Analysis

  • max time kernel
    149s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 16:53

General

  • Target

    9f98d24289aceb418a8f6b74612f01cece2d5640b3503c1277047fd69fd54510.exe

  • Size

    72KB

  • MD5

    057dc3a73940e3f955737d36c78337bf

  • SHA1

    a7a6987d344f0af1c79a2692a30793c21aadcf27

  • SHA256

    9f98d24289aceb418a8f6b74612f01cece2d5640b3503c1277047fd69fd54510

  • SHA512

    97abf2852cb96ba0307a97acbffac7afad282327bfa7767d8dd89c8cbe1689e9baac3d05ed06e31f2ec856a42f5d01b6b878cfeff5c62381ec1b56fe211ee69d

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2X:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPj

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 55 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in Program Files directory 57 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 61 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f98d24289aceb418a8f6b74612f01cece2d5640b3503c1277047fd69fd54510.exe
    "C:\Users\Admin\AppData\Local\Temp\9f98d24289aceb418a8f6b74612f01cece2d5640b3503c1277047fd69fd54510.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\1878410016\backup.exe
      C:\Users\Admin\AppData\Local\Temp\1878410016\backup.exe C:\Users\Admin\AppData\Local\Temp\1878410016\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:852
      • C:\update.exe
        \update.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:520
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1560
          • C:\PerfLogs\Admin\backup.exe
            C:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1060
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1736
          • C:\Program Files\7-Zip\backup.exe
            "C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2020
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:824
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1600
            • C:\Program Files\Common Files\Microsoft Shared\backup.exe
              "C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1912
              • C:\Program Files\Common Files\Microsoft Shared\Filters\System Restore.exe
                "C:\Program Files\Common Files\Microsoft Shared\Filters\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:480
              • C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:568
                • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:764
                • C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:988
                • C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:272
                • C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1500
                • C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1784
                • C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:744
                • C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1680
                • C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1652
                • C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1644
                • C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1968
                • C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1560
                • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1776
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1532
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\data.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:808
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1628
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:988
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2008
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:1164
                  • C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe
                    "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\
                    9⤵
                    • Executes dropped EXE
                    PID:1760
                • C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1332
                • C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:980
                • C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1060
                • C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\
                  8⤵
                  • Executes dropped EXE
                  PID:308
              • C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1432
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1408
                • C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe
                  "C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\
                  8⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:480
              • C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1668
              • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe
                "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\
                7⤵
                  PID:1628
              • C:\Program Files\Common Files\Services\backup.exe
                "C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1728
              • C:\Program Files\Common Files\SpeechEngines\backup.exe
                "C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:960
                • C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe
                  "C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2016
              • C:\Program Files\Common Files\System\backup.exe
                "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1536
            • C:\Program Files\DVD Maker\backup.exe
              "C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1192
              • C:\Program Files\DVD Maker\de-DE\backup.exe
                "C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1824
              • C:\Program Files\DVD Maker\en-US\backup.exe
                "C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1656
              • C:\Program Files\DVD Maker\es-ES\backup.exe
                "C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\
                6⤵
                • Executes dropped EXE
                PID:1540
              • C:\Program Files\DVD Maker\fr-FR\backup.exe
                "C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:1704
            • C:\Program Files\Google\backup.exe
              "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:940
          • C:\Program Files (x86)\backup.exe
            "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
            4⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1148
            • C:\Program Files (x86)\Adobe\backup.exe
              "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1552
              • C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe
                "C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:1764
                • C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe
                  "C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1692
                • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe
                  "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\
                  7⤵
                  • Executes dropped EXE
                  PID:340
            • C:\Program Files (x86)\Common Files\backup.exe
              "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
              5⤵
              • Executes dropped EXE
              PID:1700
          • C:\Users\System Restore.exe
            "C:\Users\System Restore.exe" C:\Users\
            4⤵
            • Modifies visibility of file extensions in Explorer
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:824
            • C:\Users\Admin\backup.exe
              C:\Users\Admin\backup.exe C:\Users\Admin\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1924
              • C:\Users\Admin\Contacts\backup.exe
                C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1964
              • C:\Users\Admin\Desktop\backup.exe
                C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
                6⤵
                • Executes dropped EXE
                PID:956
              • C:\Users\Admin\Documents\backup.exe
                C:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:616
            • C:\Users\Public\backup.exe
              C:\Users\Public\backup.exe C:\Users\Public\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:996
              • C:\Users\Public\Documents\backup.exe
                C:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\
                6⤵
                  PID:1696
            • C:\Windows\System Restore.exe
              "C:\Windows\System Restore.exe" C:\Windows\
              4⤵
              • Executes dropped EXE
              PID:1064
        • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
          C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:268
        • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
          C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2040
        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
          "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1140
        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
          "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:108
        • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
          C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1816
        • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe
          C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:808

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PerfLogs\Admin\backup.exe

        Filesize

        72KB

        MD5

        f5a85f05cdee778c2bd74b7c67f4c7f0

        SHA1

        6bf7d906d3a8897857d6bd3233a06a77aa43857b

        SHA256

        856db7b114a767ecffc4377f59f3adad5f14a2df3fa5c11cb593bd880879a1a2

        SHA512

        4dbadd886c1dab27761f44e0437207df349cbee8017ea6704b3eea08b5dcfc1307e78f16a8d0b8aa37532b5e6f60f526435ec414062ec74b6b4c44a25fbb600b

      • C:\PerfLogs\Admin\backup.exe

        Filesize

        72KB

        MD5

        f5a85f05cdee778c2bd74b7c67f4c7f0

        SHA1

        6bf7d906d3a8897857d6bd3233a06a77aa43857b

        SHA256

        856db7b114a767ecffc4377f59f3adad5f14a2df3fa5c11cb593bd880879a1a2

        SHA512

        4dbadd886c1dab27761f44e0437207df349cbee8017ea6704b3eea08b5dcfc1307e78f16a8d0b8aa37532b5e6f60f526435ec414062ec74b6b4c44a25fbb600b

      • C:\PerfLogs\backup.exe

        Filesize

        72KB

        MD5

        b751485d7b9fe2a4ad0e704aa27cc09f

        SHA1

        6229baf07282372868214af69007ae53475d6a5b

        SHA256

        515fb70ce8913dcf29450bfa535f7d4194e9f7e01d4679a9279dade2925cbf48

        SHA512

        a38861ec4231bcc2cd52960c80370845e2fa0a00fd4367cf86a2479783ece959851c90901be03bc0e239b57fddeb722276d13d459c3aca29802bf49b162a1984

      • C:\PerfLogs\backup.exe

        Filesize

        72KB

        MD5

        b751485d7b9fe2a4ad0e704aa27cc09f

        SHA1

        6229baf07282372868214af69007ae53475d6a5b

        SHA256

        515fb70ce8913dcf29450bfa535f7d4194e9f7e01d4679a9279dade2925cbf48

        SHA512

        a38861ec4231bcc2cd52960c80370845e2fa0a00fd4367cf86a2479783ece959851c90901be03bc0e239b57fddeb722276d13d459c3aca29802bf49b162a1984

      • C:\Program Files\7-Zip\Lang\backup.exe

        Filesize

        72KB

        MD5

        cb8c5d2174a32d273859d0560da90cf5

        SHA1

        5e94adab2008c3709149ed46e9747f72b49eb53c

        SHA256

        e4ab656be7ab885d12a31bff5c2f4b916bdc9ba309dcea3f008fb3089edebf7a

        SHA512

        e050bc5a78744a484d3fb785cd2f1ede9c7db8affc69f1111953e42525c9196d6c340e555710f0c11bf2eb432e6eaebf05fb6b89cb9f54bed240ed4738e8b43b

      • C:\Program Files\7-Zip\Lang\backup.exe

        Filesize

        72KB

        MD5

        cb8c5d2174a32d273859d0560da90cf5

        SHA1

        5e94adab2008c3709149ed46e9747f72b49eb53c

        SHA256

        e4ab656be7ab885d12a31bff5c2f4b916bdc9ba309dcea3f008fb3089edebf7a

        SHA512

        e050bc5a78744a484d3fb785cd2f1ede9c7db8affc69f1111953e42525c9196d6c340e555710f0c11bf2eb432e6eaebf05fb6b89cb9f54bed240ed4738e8b43b

      • C:\Program Files\7-Zip\backup.exe

        Filesize

        72KB

        MD5

        509dfd7b8aaa06178c5a53c366596a04

        SHA1

        57eac733cfc776b51e5ee7b0f944c3fbf5e3abc0

        SHA256

        080952391e00c37444a48f02de6e955e7681c3a4605c376aa892e3098472bd85

        SHA512

        4c12dfe709d9e7df252a63202b227399935c87e001c52dd5ea136227caf5a91e4dd1ff1625e74cce48d548a1810267d7e70da0bf01d7db1a4c8f98fb784321cb

      • C:\Program Files\7-Zip\backup.exe

        Filesize

        72KB

        MD5

        509dfd7b8aaa06178c5a53c366596a04

        SHA1

        57eac733cfc776b51e5ee7b0f944c3fbf5e3abc0

        SHA256

        080952391e00c37444a48f02de6e955e7681c3a4605c376aa892e3098472bd85

        SHA512

        4c12dfe709d9e7df252a63202b227399935c87e001c52dd5ea136227caf5a91e4dd1ff1625e74cce48d548a1810267d7e70da0bf01d7db1a4c8f98fb784321cb

      • C:\Program Files\Common Files\backup.exe

        Filesize

        72KB

        MD5

        a7fdc861b0b00ec016b35f8aba2dae8c

        SHA1

        972a60975f3e58414b045c614e411b6663228e0d

        SHA256

        68817a7b963626be3ad36d80921f8384d3f1d249c5bc249c7ddf98816fb270fb

        SHA512

        9a27a36d3ef0183336563352c3805d4e368dab7c5dfd756e34a04ffc4a38e0260c41393f6f1a0bfa6fb5921fd6f6174cd473fc8d5e120f908dcc8ac8c0b6ac1e

      • C:\Program Files\Common Files\backup.exe

        Filesize

        72KB

        MD5

        a7fdc861b0b00ec016b35f8aba2dae8c

        SHA1

        972a60975f3e58414b045c614e411b6663228e0d

        SHA256

        68817a7b963626be3ad36d80921f8384d3f1d249c5bc249c7ddf98816fb270fb

        SHA512

        9a27a36d3ef0183336563352c3805d4e368dab7c5dfd756e34a04ffc4a38e0260c41393f6f1a0bfa6fb5921fd6f6174cd473fc8d5e120f908dcc8ac8c0b6ac1e

      • C:\Program Files\backup.exe

        Filesize

        72KB

        MD5

        4fa5145c6bbf196241d3a96b96d65fbe

        SHA1

        92672a8d794c76ca5eb237c53fe10805ddb9ac0f

        SHA256

        5d1400e24a6124e6f2c8b6530ee67712e2ecb53518681af42b78dad0b7442aa7

        SHA512

        b55fecc8bd9c8838fc1d5e96f83c96961808f1b72ba34d289ff05e08578ed56a461f99eb3fc17250aa91ddf4b8807ed507be264323f2eed473f00953a0e729c8

      • C:\Program Files\backup.exe

        Filesize

        72KB

        MD5

        4fa5145c6bbf196241d3a96b96d65fbe

        SHA1

        92672a8d794c76ca5eb237c53fe10805ddb9ac0f

        SHA256

        5d1400e24a6124e6f2c8b6530ee67712e2ecb53518681af42b78dad0b7442aa7

        SHA512

        b55fecc8bd9c8838fc1d5e96f83c96961808f1b72ba34d289ff05e08578ed56a461f99eb3fc17250aa91ddf4b8807ed507be264323f2eed473f00953a0e729c8

      • C:\Users\Admin\AppData\Local\Temp\1878410016\backup.exe

        Filesize

        72KB

        MD5

        7e798ebc88ec835caafb5276e828d1d6

        SHA1

        85cdc1a13514e1cecae37756621d111b7d51ac9e

        SHA256

        f332a7493355e71a936dc833a2c4e88cd7bf29108f2b989899d34afbcfc26d2d

        SHA512

        5bb2856fa742f29abe99d2847805d67060e533136116c84f0790ae74771dfaaf3d1210bd9bf4fb6e9eec9d81e84ecdb1a6dd12117a75e4fc3a08d2437cba50a3

      • C:\Users\Admin\AppData\Local\Temp\1878410016\backup.exe

        Filesize

        72KB

        MD5

        7e798ebc88ec835caafb5276e828d1d6

        SHA1

        85cdc1a13514e1cecae37756621d111b7d51ac9e

        SHA256

        f332a7493355e71a936dc833a2c4e88cd7bf29108f2b989899d34afbcfc26d2d

        SHA512

        5bb2856fa742f29abe99d2847805d67060e533136116c84f0790ae74771dfaaf3d1210bd9bf4fb6e9eec9d81e84ecdb1a6dd12117a75e4fc3a08d2437cba50a3

      • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

        Filesize

        72KB

        MD5

        85e0ef0fd7244fcfacb839355a485641

        SHA1

        b3c533b63a94459f169d27c95b4084e9718ec9fe

        SHA256

        b4e81249c785a320756f13575118859c4514329e19a6f2b08cf3e64b78cefb5e

        SHA512

        f74357df4b16849082a7f097255e2e66fcbdc13f789bef26d070114ed3e833e8ec83a35eaa97e7f875108239b3492800a0bd8c7a14a6dd24eac74476b3e0f5de

      • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

        Filesize

        72KB

        MD5

        85e0ef0fd7244fcfacb839355a485641

        SHA1

        b3c533b63a94459f169d27c95b4084e9718ec9fe

        SHA256

        b4e81249c785a320756f13575118859c4514329e19a6f2b08cf3e64b78cefb5e

        SHA512

        f74357df4b16849082a7f097255e2e66fcbdc13f789bef26d070114ed3e833e8ec83a35eaa97e7f875108239b3492800a0bd8c7a14a6dd24eac74476b3e0f5de

      • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

        Filesize

        72KB

        MD5

        51c9cf71b09d8f63794cde5b54136223

        SHA1

        9cbd54e0485e725f58bbfa7f4c13c777cf9d9a96

        SHA256

        89a5d699ad0dc76a0c8cec195e4bb063aec3e221761412ca87413c817362a85c

        SHA512

        25958ca136918b584a478a1385a6e1707f2e97b7980431fbebf6216be617932d28725b4be8fce571e1c7887deedaa354ca89bbc65f9c4c56f83861053adcb5f4

      • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • C:\update.exe

        Filesize

        72KB

        MD5

        184a0ddc833d8c79c23a878e50be058c

        SHA1

        d2263166c418a1ca24b9c64d0fd780279d6adbc1

        SHA256

        aabe94dd0511e58959d5870ba1cf3974bf5a287a2a317133a0ba669390aaefa3

        SHA512

        9a4a17ff11b2f506002d5ad8091a410402708fa8e8ab9b24b5240cdb3698a5b847bca5c9bc9bf1f016d6e41092e9bf1b671c054227ee39e5048c33f75557fc12

      • C:\update.exe

        Filesize

        72KB

        MD5

        184a0ddc833d8c79c23a878e50be058c

        SHA1

        d2263166c418a1ca24b9c64d0fd780279d6adbc1

        SHA256

        aabe94dd0511e58959d5870ba1cf3974bf5a287a2a317133a0ba669390aaefa3

        SHA512

        9a4a17ff11b2f506002d5ad8091a410402708fa8e8ab9b24b5240cdb3698a5b847bca5c9bc9bf1f016d6e41092e9bf1b671c054227ee39e5048c33f75557fc12

      • \PerfLogs\Admin\backup.exe

        Filesize

        72KB

        MD5

        f5a85f05cdee778c2bd74b7c67f4c7f0

        SHA1

        6bf7d906d3a8897857d6bd3233a06a77aa43857b

        SHA256

        856db7b114a767ecffc4377f59f3adad5f14a2df3fa5c11cb593bd880879a1a2

        SHA512

        4dbadd886c1dab27761f44e0437207df349cbee8017ea6704b3eea08b5dcfc1307e78f16a8d0b8aa37532b5e6f60f526435ec414062ec74b6b4c44a25fbb600b

      • \PerfLogs\Admin\backup.exe

        Filesize

        72KB

        MD5

        f5a85f05cdee778c2bd74b7c67f4c7f0

        SHA1

        6bf7d906d3a8897857d6bd3233a06a77aa43857b

        SHA256

        856db7b114a767ecffc4377f59f3adad5f14a2df3fa5c11cb593bd880879a1a2

        SHA512

        4dbadd886c1dab27761f44e0437207df349cbee8017ea6704b3eea08b5dcfc1307e78f16a8d0b8aa37532b5e6f60f526435ec414062ec74b6b4c44a25fbb600b

      • \PerfLogs\Admin\backup.exe

        Filesize

        72KB

        MD5

        f5a85f05cdee778c2bd74b7c67f4c7f0

        SHA1

        6bf7d906d3a8897857d6bd3233a06a77aa43857b

        SHA256

        856db7b114a767ecffc4377f59f3adad5f14a2df3fa5c11cb593bd880879a1a2

        SHA512

        4dbadd886c1dab27761f44e0437207df349cbee8017ea6704b3eea08b5dcfc1307e78f16a8d0b8aa37532b5e6f60f526435ec414062ec74b6b4c44a25fbb600b

      • \PerfLogs\Admin\backup.exe

        Filesize

        72KB

        MD5

        f5a85f05cdee778c2bd74b7c67f4c7f0

        SHA1

        6bf7d906d3a8897857d6bd3233a06a77aa43857b

        SHA256

        856db7b114a767ecffc4377f59f3adad5f14a2df3fa5c11cb593bd880879a1a2

        SHA512

        4dbadd886c1dab27761f44e0437207df349cbee8017ea6704b3eea08b5dcfc1307e78f16a8d0b8aa37532b5e6f60f526435ec414062ec74b6b4c44a25fbb600b

      • \PerfLogs\Admin\backup.exe

        Filesize

        72KB

        MD5

        f5a85f05cdee778c2bd74b7c67f4c7f0

        SHA1

        6bf7d906d3a8897857d6bd3233a06a77aa43857b

        SHA256

        856db7b114a767ecffc4377f59f3adad5f14a2df3fa5c11cb593bd880879a1a2

        SHA512

        4dbadd886c1dab27761f44e0437207df349cbee8017ea6704b3eea08b5dcfc1307e78f16a8d0b8aa37532b5e6f60f526435ec414062ec74b6b4c44a25fbb600b

      • \PerfLogs\backup.exe

        Filesize

        72KB

        MD5

        b751485d7b9fe2a4ad0e704aa27cc09f

        SHA1

        6229baf07282372868214af69007ae53475d6a5b

        SHA256

        515fb70ce8913dcf29450bfa535f7d4194e9f7e01d4679a9279dade2925cbf48

        SHA512

        a38861ec4231bcc2cd52960c80370845e2fa0a00fd4367cf86a2479783ece959851c90901be03bc0e239b57fddeb722276d13d459c3aca29802bf49b162a1984

      • \PerfLogs\backup.exe

        Filesize

        72KB

        MD5

        b751485d7b9fe2a4ad0e704aa27cc09f

        SHA1

        6229baf07282372868214af69007ae53475d6a5b

        SHA256

        515fb70ce8913dcf29450bfa535f7d4194e9f7e01d4679a9279dade2925cbf48

        SHA512

        a38861ec4231bcc2cd52960c80370845e2fa0a00fd4367cf86a2479783ece959851c90901be03bc0e239b57fddeb722276d13d459c3aca29802bf49b162a1984

      • \PerfLogs\backup.exe

        Filesize

        72KB

        MD5

        b751485d7b9fe2a4ad0e704aa27cc09f

        SHA1

        6229baf07282372868214af69007ae53475d6a5b

        SHA256

        515fb70ce8913dcf29450bfa535f7d4194e9f7e01d4679a9279dade2925cbf48

        SHA512

        a38861ec4231bcc2cd52960c80370845e2fa0a00fd4367cf86a2479783ece959851c90901be03bc0e239b57fddeb722276d13d459c3aca29802bf49b162a1984

      • \PerfLogs\backup.exe

        Filesize

        72KB

        MD5

        b751485d7b9fe2a4ad0e704aa27cc09f

        SHA1

        6229baf07282372868214af69007ae53475d6a5b

        SHA256

        515fb70ce8913dcf29450bfa535f7d4194e9f7e01d4679a9279dade2925cbf48

        SHA512

        a38861ec4231bcc2cd52960c80370845e2fa0a00fd4367cf86a2479783ece959851c90901be03bc0e239b57fddeb722276d13d459c3aca29802bf49b162a1984

      • \PerfLogs\backup.exe

        Filesize

        72KB

        MD5

        b751485d7b9fe2a4ad0e704aa27cc09f

        SHA1

        6229baf07282372868214af69007ae53475d6a5b

        SHA256

        515fb70ce8913dcf29450bfa535f7d4194e9f7e01d4679a9279dade2925cbf48

        SHA512

        a38861ec4231bcc2cd52960c80370845e2fa0a00fd4367cf86a2479783ece959851c90901be03bc0e239b57fddeb722276d13d459c3aca29802bf49b162a1984

      • \Program Files\7-Zip\Lang\backup.exe

        Filesize

        72KB

        MD5

        cb8c5d2174a32d273859d0560da90cf5

        SHA1

        5e94adab2008c3709149ed46e9747f72b49eb53c

        SHA256

        e4ab656be7ab885d12a31bff5c2f4b916bdc9ba309dcea3f008fb3089edebf7a

        SHA512

        e050bc5a78744a484d3fb785cd2f1ede9c7db8affc69f1111953e42525c9196d6c340e555710f0c11bf2eb432e6eaebf05fb6b89cb9f54bed240ed4738e8b43b

      • \Program Files\7-Zip\Lang\backup.exe

        Filesize

        72KB

        MD5

        cb8c5d2174a32d273859d0560da90cf5

        SHA1

        5e94adab2008c3709149ed46e9747f72b49eb53c

        SHA256

        e4ab656be7ab885d12a31bff5c2f4b916bdc9ba309dcea3f008fb3089edebf7a

        SHA512

        e050bc5a78744a484d3fb785cd2f1ede9c7db8affc69f1111953e42525c9196d6c340e555710f0c11bf2eb432e6eaebf05fb6b89cb9f54bed240ed4738e8b43b

      • \Program Files\7-Zip\Lang\backup.exe

        Filesize

        72KB

        MD5

        cb8c5d2174a32d273859d0560da90cf5

        SHA1

        5e94adab2008c3709149ed46e9747f72b49eb53c

        SHA256

        e4ab656be7ab885d12a31bff5c2f4b916bdc9ba309dcea3f008fb3089edebf7a

        SHA512

        e050bc5a78744a484d3fb785cd2f1ede9c7db8affc69f1111953e42525c9196d6c340e555710f0c11bf2eb432e6eaebf05fb6b89cb9f54bed240ed4738e8b43b

      • \Program Files\7-Zip\Lang\backup.exe

        Filesize

        72KB

        MD5

        cb8c5d2174a32d273859d0560da90cf5

        SHA1

        5e94adab2008c3709149ed46e9747f72b49eb53c

        SHA256

        e4ab656be7ab885d12a31bff5c2f4b916bdc9ba309dcea3f008fb3089edebf7a

        SHA512

        e050bc5a78744a484d3fb785cd2f1ede9c7db8affc69f1111953e42525c9196d6c340e555710f0c11bf2eb432e6eaebf05fb6b89cb9f54bed240ed4738e8b43b

      • \Program Files\7-Zip\Lang\backup.exe

        Filesize

        72KB

        MD5

        cb8c5d2174a32d273859d0560da90cf5

        SHA1

        5e94adab2008c3709149ed46e9747f72b49eb53c

        SHA256

        e4ab656be7ab885d12a31bff5c2f4b916bdc9ba309dcea3f008fb3089edebf7a

        SHA512

        e050bc5a78744a484d3fb785cd2f1ede9c7db8affc69f1111953e42525c9196d6c340e555710f0c11bf2eb432e6eaebf05fb6b89cb9f54bed240ed4738e8b43b

      • \Program Files\7-Zip\backup.exe

        Filesize

        72KB

        MD5

        509dfd7b8aaa06178c5a53c366596a04

        SHA1

        57eac733cfc776b51e5ee7b0f944c3fbf5e3abc0

        SHA256

        080952391e00c37444a48f02de6e955e7681c3a4605c376aa892e3098472bd85

        SHA512

        4c12dfe709d9e7df252a63202b227399935c87e001c52dd5ea136227caf5a91e4dd1ff1625e74cce48d548a1810267d7e70da0bf01d7db1a4c8f98fb784321cb

      • \Program Files\7-Zip\backup.exe

        Filesize

        72KB

        MD5

        509dfd7b8aaa06178c5a53c366596a04

        SHA1

        57eac733cfc776b51e5ee7b0f944c3fbf5e3abc0

        SHA256

        080952391e00c37444a48f02de6e955e7681c3a4605c376aa892e3098472bd85

        SHA512

        4c12dfe709d9e7df252a63202b227399935c87e001c52dd5ea136227caf5a91e4dd1ff1625e74cce48d548a1810267d7e70da0bf01d7db1a4c8f98fb784321cb

      • \Program Files\7-Zip\backup.exe

        Filesize

        72KB

        MD5

        509dfd7b8aaa06178c5a53c366596a04

        SHA1

        57eac733cfc776b51e5ee7b0f944c3fbf5e3abc0

        SHA256

        080952391e00c37444a48f02de6e955e7681c3a4605c376aa892e3098472bd85

        SHA512

        4c12dfe709d9e7df252a63202b227399935c87e001c52dd5ea136227caf5a91e4dd1ff1625e74cce48d548a1810267d7e70da0bf01d7db1a4c8f98fb784321cb

      • \Program Files\7-Zip\backup.exe

        Filesize

        72KB

        MD5

        509dfd7b8aaa06178c5a53c366596a04

        SHA1

        57eac733cfc776b51e5ee7b0f944c3fbf5e3abc0

        SHA256

        080952391e00c37444a48f02de6e955e7681c3a4605c376aa892e3098472bd85

        SHA512

        4c12dfe709d9e7df252a63202b227399935c87e001c52dd5ea136227caf5a91e4dd1ff1625e74cce48d548a1810267d7e70da0bf01d7db1a4c8f98fb784321cb

      • \Program Files\7-Zip\backup.exe

        Filesize

        72KB

        MD5

        509dfd7b8aaa06178c5a53c366596a04

        SHA1

        57eac733cfc776b51e5ee7b0f944c3fbf5e3abc0

        SHA256

        080952391e00c37444a48f02de6e955e7681c3a4605c376aa892e3098472bd85

        SHA512

        4c12dfe709d9e7df252a63202b227399935c87e001c52dd5ea136227caf5a91e4dd1ff1625e74cce48d548a1810267d7e70da0bf01d7db1a4c8f98fb784321cb

      • \Program Files\Common Files\backup.exe

        Filesize

        72KB

        MD5

        a7fdc861b0b00ec016b35f8aba2dae8c

        SHA1

        972a60975f3e58414b045c614e411b6663228e0d

        SHA256

        68817a7b963626be3ad36d80921f8384d3f1d249c5bc249c7ddf98816fb270fb

        SHA512

        9a27a36d3ef0183336563352c3805d4e368dab7c5dfd756e34a04ffc4a38e0260c41393f6f1a0bfa6fb5921fd6f6174cd473fc8d5e120f908dcc8ac8c0b6ac1e

      • \Program Files\Common Files\backup.exe

        Filesize

        72KB

        MD5

        a7fdc861b0b00ec016b35f8aba2dae8c

        SHA1

        972a60975f3e58414b045c614e411b6663228e0d

        SHA256

        68817a7b963626be3ad36d80921f8384d3f1d249c5bc249c7ddf98816fb270fb

        SHA512

        9a27a36d3ef0183336563352c3805d4e368dab7c5dfd756e34a04ffc4a38e0260c41393f6f1a0bfa6fb5921fd6f6174cd473fc8d5e120f908dcc8ac8c0b6ac1e

      • \Program Files\Common Files\backup.exe

        Filesize

        72KB

        MD5

        a7fdc861b0b00ec016b35f8aba2dae8c

        SHA1

        972a60975f3e58414b045c614e411b6663228e0d

        SHA256

        68817a7b963626be3ad36d80921f8384d3f1d249c5bc249c7ddf98816fb270fb

        SHA512

        9a27a36d3ef0183336563352c3805d4e368dab7c5dfd756e34a04ffc4a38e0260c41393f6f1a0bfa6fb5921fd6f6174cd473fc8d5e120f908dcc8ac8c0b6ac1e

      • \Program Files\backup.exe

        Filesize

        72KB

        MD5

        4fa5145c6bbf196241d3a96b96d65fbe

        SHA1

        92672a8d794c76ca5eb237c53fe10805ddb9ac0f

        SHA256

        5d1400e24a6124e6f2c8b6530ee67712e2ecb53518681af42b78dad0b7442aa7

        SHA512

        b55fecc8bd9c8838fc1d5e96f83c96961808f1b72ba34d289ff05e08578ed56a461f99eb3fc17250aa91ddf4b8807ed507be264323f2eed473f00953a0e729c8

      • \Program Files\backup.exe

        Filesize

        72KB

        MD5

        4fa5145c6bbf196241d3a96b96d65fbe

        SHA1

        92672a8d794c76ca5eb237c53fe10805ddb9ac0f

        SHA256

        5d1400e24a6124e6f2c8b6530ee67712e2ecb53518681af42b78dad0b7442aa7

        SHA512

        b55fecc8bd9c8838fc1d5e96f83c96961808f1b72ba34d289ff05e08578ed56a461f99eb3fc17250aa91ddf4b8807ed507be264323f2eed473f00953a0e729c8

      • \Program Files\backup.exe

        Filesize

        72KB

        MD5

        4fa5145c6bbf196241d3a96b96d65fbe

        SHA1

        92672a8d794c76ca5eb237c53fe10805ddb9ac0f

        SHA256

        5d1400e24a6124e6f2c8b6530ee67712e2ecb53518681af42b78dad0b7442aa7

        SHA512

        b55fecc8bd9c8838fc1d5e96f83c96961808f1b72ba34d289ff05e08578ed56a461f99eb3fc17250aa91ddf4b8807ed507be264323f2eed473f00953a0e729c8

      • \Program Files\backup.exe

        Filesize

        72KB

        MD5

        4fa5145c6bbf196241d3a96b96d65fbe

        SHA1

        92672a8d794c76ca5eb237c53fe10805ddb9ac0f

        SHA256

        5d1400e24a6124e6f2c8b6530ee67712e2ecb53518681af42b78dad0b7442aa7

        SHA512

        b55fecc8bd9c8838fc1d5e96f83c96961808f1b72ba34d289ff05e08578ed56a461f99eb3fc17250aa91ddf4b8807ed507be264323f2eed473f00953a0e729c8

      • \Program Files\backup.exe

        Filesize

        72KB

        MD5

        4fa5145c6bbf196241d3a96b96d65fbe

        SHA1

        92672a8d794c76ca5eb237c53fe10805ddb9ac0f

        SHA256

        5d1400e24a6124e6f2c8b6530ee67712e2ecb53518681af42b78dad0b7442aa7

        SHA512

        b55fecc8bd9c8838fc1d5e96f83c96961808f1b72ba34d289ff05e08578ed56a461f99eb3fc17250aa91ddf4b8807ed507be264323f2eed473f00953a0e729c8

      • \Users\Admin\AppData\Local\Temp\1878410016\backup.exe

        Filesize

        72KB

        MD5

        7e798ebc88ec835caafb5276e828d1d6

        SHA1

        85cdc1a13514e1cecae37756621d111b7d51ac9e

        SHA256

        f332a7493355e71a936dc833a2c4e88cd7bf29108f2b989899d34afbcfc26d2d

        SHA512

        5bb2856fa742f29abe99d2847805d67060e533136116c84f0790ae74771dfaaf3d1210bd9bf4fb6e9eec9d81e84ecdb1a6dd12117a75e4fc3a08d2437cba50a3

      • \Users\Admin\AppData\Local\Temp\1878410016\backup.exe

        Filesize

        72KB

        MD5

        7e798ebc88ec835caafb5276e828d1d6

        SHA1

        85cdc1a13514e1cecae37756621d111b7d51ac9e

        SHA256

        f332a7493355e71a936dc833a2c4e88cd7bf29108f2b989899d34afbcfc26d2d

        SHA512

        5bb2856fa742f29abe99d2847805d67060e533136116c84f0790ae74771dfaaf3d1210bd9bf4fb6e9eec9d81e84ecdb1a6dd12117a75e4fc3a08d2437cba50a3

      • \Users\Admin\AppData\Local\Temp\Low\backup.exe

        Filesize

        72KB

        MD5

        85e0ef0fd7244fcfacb839355a485641

        SHA1

        b3c533b63a94459f169d27c95b4084e9718ec9fe

        SHA256

        b4e81249c785a320756f13575118859c4514329e19a6f2b08cf3e64b78cefb5e

        SHA512

        f74357df4b16849082a7f097255e2e66fcbdc13f789bef26d070114ed3e833e8ec83a35eaa97e7f875108239b3492800a0bd8c7a14a6dd24eac74476b3e0f5de

      • \Users\Admin\AppData\Local\Temp\Low\backup.exe

        Filesize

        72KB

        MD5

        85e0ef0fd7244fcfacb839355a485641

        SHA1

        b3c533b63a94459f169d27c95b4084e9718ec9fe

        SHA256

        b4e81249c785a320756f13575118859c4514329e19a6f2b08cf3e64b78cefb5e

        SHA512

        f74357df4b16849082a7f097255e2e66fcbdc13f789bef26d070114ed3e833e8ec83a35eaa97e7f875108239b3492800a0bd8c7a14a6dd24eac74476b3e0f5de

      • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

        Filesize

        72KB

        MD5

        85e0ef0fd7244fcfacb839355a485641

        SHA1

        b3c533b63a94459f169d27c95b4084e9718ec9fe

        SHA256

        b4e81249c785a320756f13575118859c4514329e19a6f2b08cf3e64b78cefb5e

        SHA512

        f74357df4b16849082a7f097255e2e66fcbdc13f789bef26d070114ed3e833e8ec83a35eaa97e7f875108239b3492800a0bd8c7a14a6dd24eac74476b3e0f5de

      • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

        Filesize

        72KB

        MD5

        85e0ef0fd7244fcfacb839355a485641

        SHA1

        b3c533b63a94459f169d27c95b4084e9718ec9fe

        SHA256

        b4e81249c785a320756f13575118859c4514329e19a6f2b08cf3e64b78cefb5e

        SHA512

        f74357df4b16849082a7f097255e2e66fcbdc13f789bef26d070114ed3e833e8ec83a35eaa97e7f875108239b3492800a0bd8c7a14a6dd24eac74476b3e0f5de

      • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • \Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • \Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

        Filesize

        72KB

        MD5

        51c9cf71b09d8f63794cde5b54136223

        SHA1

        9cbd54e0485e725f58bbfa7f4c13c777cf9d9a96

        SHA256

        89a5d699ad0dc76a0c8cec195e4bb063aec3e221761412ca87413c817362a85c

        SHA512

        25958ca136918b584a478a1385a6e1707f2e97b7980431fbebf6216be617932d28725b4be8fce571e1c7887deedaa354ca89bbc65f9c4c56f83861053adcb5f4

      • \Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

        Filesize

        72KB

        MD5

        51c9cf71b09d8f63794cde5b54136223

        SHA1

        9cbd54e0485e725f58bbfa7f4c13c777cf9d9a96

        SHA256

        89a5d699ad0dc76a0c8cec195e4bb063aec3e221761412ca87413c817362a85c

        SHA512

        25958ca136918b584a478a1385a6e1707f2e97b7980431fbebf6216be617932d28725b4be8fce571e1c7887deedaa354ca89bbc65f9c4c56f83861053adcb5f4

      • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • \Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

        Filesize

        72KB

        MD5

        c5a6948b301625cb07f401177619d86e

        SHA1

        d1bf47964113cbd0798a4d9a1faee999547ced33

        SHA256

        2e24df4a898fd031ee0596b5af10d7ef8b441292e853c6bdac0ecad2dba3c928

        SHA512

        76fb7097f5175c7ca37a5b6d72c7c97b5b8dd35f8105526902c615201420dbc593c7a53e47bd2a3800483ab86c972bca8e4a1860da0d3715f77718e9beb775c3

      • memory/520-72-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

        Filesize

        8KB

      • memory/1236-169-0x0000000073FE1000-0x0000000073FE3000-memory.dmp

        Filesize

        8KB