Analysis

  • max time kernel
    209s
  • max time network
    253s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 19:20

General

  • Target

    5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe

  • Size

    72KB

  • MD5

    096009cb30433f7dbb2a6672da0c70eb

  • SHA1

    8be37669475ce4f3b4f4fabaf927413e165086e2

  • SHA256

    5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a

  • SHA512

    5f6131b6e80dfff56d14e9b8a125e7d0db0703ee643882397e3cc4412c343b4c01664b84009fbbd7d332d04d1de0fdc0113870d46962ddd62870f21efb4a21e8

  • SSDEEP

    384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2p:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP9

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
  • Disables RegEdit via registry modification 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe
    "C:\Users\Admin\AppData\Local\Temp\5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Users\Admin\AppData\Local\Temp\1355086882\data.exe
      C:\Users\Admin\AppData\Local\Temp\1355086882\data.exe C:\Users\Admin\AppData\Local\Temp\1355086882\
      2⤵
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\backup.exe
        \backup.exe \
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4136
        • C:\odt\backup.exe
          C:\odt\backup.exe C:\odt\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:380
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:4420
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:792
          • C:\Program Files\7-Zip\backup.exe
            "C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\
            5⤵
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3532
            • C:\Program Files\7-Zip\Lang\backup.exe
              "C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:2880
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2280
            • C:\Program Files\Common Files\DESIGNER\backup.exe
              "C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:3180
            • C:\Program Files\Common Files\microsoft shared\backup.exe
              "C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4572
              • C:\Program Files\Common Files\microsoft shared\ClickToRun\System Restore.exe
                "C:\Program Files\Common Files\microsoft shared\ClickToRun\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4920
              • C:\Program Files\Common Files\microsoft shared\ink\backup.exe
                "C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2348
                • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4584
                • C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4280
                • C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4356
                • C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\
                  8⤵
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1388
                • C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:372
                • C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2724
                • C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4680
                • C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4892
                • C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4960
                • C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:2624
                • C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2044
                • C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:2076
                • C:\Program Files\Common Files\microsoft shared\ink\fr-CA\update.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\fr-CA\update.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3624
                • C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  PID:4980
                • C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\update.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\update.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\
                  8⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Drops file in Program Files directory
                  PID:4840
                  • C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\System Restore.exe
                    "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\
                    9⤵
                    • Modifies visibility of file extensions in Explorer
                    • System policy modification
                    PID:376
                  • C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\
                    9⤵
                      PID:532
                    • C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\System Restore.exe
                      "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\
                      9⤵
                      • Disables RegEdit via registry modification
                      • System policy modification
                      PID:4764
                    • C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe
                      "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\
                      9⤵
                      • Disables RegEdit via registry modification
                      • System policy modification
                      PID:3964
                    • C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe
                      "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      • System policy modification
                      PID:4952
                • C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:240
                  • C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:3964
                  • C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:4964
                  • C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3592
                  • C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2372
                  • C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:4084
                  • C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    PID:4364
                • C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:2656
                  • C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:4848
                • C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:2560
                • C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:5044
                • C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4640
                • C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\
                  7⤵
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:4456
                  • C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • System policy modification
                    PID:3356
                • C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Drops file in Program Files directory
                  • System policy modification
                  PID:360
                  • C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    PID:1488
                • C:\Program Files\Common Files\microsoft shared\VC\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  PID:828
              • C:\Program Files\Common Files\Services\backup.exe
                "C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\
                6⤵
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4360
              • C:\Program Files\Common Files\System\backup.exe
                "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
                6⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:4472
                • C:\Program Files\Common Files\System\ado\backup.exe
                  "C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:3576
                  • C:\Program Files\Common Files\System\ado\de-DE\backup.exe
                    "C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:2472
                  • C:\Program Files\Common Files\System\ado\en-US\backup.exe
                    "C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4888
                  • C:\Program Files\Common Files\System\ado\es-ES\backup.exe
                    "C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:2240
                  • C:\Program Files\Common Files\System\ado\fr-FR\backup.exe
                    "C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\
                    8⤵
                    • Disables RegEdit via registry modification
                    PID:4100
                  • C:\Program Files\Common Files\System\ado\it-IT\backup.exe
                    "C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    PID:4520
                  • C:\Program Files\Common Files\System\ado\ja-JP\backup.exe
                    "C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • System policy modification
                    PID:4756
                • C:\Program Files\Common Files\System\de-DE\backup.exe
                  "C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • System policy modification
                  PID:1912
            • C:\Program Files\Google\backup.exe
              "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
              5⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1160
              • C:\Program Files\Google\Chrome\backup.exe
                "C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:3676
                • C:\Program Files\Google\Chrome\Application\backup.exe
                  "C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:4240
                  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe
                    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:3192
                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe
                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:3492
                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe
                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      • System policy modification
                      PID:1532
                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe
                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2712
                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe
                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      PID:4936
                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe
                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      • System policy modification
                      PID:3316
                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe
                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      • System policy modification
                      PID:4956
                    • C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe
                      "C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\
                      9⤵
                      • Modifies visibility of file extensions in Explorer
                      • Disables RegEdit via registry modification
                      PID:3076
          • C:\Program Files (x86)\backup.exe
            "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
            4⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:2664
            • C:\Program Files (x86)\Adobe\backup.exe
              "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
              5⤵
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              PID:640
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\
                6⤵
                • Modifies visibility of file extensions in Explorer
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious use of SetWindowsHookEx
                PID:1528
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:2564
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
                  7⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:4076
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\
                    8⤵
                    • Disables RegEdit via registry modification
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:3324
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      • System policy modification
                      PID:552
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\
                    8⤵
                    • Drops file in Program Files directory
                    • System policy modification
                    PID:4724
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\
                      9⤵
                      • Disables RegEdit via registry modification
                      • System policy modification
                      PID:1044
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\
                    8⤵
                    • Disables RegEdit via registry modification
                    PID:4692
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\System Restore.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • System policy modification
                    PID:1404
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\data.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\
                    8⤵
                    • Modifies visibility of file extensions in Explorer
                    • Disables RegEdit via registry modification
                    • System policy modification
                    PID:800
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\
                    8⤵
                      PID:5056
              • C:\Program Files (x86)\Common Files\backup.exe
                "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
                5⤵
                  PID:2660
          • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe
            C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3004
          • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe
            C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:1664
          • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
            C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3016
          • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
            "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4104
          • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
            "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:440
          • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe
            "C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
            2⤵
            • Modifies visibility of file extensions in Explorer
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:4988

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          bb409f7753bac42c55ef8a1d50046a42

          SHA1

          d3a0ce40a12408510bfc1b7cab69386e1be49828

          SHA256

          f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501

          SHA512

          d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c

        • C:\PerfLogs\backup.exe

          Filesize

          72KB

          MD5

          bb409f7753bac42c55ef8a1d50046a42

          SHA1

          d3a0ce40a12408510bfc1b7cab69386e1be49828

          SHA256

          f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501

          SHA512

          d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c

        • C:\Program Files (x86)\backup.exe

          Filesize

          72KB

          MD5

          f7a31a6793cfd301229842b51e516795

          SHA1

          2a8c891612006dc845202cf7924e83e0927ba37e

          SHA256

          0398ca71459c8071a9f54a745cbae864cc6805b0a28890a20f9dda7ac4596f64

          SHA512

          93084c0eb0ea1b5fe4b98f7b8a47b35f82be40f5bcfabe07e65fd88dbe9bddcd755004d56091fd315cde7c31f0cfe8bc3a5f910d849a816edba090b1add45259

        • C:\Program Files (x86)\backup.exe

          Filesize

          72KB

          MD5

          f7a31a6793cfd301229842b51e516795

          SHA1

          2a8c891612006dc845202cf7924e83e0927ba37e

          SHA256

          0398ca71459c8071a9f54a745cbae864cc6805b0a28890a20f9dda7ac4596f64

          SHA512

          93084c0eb0ea1b5fe4b98f7b8a47b35f82be40f5bcfabe07e65fd88dbe9bddcd755004d56091fd315cde7c31f0cfe8bc3a5f910d849a816edba090b1add45259

        • C:\Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          9f3f0a8330ee6e58d6a0d208c4e61d14

          SHA1

          26511392ad81298085e4e11efafcacd3987dbdae

          SHA256

          24adda736374003a94980ff22cc680310f1a9b448c576fca869fe6c0f46d7245

          SHA512

          d335c1e889658f67a09e1066264b07886c17ecdca73c8ecc89bddf03aa94675cbc28832816951994db0a143426cb3fbb762796afb2824027a392f057fbd163d7

        • C:\Program Files\7-Zip\Lang\backup.exe

          Filesize

          72KB

          MD5

          9f3f0a8330ee6e58d6a0d208c4e61d14

          SHA1

          26511392ad81298085e4e11efafcacd3987dbdae

          SHA256

          24adda736374003a94980ff22cc680310f1a9b448c576fca869fe6c0f46d7245

          SHA512

          d335c1e889658f67a09e1066264b07886c17ecdca73c8ecc89bddf03aa94675cbc28832816951994db0a143426cb3fbb762796afb2824027a392f057fbd163d7

        • C:\Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          f32ce34baaa22f0d544a5d960b27598e

          SHA1

          b792f025e1606256dc80b22580a727c578969c61

          SHA256

          36983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8

          SHA512

          75d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf

        • C:\Program Files\7-Zip\backup.exe

          Filesize

          72KB

          MD5

          f32ce34baaa22f0d544a5d960b27598e

          SHA1

          b792f025e1606256dc80b22580a727c578969c61

          SHA256

          36983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8

          SHA512

          75d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf

        • C:\Program Files\Common Files\DESIGNER\backup.exe

          Filesize

          72KB

          MD5

          2c19fb68f60f68de7eb81300fb04507d

          SHA1

          9ce1dacf8b7403e6f7701fa72e40f10930c5be68

          SHA256

          42d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5

          SHA512

          70d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92

        • C:\Program Files\Common Files\DESIGNER\backup.exe

          Filesize

          72KB

          MD5

          2c19fb68f60f68de7eb81300fb04507d

          SHA1

          9ce1dacf8b7403e6f7701fa72e40f10930c5be68

          SHA256

          42d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5

          SHA512

          70d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92

        • C:\Program Files\Common Files\Services\backup.exe

          Filesize

          72KB

          MD5

          a0037f9382c1c5e49649a53b478cd5cc

          SHA1

          602c30a50489f653030bf9358889f81d8b172c09

          SHA256

          041496d45403eeba7088060b872fb633fdae092aafeff8a748919c7812581f13

          SHA512

          2b61d2e00d467d7b4aa7f066ffd655b56eebd8b7c5de4940cbab2eab80feaed3c50dee3a7d666c1b333498ef3749a63b763dc5f3e90c7efa50ab54a1ffd95ee1

        • C:\Program Files\Common Files\Services\backup.exe

          Filesize

          72KB

          MD5

          a0037f9382c1c5e49649a53b478cd5cc

          SHA1

          602c30a50489f653030bf9358889f81d8b172c09

          SHA256

          041496d45403eeba7088060b872fb633fdae092aafeff8a748919c7812581f13

          SHA512

          2b61d2e00d467d7b4aa7f066ffd655b56eebd8b7c5de4940cbab2eab80feaed3c50dee3a7d666c1b333498ef3749a63b763dc5f3e90c7efa50ab54a1ffd95ee1

        • C:\Program Files\Common Files\backup.exe

          Filesize

          72KB

          MD5

          f32ce34baaa22f0d544a5d960b27598e

          SHA1

          b792f025e1606256dc80b22580a727c578969c61

          SHA256

          36983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8

          SHA512

          75d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf

        • C:\Program Files\Common Files\backup.exe

          Filesize

          72KB

          MD5

          f32ce34baaa22f0d544a5d960b27598e

          SHA1

          b792f025e1606256dc80b22580a727c578969c61

          SHA256

          36983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8

          SHA512

          75d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\System Restore.exe

          Filesize

          72KB

          MD5

          31d23da84839990c0c719803c3475f03

          SHA1

          f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d

          SHA256

          89b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e

          SHA512

          e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\System Restore.exe

          Filesize

          72KB

          MD5

          31d23da84839990c0c719803c3475f03

          SHA1

          f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d

          SHA256

          89b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e

          SHA512

          e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89

        • C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe

          Filesize

          72KB

          MD5

          f3e288c47cb7762f170a7a6ca8175fc9

          SHA1

          3e04f6ec935cf30f9fbbc624052527a2feade8ad

          SHA256

          92d69c55013c5f648e7f57aafde833f82632e66df46d8579f6e179848cebda5f

          SHA512

          71b8342349344530dcc3303d2b466bc74dd30aaee77f9c6fd8182b3150c43fd77faf8c79c460695d7a2b8f9a05118a29243893463e73f9afdb5180e1e95554b4

        • C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe

          Filesize

          72KB

          MD5

          f3e288c47cb7762f170a7a6ca8175fc9

          SHA1

          3e04f6ec935cf30f9fbbc624052527a2feade8ad

          SHA256

          92d69c55013c5f648e7f57aafde833f82632e66df46d8579f6e179848cebda5f

          SHA512

          71b8342349344530dcc3303d2b466bc74dd30aaee77f9c6fd8182b3150c43fd77faf8c79c460695d7a2b8f9a05118a29243893463e73f9afdb5180e1e95554b4

        • C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe

          Filesize

          72KB

          MD5

          44423bb43353b84ce10c4133852d0be8

          SHA1

          338ea74c28a12c34f1e0552089a6642aacb8aef0

          SHA256

          c6e73136856a72f5a4e0a815f33e501eca6e43230e7e8b76b3ff23bd462d8f42

          SHA512

          c651ce7706320e461eb01f5d89665292d63777c496dccb67915fbcd9eb1cd812816306e360613e9f8783154d5e576ed7189e27c5134db235818e4d29d430b774

        • C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe

          Filesize

          72KB

          MD5

          44423bb43353b84ce10c4133852d0be8

          SHA1

          338ea74c28a12c34f1e0552089a6642aacb8aef0

          SHA256

          c6e73136856a72f5a4e0a815f33e501eca6e43230e7e8b76b3ff23bd462d8f42

          SHA512

          c651ce7706320e461eb01f5d89665292d63777c496dccb67915fbcd9eb1cd812816306e360613e9f8783154d5e576ed7189e27c5134db235818e4d29d430b774

        • C:\Program Files\Common Files\microsoft shared\backup.exe

          Filesize

          72KB

          MD5

          2c19fb68f60f68de7eb81300fb04507d

          SHA1

          9ce1dacf8b7403e6f7701fa72e40f10930c5be68

          SHA256

          42d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5

          SHA512

          70d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92

        • C:\Program Files\Common Files\microsoft shared\backup.exe

          Filesize

          72KB

          MD5

          2c19fb68f60f68de7eb81300fb04507d

          SHA1

          9ce1dacf8b7403e6f7701fa72e40f10930c5be68

          SHA256

          42d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5

          SHA512

          70d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92

        • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe

          Filesize

          72KB

          MD5

          9eab4596ae886094eb0c564637927480

          SHA1

          afb418a9a7d6f8faa90a85d69072e9faee504f20

          SHA256

          c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293

          SHA512

          06baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d

        • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe

          Filesize

          72KB

          MD5

          9eab4596ae886094eb0c564637927480

          SHA1

          afb418a9a7d6f8faa90a85d69072e9faee504f20

          SHA256

          c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293

          SHA512

          06baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d

        • C:\Program Files\Common Files\microsoft shared\ink\backup.exe

          Filesize

          72KB

          MD5

          31d23da84839990c0c719803c3475f03

          SHA1

          f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d

          SHA256

          89b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e

          SHA512

          e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89

        • C:\Program Files\Common Files\microsoft shared\ink\backup.exe

          Filesize

          72KB

          MD5

          31d23da84839990c0c719803c3475f03

          SHA1

          f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d

          SHA256

          89b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e

          SHA512

          e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89

        • C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe

          Filesize

          72KB

          MD5

          9eab4596ae886094eb0c564637927480

          SHA1

          afb418a9a7d6f8faa90a85d69072e9faee504f20

          SHA256

          c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293

          SHA512

          06baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d

        • C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe

          Filesize

          72KB

          MD5

          9eab4596ae886094eb0c564637927480

          SHA1

          afb418a9a7d6f8faa90a85d69072e9faee504f20

          SHA256

          c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293

          SHA512

          06baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d

        • C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe

          Filesize

          72KB

          MD5

          9eab4596ae886094eb0c564637927480

          SHA1

          afb418a9a7d6f8faa90a85d69072e9faee504f20

          SHA256

          c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293

          SHA512

          06baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d

        • C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe

          Filesize

          72KB

          MD5

          9eab4596ae886094eb0c564637927480

          SHA1

          afb418a9a7d6f8faa90a85d69072e9faee504f20

          SHA256

          c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293

          SHA512

          06baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d

        • C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe

          Filesize

          72KB

          MD5

          b4e27c202fd9eec80d49a67e046065f0

          SHA1

          12cfab560e9f6b97442e8e940b5ea406125d241b

          SHA256

          05e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75

          SHA512

          862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b

        • C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe

          Filesize

          72KB

          MD5

          06fa3cf2e3240dbbdd28e3fe49a49962

          SHA1

          e870690b4ffb50a13cc8f57e0bfa87726e5ee6e8

          SHA256

          eb88d4ea86f95861381e0e3410daca2c97fa6922be763f46ddc75701b20cc376

          SHA512

          02e41f82f878735bc12c36d95f4ffddb0d630230da5cb704285cba131679ddcb6e56499b48a46b4b544a4d89fbd0abccd99a433bcb677cef34f2eaa063103f78

        • C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe

          Filesize

          72KB

          MD5

          06fa3cf2e3240dbbdd28e3fe49a49962

          SHA1

          e870690b4ffb50a13cc8f57e0bfa87726e5ee6e8

          SHA256

          eb88d4ea86f95861381e0e3410daca2c97fa6922be763f46ddc75701b20cc376

          SHA512

          02e41f82f878735bc12c36d95f4ffddb0d630230da5cb704285cba131679ddcb6e56499b48a46b4b544a4d89fbd0abccd99a433bcb677cef34f2eaa063103f78

        • C:\Program Files\Google\backup.exe

          Filesize

          72KB

          MD5

          70bdcf625a9406af56f8b059c62ef7aa

          SHA1

          c4fcd41edf2f88bbe7e4bd06169285904f97dfc9

          SHA256

          23ba39e3e2c69352f3635327fe9cf4e0e36288e056dcd5dc317e908322ab8981

          SHA512

          a0847a35c24a5677df4135eb47c31b421e3c6249a94cd31446a7b31bedba7a50497af60a4a6ff25280f8c1b4b79fe76ebc9f7c71aa4bdff0ad5eef93d1d28fbf

        • C:\Program Files\Google\backup.exe

          Filesize

          72KB

          MD5

          70bdcf625a9406af56f8b059c62ef7aa

          SHA1

          c4fcd41edf2f88bbe7e4bd06169285904f97dfc9

          SHA256

          23ba39e3e2c69352f3635327fe9cf4e0e36288e056dcd5dc317e908322ab8981

          SHA512

          a0847a35c24a5677df4135eb47c31b421e3c6249a94cd31446a7b31bedba7a50497af60a4a6ff25280f8c1b4b79fe76ebc9f7c71aa4bdff0ad5eef93d1d28fbf

        • C:\Program Files\backup.exe

          Filesize

          72KB

          MD5

          bb409f7753bac42c55ef8a1d50046a42

          SHA1

          d3a0ce40a12408510bfc1b7cab69386e1be49828

          SHA256

          f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501

          SHA512

          d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c

        • C:\Program Files\backup.exe

          Filesize

          72KB

          MD5

          bb409f7753bac42c55ef8a1d50046a42

          SHA1

          d3a0ce40a12408510bfc1b7cab69386e1be49828

          SHA256

          f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501

          SHA512

          d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c

        • C:\Users\Admin\AppData\Local\Temp\1355086882\data.exe

          Filesize

          72KB

          MD5

          f78452217bd112442ed2a1973d553be4

          SHA1

          c8a2d872d6f99451e5d55165bd1f41ce9c284010

          SHA256

          1dd803d09d25a6a12928e498c787084b13c0bc4dd0be0cbe2a67b7abc41178c7

          SHA512

          8637b373828e7345cf1746bc390fa093f0eec363df3dc0f881157028a8ff67fa7b49ef1e7f0298b84bda25b00604cc1e8f03d6d76eeb52640515f79b041537bc

        • C:\Users\Admin\AppData\Local\Temp\1355086882\data.exe

          Filesize

          72KB

          MD5

          f78452217bd112442ed2a1973d553be4

          SHA1

          c8a2d872d6f99451e5d55165bd1f41ce9c284010

          SHA256

          1dd803d09d25a6a12928e498c787084b13c0bc4dd0be0cbe2a67b7abc41178c7

          SHA512

          8637b373828e7345cf1746bc390fa093f0eec363df3dc0f881157028a8ff67fa7b49ef1e7f0298b84bda25b00604cc1e8f03d6d76eeb52640515f79b041537bc

        • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

          Filesize

          72KB

          MD5

          60f4ba0aaf1903ccaa229ac88427d9eb

          SHA1

          363db1e9efa9df3ba49e7c0a6369091b01974496

          SHA256

          cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0

          SHA512

          1c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e

        • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

          Filesize

          72KB

          MD5

          60f4ba0aaf1903ccaa229ac88427d9eb

          SHA1

          363db1e9efa9df3ba49e7c0a6369091b01974496

          SHA256

          cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0

          SHA512

          1c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e

        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          60f4ba0aaf1903ccaa229ac88427d9eb

          SHA1

          363db1e9efa9df3ba49e7c0a6369091b01974496

          SHA256

          cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0

          SHA512

          1c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e

        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          60f4ba0aaf1903ccaa229ac88427d9eb

          SHA1

          363db1e9efa9df3ba49e7c0a6369091b01974496

          SHA256

          cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0

          SHA512

          1c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e

        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          60f4ba0aaf1903ccaa229ac88427d9eb

          SHA1

          363db1e9efa9df3ba49e7c0a6369091b01974496

          SHA256

          cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0

          SHA512

          1c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e

        • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

          Filesize

          72KB

          MD5

          60f4ba0aaf1903ccaa229ac88427d9eb

          SHA1

          363db1e9efa9df3ba49e7c0a6369091b01974496

          SHA256

          cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0

          SHA512

          1c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e

        • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe

          Filesize

          72KB

          MD5

          72e31d083ab7a60d4443d376778b1732

          SHA1

          50fea985088cbdc1a2e5a85bc5ce8dc58126941e

          SHA256

          3869f6101d4964ae8e13890cf24846f120ac311a3810f57f7fb65c598742ce53

          SHA512

          d8d2bbc912f98a8b9e3aebfbbab1a35f1c34979a8e88c5cf204e9ea3573fe8a8c91e2a2c72f88222c8103e4b4bc65eb275291778681172a9046855f75e503368

        • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe

          Filesize

          72KB

          MD5

          72e31d083ab7a60d4443d376778b1732

          SHA1

          50fea985088cbdc1a2e5a85bc5ce8dc58126941e

          SHA256

          3869f6101d4964ae8e13890cf24846f120ac311a3810f57f7fb65c598742ce53

          SHA512

          d8d2bbc912f98a8b9e3aebfbbab1a35f1c34979a8e88c5cf204e9ea3573fe8a8c91e2a2c72f88222c8103e4b4bc65eb275291778681172a9046855f75e503368

        • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

          Filesize

          72KB

          MD5

          13e0e4a5b891daaa5250cc8325ae09fb

          SHA1

          a127d46bcec183bf1bf416026b6f2319d0cbe6db

          SHA256

          5930bc2b8ef9befddf50ef8ca1a46b7a66332660f91811df96943fa171f8150b

          SHA512

          f5db5c8656ca5176acbe91393773d6c4aac9766748a2748088cf76f0afcdf360075ba7039fb51702e022933d0983f04127022091c1f01f544835891d52b2b37b

        • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe

          Filesize

          72KB

          MD5

          13e0e4a5b891daaa5250cc8325ae09fb

          SHA1

          a127d46bcec183bf1bf416026b6f2319d0cbe6db

          SHA256

          5930bc2b8ef9befddf50ef8ca1a46b7a66332660f91811df96943fa171f8150b

          SHA512

          f5db5c8656ca5176acbe91393773d6c4aac9766748a2748088cf76f0afcdf360075ba7039fb51702e022933d0983f04127022091c1f01f544835891d52b2b37b

        • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe

          Filesize

          72KB

          MD5

          dd0ca1f37823fe9ff4c14dd6e8cf6106

          SHA1

          a836a55497583cc1834529f61be699cb24972b60

          SHA256

          b5c53327506d7fe97f4d97595646f7ec3cb7d3b955a04f664e514b0291f988ad

          SHA512

          09cf4f2ec99f6838db3f682c1b2d2256ad12c1b1d3e019d566e2820a228ce9aeebcfd6872ec52af3e28f7d98aacfb5571a9379afbce19490d7cbf45146a5864f

        • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe

          Filesize

          72KB

          MD5

          dd0ca1f37823fe9ff4c14dd6e8cf6106

          SHA1

          a836a55497583cc1834529f61be699cb24972b60

          SHA256

          b5c53327506d7fe97f4d97595646f7ec3cb7d3b955a04f664e514b0291f988ad

          SHA512

          09cf4f2ec99f6838db3f682c1b2d2256ad12c1b1d3e019d566e2820a228ce9aeebcfd6872ec52af3e28f7d98aacfb5571a9379afbce19490d7cbf45146a5864f

        • C:\backup.exe

          Filesize

          72KB

          MD5

          9ff7c9655bfef56dd860633013e4b992

          SHA1

          c33fe5f113c2512ec72d411334b07779643a7d07

          SHA256

          69ca74954d52e7be9ef555966e755763abdf326bfeeecd1968d0300dcf500993

          SHA512

          97311e6583f35f79a2abec5365e5e76025b472d0d47feb173e3f287146bf7fe37fe78728117b56f096ee7f34ca618374ab8ddcf5d17116866c4e5ab1ddda2902

        • C:\backup.exe

          Filesize

          72KB

          MD5

          9ff7c9655bfef56dd860633013e4b992

          SHA1

          c33fe5f113c2512ec72d411334b07779643a7d07

          SHA256

          69ca74954d52e7be9ef555966e755763abdf326bfeeecd1968d0300dcf500993

          SHA512

          97311e6583f35f79a2abec5365e5e76025b472d0d47feb173e3f287146bf7fe37fe78728117b56f096ee7f34ca618374ab8ddcf5d17116866c4e5ab1ddda2902

        • C:\odt\backup.exe

          Filesize

          72KB

          MD5

          32ba406ad38b8381b4d43aa7c5656282

          SHA1

          bfa87689bf4200e8c260785f183f6d4903cd8ab7

          SHA256

          a3cef1bcde78785cc6c52ac815c8089b0c8a9047db22bfb9f616c8c5815a0aae

          SHA512

          276778d7a35dbe1d69e212123ecf0a15ed558c2cd31f20600e847c92c506d7c997bce2bd49b1319be7872535bd0be68a6e89d15e2d0665801533699a0e8590a0

        • C:\odt\backup.exe

          Filesize

          72KB

          MD5

          32ba406ad38b8381b4d43aa7c5656282

          SHA1

          bfa87689bf4200e8c260785f183f6d4903cd8ab7

          SHA256

          a3cef1bcde78785cc6c52ac815c8089b0c8a9047db22bfb9f616c8c5815a0aae

          SHA512

          276778d7a35dbe1d69e212123ecf0a15ed558c2cd31f20600e847c92c506d7c997bce2bd49b1319be7872535bd0be68a6e89d15e2d0665801533699a0e8590a0

        • memory/240-264-0x0000000000000000-mapping.dmp

        • memory/372-244-0x0000000000000000-mapping.dmp

        • memory/380-150-0x0000000000000000-mapping.dmp

        • memory/440-177-0x0000000000000000-mapping.dmp

        • memory/552-378-0x0000000000000000-mapping.dmp

        • memory/640-314-0x0000000000000000-mapping.dmp

        • memory/792-174-0x0000000000000000-mapping.dmp

        • memory/1160-279-0x0000000000000000-mapping.dmp

        • memory/1388-239-0x0000000000000000-mapping.dmp

        • memory/1528-322-0x0000000000000000-mapping.dmp

        • memory/1532-372-0x0000000000000000-mapping.dmp

        • memory/1664-149-0x0000000000000000-mapping.dmp

        • memory/2044-313-0x0000000000000000-mapping.dmp

        • memory/2076-329-0x0000000000000000-mapping.dmp

        • memory/2240-381-0x0000000000000000-mapping.dmp

        • memory/2280-199-0x0000000000000000-mapping.dmp

        • memory/2348-219-0x0000000000000000-mapping.dmp

        • memory/2372-337-0x0000000000000000-mapping.dmp

        • memory/2472-328-0x0000000000000000-mapping.dmp

        • memory/2560-327-0x0000000000000000-mapping.dmp

        • memory/2564-339-0x0000000000000000-mapping.dmp

        • memory/2624-295-0x0000000000000000-mapping.dmp

        • memory/2656-280-0x0000000000000000-mapping.dmp

        • memory/2664-281-0x0000000000000000-mapping.dmp

        • memory/2712-384-0x0000000000000000-mapping.dmp

        • memory/2724-249-0x0000000000000000-mapping.dmp

        • memory/2880-194-0x0000000000000000-mapping.dmp

        • memory/3004-139-0x0000000000000000-mapping.dmp

        • memory/3016-159-0x0000000000000000-mapping.dmp

        • memory/3180-204-0x0000000000000000-mapping.dmp

        • memory/3192-344-0x0000000000000000-mapping.dmp

        • memory/3324-366-0x0000000000000000-mapping.dmp

        • memory/3492-357-0x0000000000000000-mapping.dmp

        • memory/3532-185-0x0000000000000000-mapping.dmp

        • memory/3576-312-0x0000000000000000-mapping.dmp

        • memory/3592-323-0x0000000000000000-mapping.dmp

        • memory/3624-360-0x0000000000000000-mapping.dmp

        • memory/3676-303-0x0000000000000000-mapping.dmp

        • memory/3964-294-0x0000000000000000-mapping.dmp

        • memory/4076-348-0x0000000000000000-mapping.dmp

        • memory/4084-352-0x0000000000000000-mapping.dmp

        • memory/4104-165-0x0000000000000000-mapping.dmp

        • memory/4136-140-0x0000000000000000-mapping.dmp

        • memory/4240-321-0x0000000000000000-mapping.dmp

        • memory/4280-229-0x0000000000000000-mapping.dmp

        • memory/4356-234-0x0000000000000000-mapping.dmp

        • memory/4360-272-0x0000000000000000-mapping.dmp

        • memory/4420-164-0x0000000000000000-mapping.dmp

        • memory/4456-375-0x0000000000000000-mapping.dmp

        • memory/4472-300-0x0000000000000000-mapping.dmp

        • memory/4572-209-0x0000000000000000-mapping.dmp

        • memory/4584-224-0x0000000000000000-mapping.dmp

        • memory/4640-369-0x0000000000000000-mapping.dmp

        • memory/4680-254-0x0000000000000000-mapping.dmp

        • memory/4768-134-0x0000000000000000-mapping.dmp

        • memory/4848-305-0x0000000000000000-mapping.dmp

        • memory/4888-361-0x0000000000000000-mapping.dmp

        • memory/4892-259-0x0000000000000000-mapping.dmp

        • memory/4920-214-0x0000000000000000-mapping.dmp

        • memory/4960-269-0x0000000000000000-mapping.dmp

        • memory/4964-304-0x0000000000000000-mapping.dmp

        • memory/4980-387-0x0000000000000000-mapping.dmp

        • memory/4988-184-0x0000000000000000-mapping.dmp

        • memory/5044-349-0x0000000000000000-mapping.dmp