8

          SHA1

          24fb523df772a6a7aaa662f09b2538121c2fda93

          SHA256

          a5c582b09579963d48a8e6b6eea1ea762bb6cf04561ecad38cb7a44201fc8200

          SHA512

          394c56889963699dae11eac63cbea1a00a9eef13262e2467f2ce12e03c8b424fad28e6e633ea5d82553e12a0d12da7a06ab22bf79b7e7b59f8187b5c921b92be

        • \PerfLogs\Admin\backup.exe

          Filesize

          72KB

          MD5

          04359ee98aef6208e83baaa1009c13c8

          SHA1

          24fb523df772a6a7aaa662f09b2538121c2fda93

          SHA256

          a5c582b09579963d48a8e6b6eea1ea762bb6cf04561ecad38cb7a44201fc8200

          SHA512

          394c56889963699dae11eac63cbea1a00a9eef13262e2467f2ce12e03c8b424fad28e6e633ea5d82553e12a0d12da7a06ab22bf79b7e7b59f8187b5c921b92be

        • \PerfLogs\Admin\backup.exe

          Filesize

          72KB

          MD5

          04359ee98aef6208e83baaa1009c13c8

          SHA1

          24fb523df772a6a7aaa662f09b2538121c2fda93

          SHA256

          a5c582b09579963d48a8e6b6eea1ea762bb6cf04561ecad38cb7a44201fc8200

          SHA512

          394c56889963699dae11eac63cbea1a00a9eef13262e2467f2ce12e03c8b424fad28e6e633ea5d82553e12a0d12da7a06ab22bf79b7e7b59f8187b5c921b92be

        • \PerfLogs\Admin\backup.exe

          Filesize

          72KB

          MD5

          04359ee98aef6208e83baaa1009c13c8

          SHA1

          24fb523df772a6a7aaa662f09b2538121c2fda93

          SHA256

          a5c582b09579963d48a8e6b6eea1ea762bb6cf04561ecad38cb7a44201fc8200

          SHA512

          394c56889963699dae11eac63cbea1a00a9eef13262e2467f2ce12e03c8b424fad28e6e633ea5d82553e12a0d12da7a06ab22bf79b7e7b59f8187b5c921b92be

        • \PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          d0984109a88a4b7014a91bb1618ddb33

          SHA1

          5d5ec698e54adff17fc7aef494c4b08d2df2e2ec

          SHA256

          22f719e818b30ec900d586598ca63d9515ceaf1564e49f94b80439ca5af8d492

          SHA512

          c34d3507166278cff6fe92b7f5822ae670025c8bb1052f61efe1e13e2807394734e60c5f2d03eed1eeabe553db3128066dffd679d693b9e218590dbf702e041b

        • \PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          d0984109a88a4b7014a91bb1618ddb33

          SHA1

          5d5ec698e54adff17fc7aef494c4b08d2df2e2ec

          SHA256

          22f719e818b30ec900d586598ca63d9515ceaf1564e49f94b80439ca5af8d492

          SHA512

          c34d3507166278cff6fe92b7f5822ae670025c8bb1052f61efe1e13e2807394734e60c5f2d03eed1eeabe553db3128066dffd679d693b9e218590dbf702e041b

        • \PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          d0984109a88a4b7014a91bb1618ddb33

          SHA1

          5d5ec698e54adff17fc7aef494c4b08d2df2e2ec

          SHA256

          22f719e818b30ec900d586598ca63d9515ceaf1564e49f94b80439ca5af8d492

          SHA512

          c34d3507166278cff6fe92b7f5822ae670025c8bb1052f61efe1e13e2807394734e60c5f2d03eed1eeabe553db3128066dffd679d693b9e218590dbf702e041b

        • \PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          d0984109a88a4b7014a91bb1618ddb33

          SHA1

          5d5ec698e54adff17fc7aef494c4b08d2df2e2ec

          SHA256

          22f719e818b30ec900d586598ca63d9515ceaf1564e49f94b80439ca5af8d492

          SHA512

          c34d3507166278cff6fe92b7f5822ae670025c8bb1052f61efe1e13e2807394734e60c5f2d03eed1eeabe553db3128066dffd679d693b9e218590dbf702e041b

        • \PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          d0984109a88a4b7014a91bb1618ddb33

          SHA1

          5d5ec698e54adff17fc7aef494c4b08d2df2e2ec

          SHA256

          22f719e818b30ec900d586598ca63d9515ceaf1564e49f94b80439ca5af8d492

          SHA512

          c34d3507166278cff6fe92b7f5822ae670025c8bb1052f61efe1e13e2807394734e60c5f2d03eed1eeabe553db3128066dffd679d693b9e218590dbf702e041b

        • \Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          69c37a32f1a81ecc330a769682e2e4a0

          SHA1

          8fedc24cf6dfc9511910688a74a867653bf2ec01

          SHA256

          ae17dc9512c1c11d1263192f80dfb6321f5457e0f37366d076423fe9609ce9a8

          SHA512

          a15842e39a270d73fdd9d9788cab87f1be7a699ed9ddadfdf775a1319a97633bf7abbff531e208d63f09b94c22c6ef6c262efcd5b520803e55f86ffb56904ce7

        • \Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          69c37a32f1a81ecc330a769682e2e4a0

          SHA1

          8fedc24cf6dfc9511910688a74a867653bf2ec01

          SHA256

          ae17dc9512c1c11d1263192f80dfb6321f5457e0f37366d076423fe9609ce9a8

          SHA512

          a15842e39a270d73fdd9d9788cab87f1be7a699ed9ddadfdf775a1319a97633bf7abbff531e208d63f09b94c22c6ef6c262efcd5b520803e55f86ffb56904ce7

        • \Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          69c37a32f1a81ecc330a769682e2e4a0

          SHA1

          8fedc24cf6dfc9511910688a74a867653bf2ec01

          SHA256

          ae17dc9512c1c11d1263192f80dfb6321f5457e0f37366d076423fe9609ce9a8

          SHA512

          a15842e39a270d73fdd9d9788cab87f1be7a699ed9ddadfdf775a1319a97633bf7abbff531e208d63f09b94c22c6ef6c262efcd5b520803e55f86ffb56904ce7

        • \Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          69c37a32f1a81ecc330a769682e2e4a0

          SHA1

          8fedc24cf6dfc9511910688a74a867653bf2ec01

          SHA256

          ae17dc9512c1c11d1263192f80dfb6321f5457e0f37366d076423fe9609ce9a8

          SHA512

          a15842e39a270d73fdd9d9788cab87f1be7a699ed9ddadfdf775a1319a97633bf7abbff531e208d63f09b94c22c6ef6c262efcd5b520803e55f86ffb56904ce7

        • \Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          69c37a32f1a81ecc330a769682e2e4a0

          SHA1

          8fedc24cf6dfc9511910688a74a867653bf2ec01

          SHA256

          ae17dc9512c1c11d1263192f80dfb6321f5457e0f37366d076423fe9609ce9a8

          SHA512

          a15842e39a270d73fdd9d9788cab87f1be7a699ed9ddadfdf775a1319a97633bf7abbff531e208d63f09b94c22c6ef6c262efcd5b520803e55f86ffb56904ce7

        • \Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\Common Files\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\Common Files\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\Common Files\backup.exe

          Filesize

          72KB

          MD5

          c34c65df29db93814544eef81a91ce20

          SHA1

          ab1ed3ac8cd62df1fc44a95626440f4c71010d72

          SHA256

          153928844e0f9b054e91b591db81cca77a89b80d4df83bbbe47a8e824395b33f

          SHA512

          cfb51d2ee6f3a2eb0239f4f48ee5a32f7fc1ce20bda493961a082661810a4a44f268cc7f5d00144bd5aef3cd3134d57d695947d654fbcddda28eadb06a672da3

        • \Program Files\backup.exe

          Filesize

          72KB

          MD5

          e50862a8dbcbe6b117f522c7c59246a1

          SHA1

          30cd7894c2fbd7aaab91378b56400d3a569b1c78

          SHA256

          2da562128f776a4d62879577f7cd2a60c43e401883f7824b6956bf7f0a4630f7

          SHA512

          cbdee769adaf9ac3d4f2a6698b75bcc1133390e74a8c7b3efc4503bad81b2927e0a8a4bb93e533dd89d950b5831c0472a48f3b4c702937299f27856842048279

        • \Program Files\backup.exe

          Filesize

          72KB

          MD5

          e50862a8dbcbe6b117f522c7c59246a1

          SHA1

          30cd7894c2fbd7aaab91378b56400d3a569b1c78

          SHA256

          2da562128f776a4d62879577f7cd2a60c43e401883f7824b6956bf7f0a4630f7

          SHA512

          cbdee769adaf9ac3d4f2a6698b75bcc1133390e74a8c7b3efc4503bad81b2927e0a8a4bb93e533dd89d950b5831c0472a48f3b4c702937299f27856842048279

        • \Program Files\backup.exe

          Filesize

          72KB

          MD5

          e50862a8dbcbe6b117f522c7c59246a1

          SHA1

          30cd7894c2fbd7aaab91378b56400d3a569b1c78

          SHA256

          2da562128f776a4d62879577f7cd2a60c43e401883f7824b6956bf7f0a4630f7

          SHA512

          cbdee769adaf9ac3d4f2a6698b75bcc1133390e74a8c7b3efc4503bad81b2927e0a8a4bb93e533dd89d950b5831c0472a48f3b4c702937299f27856842048279

        • \Program Files\backup.exe

          Filesize

          72KB

          MD5

          e50862a8dbcbe6b117f522c7c59246a1

          SHA1

          30cd7894c2fbd7aaab91378b56400d3a569b1c78

          SHA256

          2da562128f776a4d62879577f7cd2a60c43e401883f7824b6956bf7f0a4630f7

          SHA512

          cbdee769adaf9ac3d4f2a6698b75bcc1133390e74a8c7b3efc4503bad81b2927e0a8a4bb93e533dd89d950b5831c0472a48f3b4c702937299f27856842048279

        • \Program Files\backup.exe

          Filesize

          72KB

          MD5

          e50862a8dbcbe6b117f522c7c59246a1

          SHA1

          30cd7894c2fbd7aaab91378b56400d3a569b1c78

          SHA256

          2da562128f776a4d62879577f7cd2a60c43e401883f7824b6956bf7f0a4630f7

          SHA512

          cbdee769adaf9ac3d4f2a6698b75bcc1133390e74a8c7b3efc4503bad81b2927e0a8a4bb93e533dd89d950b5831c0472a48f3b4c702937299f27856842048279

        • \Users\Admin\AppData\Local\Temp\410628726\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\410628726\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\Low\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\Low\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

          Filesize

          72KB

          MD5

          50b5e8ab1fc1c4f0f6cae14819aa1eda

          SHA1

          8a98dabcca287c6f20ac6a4558b659a70c69c279

          SHA256

          957832aa46700a927b731dddbc011604ab69b1d3771d0cfe70a2fc6333fe833f

          SHA512

          65e7b737931ddb202ef586858e68ef348c4c415d31b4aaf997dcb1739cc5a9495c454fe04aeb6b53cf4ff3cba31bea786d5393cf3aa8e368983060eb93acc7aa

        • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

          Filesize

          72KB

          MD5

          50b5e8ab1fc1c4f0f6cae14819aa1eda

          SHA1

          8a98dabcca287c6f20ac6a4558b659a70c69c279

          SHA256

          957832aa46700a927b731dddbc011604ab69b1d3771d0cfe70a2fc6333fe833f

          SHA512

          65e7b737931ddb202ef586858e68ef348c4c415d31b4aaf997dcb1739cc5a9495c454fe04aeb6b53cf4ff3cba31bea786d5393cf3aa8e368983060eb93acc7aa

        • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

          Filesize

          72KB

          MD5

          2830f66d884902458eeb2cf830d1613e

          SHA1

          d6210fbd972c0ac0107779d0dfa8afb5b0957ecb

          SHA256

          305923967aac1d94c8a3fc9971ac53822f942bd285bf4a8ee1bd60c0e61519f8

          SHA512

          de9ef1b4a828c4687627cd557552f0748662b31dc4fd847da34f11bacdb36231dede3662ff98369b095918784b507560c751bdd6d773afcd540ea6698c7cd169

        • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

          Filesize

          72KB

          MD5

          50b5e8ab1fc1c4f0f6cae14819aa1eda

          SHA1

          8a98dabcca287c6f20ac6a4558b659a70c69c279

          SHA256

          957832aa46700a927b731dddbc011604ab69b1d3771d0cfe70a2fc6333fe833f

          SHA512

          65e7b737931ddb202ef586858e68ef348c4c415d31b4aaf997dcb1739cc5a9495c454fe04aeb6b53cf4ff3cba31bea786d5393cf3aa8e368983060eb93acc7aa

        • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

          Filesize

          72KB

          MD5

          50b5e8ab1fc1c4f0f6cae14819aa1eda

          SHA1

          8a98dabcca287c6f20ac6a4558b659a70c69c279

          SHA256

          957832aa46700a927b731dddbc011604ab69b1d3771d0cfe70a2fc6333fe833f

          SHA512

          65e7b737931ddb202ef586858e68ef348c4c415d31b4aaf997dcb1739cc5a9495c454fe04aeb6b53cf4ff3cba31bea786d5393cf3aa8e368983060eb93acc7aa

        • memory/268-268-0x0000000000000000-mapping.dmp

        • memory/388-322-0x0000000000000000-mapping.dmp

        • memory/544-206-0x0000000000000000-mapping.dmp

        • memory/592-194-0x0000000000000000-mapping.dmp

        • memory/592-82-0x0000000000000000-mapping.dmp

        • memory/596-327-0x0000000000000000-mapping.dmp

        • memory/600-187-0x0000000000000000-mapping.dmp

        • memory/680-311-0x0000000000000000-mapping.dmp

        • memory/692-100-0x0000000000000000-mapping.dmp

        • memory/784-179-0x0000000000000000-mapping.dmp

        • memory/856-192-0x0000000000000000-mapping.dmp

        • memory/876-266-0x0000000000000000-mapping.dmp

        • memory/908-142-0x0000000000000000-mapping.dmp

        • memory/936-241-0x0000000000000000-mapping.dmp

        • memory/1008-341-0x0000000000000000-mapping.dmp

        • memory/1008-175-0x0000000000000000-mapping.dmp

        • memory/1052-235-0x0000000000000000-mapping.dmp

        • memory/1068-183-0x0000000000000000-mapping.dmp

        • memory/1104-233-0x0000000000000000-mapping.dmp

        • memory/1108-130-0x0000000000000000-mapping.dmp

        • memory/1116-70-0x0000000000000000-mapping.dmp

        • memory/1120-205-0x0000000000000000-mapping.dmp

        • memory/1152-94-0x0000000000000000-mapping.dmp

        • memory/1184-269-0x0000000000000000-mapping.dmp

        • memory/1212-139-0x00000000741C1000-0x00000000741C3000-memory.dmp

          Filesize

          8KB

        • memory/1212-98-0x0000000076091000-0x0000000076093000-memory.dmp

          Filesize

          8KB

        • memory/1248-171-0x0000000000000000-mapping.dmp

        • memory/1268-315-0x0000000000000000-mapping.dmp

        • memory/1272-319-0x0000000000000000-mapping.dmp

        • memory/1324-64-0x0000000000000000-mapping.dmp

        • memory/1328-58-0x0000000000000000-mapping.dmp

        • memory/1336-257-0x0000000000000000-mapping.dmp

        • memory/1348-236-0x0000000000000000-mapping.dmp

        • memory/1360-204-0x0000000000000000-mapping.dmp

        • memory/1364-227-0x0000000000000000-mapping.dmp

        • memory/1436-164-0x0000000000000000-mapping.dmp

        • memory/1464-348-0x0000000000000000-mapping.dmp

        • memory/1484-76-0x0000000000000000-mapping.dmp

        • memory/1504-108-0x0000000000000000-mapping.dmp

        • memory/1516-193-0x0000000000000000-mapping.dmp

        • memory/1548-232-0x0000000000000000-mapping.dmp

        • memory/1564-294-0x0000000000000000-mapping.dmp

        • memory/1584-347-0x0000000000000000-mapping.dmp

        • memory/1588-346-0x0000000000000000-mapping.dmp

        • memory/1596-207-0x0000000000000000-mapping.dmp

        • memory/1604-153-0x0000000000000000-mapping.dmp

        • memory/1612-275-0x0000000000000000-mapping.dmp

        • memory/1636-286-0x0000000000000000-mapping.dmp

        • memory/1648-287-0x0000000000000000-mapping.dmp

        • memory/1656-292-0x0000000000000000-mapping.dmp

        • memory/1680-291-0x0000000000000000-mapping.dmp

        • memory/1692-285-0x0000000000000000-mapping.dmp

        • memory/1696-295-0x0000000000000000-mapping.dmp

        • memory/1736-119-0x0000000000000000-mapping.dmp

        • memory/1748-240-0x0000000000000000-mapping.dmp

        • memory/1760-320-0x0000000000000000-mapping.dmp

        • memory/1788-191-0x0000000000000000-mapping.dmp

        • memory/1796-238-0x0000000000000000-mapping.dmp

        • memory/1912-88-0x0000000000000000-mapping.dmp

        • memory/1964-316-0x0000000000000000-mapping.dmp

        • memory/1976-346-0x0000000000000000-mapping.dmp

        • memory/1976-260-0x0000000000000000-mapping.dmp

        • memory/1984-208-0x0000000000000000-mapping.dmp

        • memory/2024-231-0x0000000000000000-mapping.dmp

        • memory/2028-324-0x0000000000000000-mapping.dmp

        • memory/2032-293-0x0000000000000000-mapping.dmp