Analysis

  • max time kernel
    118s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 14:04

General

  • Target

    ff01b5545fe20fa6de5ce06212a573e90451ddc2f5da8e7a0234285af729b050.exe

  • Size

    2.0MB

  • MD5

    e20eb29aa454b5381c11c68d875a6925

  • SHA1

    930c635fbfffa29ff2c58c665a7e3404c932f2e0

  • SHA256

    ff01b5545fe20fa6de5ce06212a573e90451ddc2f5da8e7a0234285af729b050

  • SHA512

    4a491b89a7f186eda3efbfeeaefaa1ced0eeca39c987606648d7a1ae62b1939ddab79f48cd725221a36da948449833f868f1ab2aff992061f884893c3a0b6206

  • SSDEEP

    49152:6EB87SJq3vxVDWRkwaxgtPtIorS0+Um6XyNPTVKejl:6EB81yXautPeorSGTSEex

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 39 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 64 IoCs
  • Checks BIOS information in registry 2 TTPs 64 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 64 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 52 IoCs
  • Drops file in Program Files directory 41 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 41 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff01b5545fe20fa6de5ce06212a573e90451ddc2f5da8e7a0234285af729b050.exe
    "C:\Users\Admin\AppData\Local\Temp\ff01b5545fe20fa6de5ce06212a573e90451ddc2f5da8e7a0234285af729b050.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Users\Admin\AppData\Local\Temp\{11D61531-50F6-4473-8529-0C630E10C297}\backup.exe
      C:\Users\Admin\AppData\Local\Temp\{11D61531-50F6-4473-8529-0C630E10C297}\backup.exe C:\Users\Admin\AppData\Local\Temp\{11D61531-50F6-4473-8529-0C630E10C297}\
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4528
      • C:\backup.exe
        \backup.exe \
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1360
        • C:\PerfLogs\backup.exe
          C:\PerfLogs\backup.exe C:\PerfLogs\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:4356
        • C:\Program Files\backup.exe
          "C:\Program Files\backup.exe" C:\Program Files\
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3476
          • C:\Program Files\7-Zip\backup.exe
            "C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:5012
            • C:\Program Files\7-Zip\Lang\System Restore.exe
              "C:\Program Files\7-Zip\Lang\System Restore.exe" C:\Program Files\7-Zip\Lang\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:1680
          • C:\Program Files\Common Files\backup.exe
            "C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\
            5⤵
            • Modifies visibility of file extensions in Explorer
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3120
            • C:\Program Files\Common Files\DESIGNER\backup.exe
              "C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:3544
            • C:\Program Files\Common Files\microsoft shared\backup.exe
              "C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:2940
              • C:\Program Files\Common Files\microsoft shared\ClickToRun\update.exe
                "C:\Program Files\Common Files\microsoft shared\ClickToRun\update.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:5152
              • C:\Program Files\Common Files\microsoft shared\ink\backup.exe
                "C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\
                7⤵
                • Modifies visibility of file extensions in Explorer
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:6028
                • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\data.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\data.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\
                  8⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • System Location Discovery: System Language Discovery
                  PID:3288
                • C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\
                  8⤵
                    PID:1380
                  • C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe
                    "C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\
                    8⤵
                      PID:9460
                    • C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe
                      "C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\
                      8⤵
                        PID:10416
                    • C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe
                      "C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\
                      7⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      PID:2456
                      • C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe
                        "C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\
                        8⤵
                          PID:9724
                      • C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe
                        "C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\
                        7⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • System Location Discovery: System Language Discovery
                        PID:2804
                      • C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe
                        "C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\
                        7⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Identifies Wine through registry keys
                        • System Location Discovery: System Language Discovery
                        PID:7200
                      • C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe
                        "C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\
                        7⤵
                          PID:8980
                        • C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe
                          "C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\
                          7⤵
                            PID:6004
                          • C:\Program Files\Common Files\microsoft shared\TextConv\update.exe
                            "C:\Program Files\Common Files\microsoft shared\TextConv\update.exe" C:\Program Files\Common Files\microsoft shared\TextConv\
                            7⤵
                              PID:11632
                          • C:\Program Files\Common Files\Services\update.exe
                            "C:\Program Files\Common Files\Services\update.exe" C:\Program Files\Common Files\Services\
                            6⤵
                            • Modifies visibility of file extensions in Explorer
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            • System policy modification
                            PID:5760
                          • C:\Program Files\Common Files\System\backup.exe
                            "C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:6304
                            • C:\Program Files\Common Files\System\ado\backup.exe
                              "C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\
                              7⤵
                                PID:4980
                              • C:\Program Files\Common Files\System\de-DE\backup.exe
                                "C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\
                                7⤵
                                  PID:8988
                                • C:\Program Files\Common Files\System\en-US\backup.exe
                                  "C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\
                                  7⤵
                                    PID:5808
                              • C:\Program Files\Crashpad\data.exe
                                "C:\Program Files\Crashpad\data.exe" C:\Program Files\Crashpad\
                                5⤵
                                • Modifies visibility of file extensions in Explorer
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Drops file in Program Files directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:4144
                                • C:\Program Files\Crashpad\attachments\backup.exe
                                  "C:\Program Files\Crashpad\attachments\backup.exe" C:\Program Files\Crashpad\attachments\
                                  6⤵
                                  • Modifies visibility of file extensions in Explorer
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  • System policy modification
                                  PID:5440
                                • C:\Program Files\Crashpad\reports\backup.exe
                                  "C:\Program Files\Crashpad\reports\backup.exe" C:\Program Files\Crashpad\reports\
                                  6⤵
                                  • Modifies visibility of file extensions in Explorer
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  • System policy modification
                                  PID:5652
                              • C:\Program Files\dotnet\backup.exe
                                "C:\Program Files\dotnet\backup.exe" C:\Program Files\dotnet\
                                5⤵
                                • Modifies visibility of file extensions in Explorer
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Drops file in Program Files directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                • System policy modification
                                PID:6020
                                • C:\Program Files\dotnet\host\backup.exe
                                  "C:\Program Files\dotnet\host\backup.exe" C:\Program Files\dotnet\host\
                                  6⤵
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:5832
                                  • C:\Program Files\dotnet\host\fxr\backup.exe
                                    "C:\Program Files\dotnet\host\fxr\backup.exe" C:\Program Files\dotnet\host\fxr\
                                    7⤵
                                      PID:11144
                                  • C:\Program Files\dotnet\shared\backup.exe
                                    "C:\Program Files\dotnet\shared\backup.exe" C:\Program Files\dotnet\shared\
                                    6⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • System Location Discovery: System Language Discovery
                                    PID:7432
                                  • C:\Program Files\dotnet\swidtag\backup.exe
                                    "C:\Program Files\dotnet\swidtag\backup.exe" C:\Program Files\dotnet\swidtag\
                                    6⤵
                                      PID:7692
                                  • C:\Program Files\Google\backup.exe
                                    "C:\Program Files\Google\backup.exe" C:\Program Files\Google\
                                    5⤵
                                    • Modifies visibility of file extensions in Explorer
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Drops file in Program Files directory
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    • System policy modification
                                    PID:6528
                                    • C:\Program Files\Google\Chrome\backup.exe
                                      "C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\
                                      6⤵
                                        PID:6416
                                    • C:\Program Files\Internet Explorer\backup.exe
                                      "C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\
                                      5⤵
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      PID:1396
                                      • C:\Program Files\Internet Explorer\de-DE\backup.exe
                                        "C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\
                                        6⤵
                                          PID:10056
                                        • C:\Program Files\Internet Explorer\en-US\update.exe
                                          "C:\Program Files\Internet Explorer\en-US\update.exe" C:\Program Files\Internet Explorer\en-US\
                                          6⤵
                                            PID:4360
                                        • C:\Program Files\Java\backup.exe
                                          "C:\Program Files\Java\backup.exe" C:\Program Files\Java\
                                          5⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • System Location Discovery: System Language Discovery
                                          PID:7188
                                        • C:\Program Files\Microsoft Office\backup.exe
                                          "C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\
                                          5⤵
                                            PID:1176
                                          • C:\Program Files\Microsoft Office 15\backup.exe
                                            "C:\Program Files\Microsoft Office 15\backup.exe" C:\Program Files\Microsoft Office 15\
                                            5⤵
                                              PID:9692
                                            • C:\Program Files\Mozilla Firefox\backup.exe
                                              "C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\
                                              5⤵
                                                PID:10908
                                            • C:\Program Files (x86)\backup.exe
                                              "C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\
                                              4⤵
                                              • Modifies visibility of file extensions in Explorer
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Drops file in Program Files directory
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              • System policy modification
                                              PID:3936
                                              • C:\Program Files (x86)\Adobe\backup.exe
                                                "C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\
                                                5⤵
                                                • Modifies visibility of file extensions in Explorer
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Drops file in Program Files directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                • System policy modification
                                                PID:3648
                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\update.exe
                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\
                                                  6⤵
                                                  • Modifies visibility of file extensions in Explorer
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Drops file in Program Files directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of SetWindowsHookEx
                                                  • System policy modification
                                                  PID:1248
                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe
                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\
                                                    7⤵
                                                    • Modifies visibility of file extensions in Explorer
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    • System policy modification
                                                    PID:5296
                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe
                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
                                                    7⤵
                                                    • Modifies visibility of file extensions in Explorer
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Executes dropped EXE
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Drops file in Program Files directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    • System policy modification
                                                    PID:6084
                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe
                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\
                                                      8⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • System Location Discovery: System Language Discovery
                                                      PID:7280
                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\data.exe
                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\
                                                      8⤵
                                                        PID:4748
                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\System Restore.exe
                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\
                                                        8⤵
                                                          PID:9680
                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe
                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\
                                                        7⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2492
                                                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe
                                                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\
                                                          8⤵
                                                            PID:9656
                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe
                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\
                                                            8⤵
                                                              PID:10852
                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\data.exe
                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\
                                                            7⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2468
                                                      • C:\Program Files (x86)\Common Files\backup.exe
                                                        "C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\
                                                        5⤵
                                                        • Modifies visibility of file extensions in Explorer
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Drops file in Program Files directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of SetWindowsHookEx
                                                        • System policy modification
                                                        PID:5012
                                                        • C:\Program Files (x86)\Common Files\Adobe\data.exe
                                                          "C:\Program Files (x86)\Common Files\Adobe\data.exe" C:\Program Files (x86)\Common Files\Adobe\
                                                          6⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6768
                                                          • C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe
                                                            "C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\
                                                            7⤵
                                                              PID:3300
                                                            • C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe
                                                              "C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\
                                                              7⤵
                                                                PID:9740
                                                              • C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe
                                                                "C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\
                                                                7⤵
                                                                  PID:10956
                                                              • C:\Program Files (x86)\Common Files\Java\data.exe
                                                                "C:\Program Files (x86)\Common Files\Java\data.exe" C:\Program Files (x86)\Common Files\Java\
                                                                6⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2996
                                                                • C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe
                                                                  "C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe" C:\Program Files (x86)\Common Files\Java\Java Update\
                                                                  7⤵
                                                                    PID:11076
                                                                • C:\Program Files (x86)\Common Files\Microsoft Shared\System Restore.exe
                                                                  "C:\Program Files (x86)\Common Files\Microsoft Shared\System Restore.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\
                                                                  6⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:7412
                                                                • C:\Program Files (x86)\Common Files\Oracle\backup.exe
                                                                  "C:\Program Files (x86)\Common Files\Oracle\backup.exe" C:\Program Files (x86)\Common Files\Oracle\
                                                                  6⤵
                                                                    PID:6404
                                                                  • C:\Program Files (x86)\Common Files\Services\backup.exe
                                                                    "C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\
                                                                    6⤵
                                                                      PID:10000
                                                                    • C:\Program Files (x86)\Common Files\System\backup.exe
                                                                      "C:\Program Files (x86)\Common Files\System\backup.exe" C:\Program Files (x86)\Common Files\System\
                                                                      6⤵
                                                                        PID:11104
                                                                    • C:\Program Files (x86)\Google\backup.exe
                                                                      "C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\
                                                                      5⤵
                                                                      • Modifies visibility of file extensions in Explorer
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • Drops file in Program Files directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      • System policy modification
                                                                      PID:1464
                                                                      • C:\Program Files (x86)\Google\Temp\update.exe
                                                                        "C:\Program Files (x86)\Google\Temp\update.exe" C:\Program Files (x86)\Google\Temp\
                                                                        6⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        PID:6132
                                                                      • C:\Program Files (x86)\Google\Update\backup.exe
                                                                        "C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\
                                                                        6⤵
                                                                          PID:6676
                                                                      • C:\Program Files (x86)\Internet Explorer\backup.exe
                                                                        "C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\
                                                                        5⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:7140
                                                                        • C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe
                                                                          "C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\
                                                                          6⤵
                                                                            PID:9364
                                                                          • C:\Program Files (x86)\Internet Explorer\en-US\backup.exe
                                                                            "C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\
                                                                            6⤵
                                                                              PID:5784
                                                                          • C:\Program Files (x86)\Microsoft\backup.exe
                                                                            "C:\Program Files (x86)\Microsoft\backup.exe" C:\Program Files (x86)\Microsoft\
                                                                            5⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3668
                                                                          • C:\Program Files (x86)\Microsoft.NET\backup.exe
                                                                            "C:\Program Files (x86)\Microsoft.NET\backup.exe" C:\Program Files (x86)\Microsoft.NET\
                                                                            5⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Identifies Wine through registry keys
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:7972
                                                                          • C:\Program Files (x86)\Mozilla Maintenance Service\data.exe
                                                                            "C:\Program Files (x86)\Mozilla Maintenance Service\data.exe" C:\Program Files (x86)\Mozilla Maintenance Service\
                                                                            5⤵
                                                                              PID:8840
                                                                            • C:\Program Files (x86)\MSBuild\backup.exe
                                                                              "C:\Program Files (x86)\MSBuild\backup.exe" C:\Program Files (x86)\MSBuild\
                                                                              5⤵
                                                                                PID:6040
                                                                              • C:\Program Files (x86)\Reference Assemblies\backup.exe
                                                                                "C:\Program Files (x86)\Reference Assemblies\backup.exe" C:\Program Files (x86)\Reference Assemblies\
                                                                                5⤵
                                                                                  PID:11568
                                                                              • C:\Users\backup.exe
                                                                                C:\Users\backup.exe C:\Users\
                                                                                4⤵
                                                                                • Modifies visibility of file extensions in Explorer
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                • System policy modification
                                                                                PID:1604
                                                                                • C:\Users\Admin\backup.exe
                                                                                  C:\Users\Admin\backup.exe C:\Users\Admin\
                                                                                  5⤵
                                                                                  • Modifies visibility of file extensions in Explorer
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  • System policy modification
                                                                                  PID:5484
                                                                                  • C:\Users\Admin\3D Objects\backup.exe
                                                                                    "C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\
                                                                                    6⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2464
                                                                                  • C:\Users\Admin\Contacts\backup.exe
                                                                                    C:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\
                                                                                    6⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:888
                                                                                  • C:\Users\Admin\Desktop\backup.exe
                                                                                    C:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\
                                                                                    6⤵
                                                                                      PID:6200
                                                                                    • C:\Users\Admin\Documents\System Restore.exe
                                                                                      "C:\Users\Admin\Documents\System Restore.exe" C:\Users\Admin\Documents\
                                                                                      6⤵
                                                                                        PID:9332
                                                                                      • C:\Users\Admin\Downloads\backup.exe
                                                                                        C:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\
                                                                                        6⤵
                                                                                          PID:6076
                                                                                      • C:\Users\Public\update.exe
                                                                                        C:\Users\Public\update.exe C:\Users\Public\
                                                                                        5⤵
                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                        • Checks BIOS information in registry
                                                                                        • Executes dropped EXE
                                                                                        • Identifies Wine through registry keys
                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        • System policy modification
                                                                                        PID:1764
                                                                                        • C:\Users\Public\Documents\backup.exe
                                                                                          C:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\
                                                                                          6⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:7732
                                                                                        • C:\Users\Public\Downloads\backup.exe
                                                                                          C:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\
                                                                                          6⤵
                                                                                            PID:8672
                                                                                          • C:\Users\Public\Music\backup.exe
                                                                                            C:\Users\Public\Music\backup.exe C:\Users\Public\Music\
                                                                                            6⤵
                                                                                              PID:6960
                                                                                            • C:\Users\Public\Pictures\backup.exe
                                                                                              C:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\
                                                                                              6⤵
                                                                                                PID:11396
                                                                                          • C:\Windows\backup.exe
                                                                                            C:\Windows\backup.exe C:\Windows\
                                                                                            4⤵
                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Drops file in Windows directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            • System policy modification
                                                                                            PID:6044
                                                                                            • C:\Windows\addins\backup.exe
                                                                                              C:\Windows\addins\backup.exe C:\Windows\addins\
                                                                                              5⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:5004
                                                                                            • C:\Windows\appcompat\backup.exe
                                                                                              C:\Windows\appcompat\backup.exe C:\Windows\appcompat\
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:7708
                                                                                            • C:\Windows\apppatch\backup.exe
                                                                                              C:\Windows\apppatch\backup.exe C:\Windows\apppatch\
                                                                                              5⤵
                                                                                                PID:8656
                                                                                              • C:\Windows\AppReadiness\backup.exe
                                                                                                C:\Windows\AppReadiness\backup.exe C:\Windows\AppReadiness\
                                                                                                5⤵
                                                                                                  PID:6944
                                                                                                • C:\Windows\assembly\backup.exe
                                                                                                  C:\Windows\assembly\backup.exe C:\Windows\assembly\
                                                                                                  5⤵
                                                                                                    PID:11380
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1896553790\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\1896553790\backup.exe C:\Users\Admin\AppData\Local\Temp\1896553790\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:2380
                                                                                            • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\
                                                                                              2⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:4832
                                                                                            • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\System Restore.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:2864
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\
                                                                                              2⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:1892
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:3788
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:3008
                                                                                            • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:5048
                                                                                            • C:\Users\Admin\AppData\Local\Temp\OneNote\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\OneNote\backup.exe C:\Users\Admin\AppData\Local\Temp\OneNote\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:4048
                                                                                              • C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\backup.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\backup.exe C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\
                                                                                                3⤵
                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                • Checks BIOS information in registry
                                                                                                • Executes dropped EXE
                                                                                                • Identifies Wine through registry keys
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                • System policy modification
                                                                                                PID:4292
                                                                                                • C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\Exported\backup.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\Exported\backup.exe C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\Exported\
                                                                                                  4⤵
                                                                                                  • Modifies visibility of file extensions in Explorer
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  • System policy modification
                                                                                                  PID:6148
                                                                                            • C:\Users\Admin\AppData\Local\Temp\TCD9F20.tmp\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\TCD9F20.tmp\backup.exe C:\Users\Admin\AppData\Local\Temp\TCD9F20.tmp\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:5596
                                                                                            • C:\Users\Admin\AppData\Local\Temp\TCD9F31.tmp\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\TCD9F31.tmp\backup.exe C:\Users\Admin\AppData\Local\Temp\TCD9F31.tmp\
                                                                                              2⤵
                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • System policy modification
                                                                                              PID:2312
                                                                                            • C:\Users\Admin\AppData\Local\Temp\TCD9F42.tmp\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\TCD9F42.tmp\backup.exe C:\Users\Admin\AppData\Local\Temp\TCD9F42.tmp\
                                                                                              2⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2284
                                                                                            • C:\Users\Admin\AppData\Local\Temp\TCD9F55.tmp\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\TCD9F55.tmp\backup.exe C:\Users\Admin\AppData\Local\Temp\TCD9F55.tmp\
                                                                                              2⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:6092
                                                                                            • C:\Users\Admin\AppData\Local\Temp\TCD9F56.tmp\backup.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\TCD9F56.tmp\backup.exe C:\Users\Admin\AppData\Local\Temp\TCD9F56.tmp\
                                                                                              2⤵
                                                                                                PID:7696
                                                                                              • C:\Users\Admin\AppData\Local\Temp\TCD9F67.tmp\backup.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\TCD9F67.tmp\backup.exe C:\Users\Admin\AppData\Local\Temp\TCD9F67.tmp\
                                                                                                2⤵
                                                                                                  PID:8968
                                                                                                • C:\Users\Admin\AppData\Local\Temp\TCD9F69.tmp\backup.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\TCD9F69.tmp\backup.exe C:\Users\Admin\AppData\Local\Temp\TCD9F69.tmp\
                                                                                                  2⤵
                                                                                                    PID:4324

                                                                                                Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\PerfLogs\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        9b17ea22deca1bf4516291adc689f1d7

                                                                                                        SHA1

                                                                                                        0e462f8daf7b2af8424304e33d1cd66bf99ee59a

                                                                                                        SHA256

                                                                                                        9c0037fd249f1a755f23e3a29dd0839a5f10fe6e0c56af21cee573b14821e4ce

                                                                                                        SHA512

                                                                                                        ed2aa831475f609d4493b25bed337398dadfefa3051960319d34889a0f94b30e138d761b0834b953e6d4e1e667c0250d9a725d73e70550e560df080a9ea761d8

                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        f06e5f2103c0c3756767f70b76ebe48b

                                                                                                        SHA1

                                                                                                        939ef0841ea716c05c8e5c50cda5c2e38ce613d4

                                                                                                        SHA256

                                                                                                        8cac97150fae4df5118c242585aa9ea4cf124e142e161b54b34a0128560aa475

                                                                                                        SHA512

                                                                                                        f5da402d30f0806714d6a293e37e28170bbf5fac374154f1b33a924eb4305d5c7b5c9ab34f7bfb81f3441a85fb9b5291884257a10586894602750d6635002614

                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\update.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        9a8024fa5ce0dc80f91c6e55d740d635

                                                                                                        SHA1

                                                                                                        ed2f4baef30f27e28a97764cd01b2ec625c90058

                                                                                                        SHA256

                                                                                                        0ad56d697a04b9fc3fd74d80ed22f547061bcca6fac2c9cf2a69ea932cfd7506

                                                                                                        SHA512

                                                                                                        765f540ae16e7763c1c4084daab2bb847406375c5a8610d361c9ab9920b4ba2fa42716b0038f43f2e9f122d0d72cc046f950f137acfb19a9648daf151ae4c45a

                                                                                                      • C:\Program Files (x86)\Adobe\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        f14a4abe9925c8f2a74908eb4aa98b11

                                                                                                        SHA1

                                                                                                        20198d254337f45671cc8172f55e82dfe78ff0c8

                                                                                                        SHA256

                                                                                                        1650d0ce2a6953dbfe977a93b3b5dc987bdf85cbdefb256710391683432e6e0c

                                                                                                        SHA512

                                                                                                        4fdeefc4e051e48d1aa71d256f4a4316e5e17d4efdfe47280ff187976b96b9bbf71accaad4a08c4bbcd13f7eb129b119aa6517a191edab979fde68e6685276f5

                                                                                                      • C:\Program Files (x86)\Common Files\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        d40f361a8277247d4164a97597a0ffeb

                                                                                                        SHA1

                                                                                                        233ec89653f8c0e1cc1ff7bd798f5469c3c41cde

                                                                                                        SHA256

                                                                                                        c9e6a595dd257de812b5c2c887f28541dec906ec123e4a257a72dd65d40e3cd2

                                                                                                        SHA512

                                                                                                        f8e750182ae20491a4d6cafb9b3c0d181af5ecc49544fb430874625c4d8e53f7d0e3b799ac7dc75815a0ba7449bc09b11d0f408d4489054425216504c000a491

                                                                                                      • C:\Program Files (x86)\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        ee417c3a0faa35f3638e6e4b277a9e1d

                                                                                                        SHA1

                                                                                                        c7505b95aa87417f20dc7e29f4bc83dad016d216

                                                                                                        SHA256

                                                                                                        263c2bedb4fcdcf65116b7880d84d92702ac3f095aee673aea9528f30d1f374e

                                                                                                        SHA512

                                                                                                        f26ca66f04b1ba2ad9fcd64e6a4a95abe42dddd5cf696bc40b8534f619f9c424942cb000cbcc9d0ab02f467a950d87342f0455ec2bd7f24654a40c7c290c459c

                                                                                                      • C:\Program Files\7-Zip\Lang\System Restore.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        6415603bd76e59120b3b76db1690d482

                                                                                                        SHA1

                                                                                                        f2e52d27ee7d80e7dd48b288ff3a128d5129f10e

                                                                                                        SHA256

                                                                                                        8288333d057a89230dd4b819d803dee244daced12431bf085ca4e94f48ebea3c

                                                                                                        SHA512

                                                                                                        b6d1701b6c7bf9563aeb2f783df19d507925d8a9fb614e28058448065f0af4288ba5789fcdbd8fb519afd804c77bc87e7dccbc0baebb8df96270d09eae0b57f2

                                                                                                      • C:\Program Files\7-Zip\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        5a949b7bca101537b0ac183e855420e4

                                                                                                        SHA1

                                                                                                        448060426937a6c0f15bfb0a0eb83cb111b0cb3c

                                                                                                        SHA256

                                                                                                        3df3d272297912212fd8a8062b1ef965e516d88fded99a0c3168f40aec07e3d8

                                                                                                        SHA512

                                                                                                        2620c2e81c2ecfc636cd2c957f9b5130d29af5a88b852686809ce0aa6e5dde71b08eeec583a97694e72111432933e1d8b140c36fa48bf7b83bd533aab044bb16

                                                                                                      • C:\Program Files\Common Files\DESIGNER\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        215ec9826892c05a86dd85132e9cce6a

                                                                                                        SHA1

                                                                                                        3753107e67d43512eadc2a5dd5b0337af9f913cf

                                                                                                        SHA256

                                                                                                        a903a5db71690963e68dc1b036e9ae55d3d97fcc00e5dc91cf8d3a4c1c9cb2bd

                                                                                                        SHA512

                                                                                                        6f3a5fe06d4e279e52c77c5499be7c0b77401fd753711a52c3fde42b2e5a5d449a62acd4b04e0977a969419d677875eea73fe54da72c867a22e1caf2e9586a43

                                                                                                      • C:\Program Files\Common Files\Services\update.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        356633872fe18865bcbee90b0cbbff93

                                                                                                        SHA1

                                                                                                        fcd4765973333df25c75d75181820a1d4290aae4

                                                                                                        SHA256

                                                                                                        67a1384f8704f80dc28108618f8696705c09ca44b34c6283bf3ea7ef15451e76

                                                                                                        SHA512

                                                                                                        bc18c92c21065877acd6324ba58c09bdcea75db3968533f0ae2e987e7892264ef1268450553e558427987412abb7f7da8cb40469f0da1c173fa7c51da1413fca

                                                                                                      • C:\Program Files\Common Files\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        e677a619426bcc6266e49e1c0b90b523

                                                                                                        SHA1

                                                                                                        f331cd62e89739b80d9d22d491b2417a25ea388d

                                                                                                        SHA256

                                                                                                        e7118452f510fb8548c9df4cdffda952ab53dc92f08c3c07b3121ecaa72428da

                                                                                                        SHA512

                                                                                                        cd6838dde492ba18eee6204bcc326c4d3b83543403ee7642ced242bff9a20eceabf0e6ea17a12b2b22aa8486acddc7302ba2da7feac707a70cf240b07be7fa6d

                                                                                                      • C:\Program Files\Common Files\microsoft shared\ClickToRun\update.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        901e1ea75f56af7d7b0940b8977f4819

                                                                                                        SHA1

                                                                                                        ee2c1fe81036f663ba13b324829ca805901741e4

                                                                                                        SHA256

                                                                                                        118ebaf4fb8764d9eee2bb1466a74a458e9a5d6ea9127657b3e97b19109aa5ad

                                                                                                        SHA512

                                                                                                        7aa78c44b176a385fb2b583642a0cc46e06e095bbdd46d3dc8570fb7a2b2904cbee980538b3cee98edec44deeafa3b1d837db4cbe53ec719f0b37bd9f297564c

                                                                                                      • C:\Program Files\Common Files\microsoft shared\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        2c73bfff106bf8c6b86c2233c2ddbff9

                                                                                                        SHA1

                                                                                                        32001c768ed8235808cd741f2b2af2e922b211fd

                                                                                                        SHA256

                                                                                                        1b8ae73fd3abf582c97aa10b00033203ef6cb18b92395cbf247d034c219f61e7

                                                                                                        SHA512

                                                                                                        0f78fb36a24dd562d946a6f5b66b2d447ebc95622ac073c437db59099ca0590a7065094721c436fe87cad762e16839d804fc1e397fcf9bc6119f005ac14074e3

                                                                                                      • C:\Program Files\Crashpad\attachments\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        5987cdade91b5e11df8144b90e786711

                                                                                                        SHA1

                                                                                                        eebc0337dd2020403d2f98641a8d848c14631a1b

                                                                                                        SHA256

                                                                                                        cdd1313a7f500151270cced404c9fcf70604100a0b0156911f0474e3152ac8e0

                                                                                                        SHA512

                                                                                                        e7ec53082424dcee7da7717fc094975e7dc18ccfd382d54f70290e306c0201ec111ef4e4adbcaac7f808e74afbde4e9486d8deb70371dfde0b5b0a4ed345a7d0

                                                                                                      • C:\Program Files\Crashpad\data.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        e12cb1c998513d35bc75a444a44e0de5

                                                                                                        SHA1

                                                                                                        3cd86c13205d5da9ab978a32ebb2d28910dc9964

                                                                                                        SHA256

                                                                                                        3ecdc38dcf160d6cdc8091584eaab5eb5332c2233414d90b8054b4fa93c989c6

                                                                                                        SHA512

                                                                                                        61683fe9ef704c0f97a978633649456ce4abaafabea51630561432e9bbab04dc76e6f1fc846482f2f23b11d7eae2513a1b4f163bb266bf709f988536eb655279

                                                                                                      • C:\Program Files\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        234090f14d16286e5710500dffd01fbd

                                                                                                        SHA1

                                                                                                        3c25bd8e7080ed8f98cb4089b909745d72ac06f7

                                                                                                        SHA256

                                                                                                        d5a60bd5e1572ad4bad10d23d556c66e82f63f1f056441efb58a0ed6866fc5be

                                                                                                        SHA512

                                                                                                        2c6244d642af2a0df7c20579589ffeac7fbea2b65242f196dfd3b0845be35f6777bf04854d66795a7e6fc4c732c638828ef975504a06245bf2687f8afb48f8e2

                                                                                                      • C:\Program Files\dotnet\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        25dd80f944c02d322009c3ae5e06da35

                                                                                                        SHA1

                                                                                                        45c56b019a7437dbd2059c624359f9f575ee1186

                                                                                                        SHA256

                                                                                                        85bb96eee0db41c24429eecf176c5f1db71701d61691771c7adca441d102da37

                                                                                                        SHA512

                                                                                                        6f130632e4cc78bbf2481616a29422391b79586cb5bfdaa77e4b68e39e01b66cec7e75a07ee774cde06508d064b9f6a2a078b356e4c5b0c466bfc8e9fffe64ec

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1896553790\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        bedd4618ffd4c8417c3869ae4fe6524f

                                                                                                        SHA1

                                                                                                        a83b5aca0ea3059fa81d9d5911ccbf5332c5b4b0

                                                                                                        SHA256

                                                                                                        15e1e7ae52d93061acb5c947a2261f31c90bc2dc410c6d7f503edc6e91685b51

                                                                                                        SHA512

                                                                                                        1af9a43e7956741f38b1f942558cd36a05031091b4ba157ea2832d95078ce264271027ce97e7a328cc974fe37b2567d7c9bd7323d8abff38f1591f1e9bd98992

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Low\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        373f0575c76d35b42fa33614f2b84931

                                                                                                        SHA1

                                                                                                        68348ddc8e12922a9d04ac9f3d741318ee6dcee7

                                                                                                        SHA256

                                                                                                        eb27b013c27abd70b9171bf67b88ce6daf23db17e11bcc90b5c14b46737bbba2

                                                                                                        SHA512

                                                                                                        296691939a4bb9e820d3503fde159c8deba2271adb96f136f96f28b1e2d0cbfb038b03ac4713b2bce5cf5ebb360327d749f65a673a0a317733d524165b7cead2

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        3a5215ef7e7ab1b7573854e4f62bcaba

                                                                                                        SHA1

                                                                                                        4943da0c2c2607fd51d47654197617dc0711cf93

                                                                                                        SHA256

                                                                                                        404721a08f50b1ed734c95a67cea16edc73a2108bfa3f46427fd3e8b1c847832

                                                                                                        SHA512

                                                                                                        bc0bc12f922e23b45f046443b767862158fb20ac8adababc466d612d745e78070119476542e359de16e700772e736285a1eef4717e731af431063a83a7f43413

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        e2ea2828f2a30f4e62136de60d002f13

                                                                                                        SHA1

                                                                                                        830ff1f472d40400d0a4a1f10e0f261b0f1a51da

                                                                                                        SHA256

                                                                                                        26c57b41707bbfd3d6de56e1b4ba2f9997bf45757532487f0df7202a2328af70

                                                                                                        SHA512

                                                                                                        ed430262aff60c4a1077132ca7dd72778baeb67a8aab8311e4609517c3ef84c760cd80f20b361591bd300d2e8b10cac8e3c7e4205a6fba4671b869e56c306659

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        fc34064515bb3fecd81c632908a37e62

                                                                                                        SHA1

                                                                                                        32f7dfa55dc8fa8428b5510aeafeabb4fc289caf

                                                                                                        SHA256

                                                                                                        9940b6654af3b2f67aae6ccbbc5e598c607bd670ba8112f6d5a89e52f3b5d9b8

                                                                                                        SHA512

                                                                                                        b6a96c2d708f9ade2130a08f85f3bb00d8ec476938c4fc33dcbbcf04453ad24f897f6363cf62f4bece095d19c6cff687c85e0b63ef9f03db18ce1337853e7747

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\OneNote\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        650ac3176b8dea483f49a6ba45361588

                                                                                                        SHA1

                                                                                                        258e106df42ba082315be28bc0c72243a913a1f6

                                                                                                        SHA256

                                                                                                        12b6418de7c18e2eb01f3651439bdb9944aa116c599a3d845c4b48f460ff7190

                                                                                                        SHA512

                                                                                                        4f08cbd877eb45ab28a55e9811a26a09608797f80d79144be62e3750a82d0e16e2b3bfa54a46de5f31ae100c71d2b750880d5513c25586251a4c6f3dba160082

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\TCD9F20.tmp\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        c43b8f41d7514b3bb247f6f593f55925

                                                                                                        SHA1

                                                                                                        d0a1c3aa91983051ce1b2acf166940fdb796d442

                                                                                                        SHA256

                                                                                                        9364fd26348c6939851851018a32210bf26e1ae048a83dce6ad92296c06e6ff0

                                                                                                        SHA512

                                                                                                        d30848a40177c1c6c23e3b8248b03d97d734acb13506f7f37deea4bc11715b7276cd0567e7878f1ba6cc52b34d04b75ad9e55713465e6c13f40728aa7ca2a2c1

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        abcbba5a0a4c664d14aa377836e9b833

                                                                                                        SHA1

                                                                                                        0c93e523b72b81c4ec6cf20ec40f5c5286ceae19

                                                                                                        SHA256

                                                                                                        b670260e10bf3c4d1a41d4287ae43b613cdc6906b6a1b1902df50cd0e1bf6722

                                                                                                        SHA512

                                                                                                        b581ffd6b2e6a23b8ef450f8b9651bf922e1756188226bf3355b95b2c5f4b2e00376bd69d2d8e6d2dfd812934bd59fbd56f3083147304636c242e0226db2abc2

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\System Restore.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        227bdc53fedea823d69328f3dc0bfa9f

                                                                                                        SHA1

                                                                                                        6fd1b78e37b0e28c1fe3f5f0bcb94fd3bb1d1734

                                                                                                        SHA256

                                                                                                        a51d7b23fdcdf7113e689d5ae476651d39f52cdf158edb0ffc5f99f201607614

                                                                                                        SHA512

                                                                                                        cace6562673102d8255732a906966c2b4e2c94d23a1a51b7f418ba6733ab9a21975e6adc2ba56a78b441489817c51558636f000e3d6123a61a44b3b7720e9980

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        3123952224f4bee3a6ba86b800b9361f

                                                                                                        SHA1

                                                                                                        f27e62671974fa1763f62a63439ad0827452ec2a

                                                                                                        SHA256

                                                                                                        6069d25f8ea437b7d7e7da256672b173181f0b0323e2110c493d71129c31ac25

                                                                                                        SHA512

                                                                                                        4701af3c654d80dcd3f006a7cd8a27a9d0532f5c2a3ad8e40961e7d8aedb36da81a927326f1fb16b97bfcdaa41b64cef8b50dc839862670c4add1e9fe9652839

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\{11D61531-50F6-4473-8529-0C630E10C297}\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        532c9c689be114392d5303556303ad7c

                                                                                                        SHA1

                                                                                                        40fbada833f6852abbc48342d36b25b67e4d24ff

                                                                                                        SHA256

                                                                                                        872d30f0da907c951e3a9d8a98fe67117f8204995d2b6565f1e0d44cfb0d8545

                                                                                                        SHA512

                                                                                                        d9d1e65ce9fb9dcf2aadc7291fb2e25ee8b5dd2152a86ab88b1f9e9afcb194f2a7aec149a38a5b3121aa367d83896d819aae49372d631406612b68e512937e63

                                                                                                      • C:\Users\Admin\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        0938e6f5498c9d1e70c0bdc65042bfd6

                                                                                                        SHA1

                                                                                                        3227bd78c5d0038ca6f7a203325560572f4428ba

                                                                                                        SHA256

                                                                                                        28fb74a118958973a012e1c5d79dcadb4a36177872af0a43765134c298d08dbd

                                                                                                        SHA512

                                                                                                        e54b482ba98fef0ab29e6d425b6722d70d86d524a8ae57bd64ca036d366bf0e4ec87dea7cdcdf361c4d4b1b05f326c54703ddf1e39f322ddf09e0b27d3d4c9a7

                                                                                                      • C:\Users\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        9409b530a032afda673eb0961fb83433

                                                                                                        SHA1

                                                                                                        603a430859358d68b8daa5feb9cf0b850557926a

                                                                                                        SHA256

                                                                                                        dab9e2b4d13fd52998fab1541cf97a18699d65302d99ebfebea2ecd02ab6a50f

                                                                                                        SHA512

                                                                                                        3ee79dd86b1dbc9f05ea18561c81683a7008629ed5b9f185bf3f7500ed00e0e12280a856bea45600dda98c0978a4e8090a2f7651cf90eb00eeeb9a61b0cf6103

                                                                                                      • C:\Windows\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        ae6fd216148b2b81520e575f31d86308

                                                                                                        SHA1

                                                                                                        0f334e4e5b6df120b957bc246bfda2fc906871fe

                                                                                                        SHA256

                                                                                                        aafcc4d953a3467b6e5bb491ff92f7affb2f6c9016130dbaab244a8f3fd3cad6

                                                                                                        SHA512

                                                                                                        447accf15d60aef43f0d234b0625f90e29ece9cdcb18caadc699f14b73ee08bdf3aff3c9704b396d927c218ce1c60596ee1a4c5f86c127c30c34ee7e3d6857ba

                                                                                                      • C:\backup.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        fe1b0cfc9b8417a8bca85c3a18eeb3a5

                                                                                                        SHA1

                                                                                                        ace9a123d512773f38e3e28b647da259619712d7

                                                                                                        SHA256

                                                                                                        4b320c4497b599d4318b25d3070fb5edbccfca745407cef789fc9ae5c4076118

                                                                                                        SHA512

                                                                                                        766e40e77a0504ca7751e3a5ae3b41701bdd84e3869d9d3baea0f47497caef97644aabae08614fdbc7259a336321302a66047bdc1a63fbce0d02d9faac9f1c27

                                                                                                      • memory/632-87-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/632-198-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/632-29-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/632-296-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/632-37-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/632-252-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/632-0-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/632-143-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1248-278-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1248-437-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1248-234-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1248-173-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1248-253-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1360-19-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1360-190-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1360-128-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1360-287-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1360-250-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1360-61-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1360-67-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1604-280-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1604-240-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1680-114-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1680-88-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1892-106-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/1892-100-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2380-28-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2864-65-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2864-45-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2940-251-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2940-271-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2940-162-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2940-324-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/2940-232-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3008-96-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3008-127-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3120-111-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3120-230-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3120-172-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3120-322-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3120-337-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3120-150-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3120-276-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3476-270-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3476-229-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3476-321-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3476-163-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3476-109-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3476-89-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3476-55-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3544-165-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3544-136-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3648-189-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3648-227-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3648-238-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3788-98-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3936-231-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3936-277-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3936-119-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3936-188-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3936-323-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/3936-155-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4048-255-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4048-151-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4048-249-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4048-226-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4144-258-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4144-279-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4144-331-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4144-239-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4144-191-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4292-294-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4356-36-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4356-57-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-269-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-99-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-8-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-48-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-225-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-308-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-44-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4528-154-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4832-47-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/4832-26-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5012-116-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5012-297-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5012-74-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5048-129-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5048-153-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5152-295-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5296-307-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5296-301-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5440-309-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5484-310-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/5596-311-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB