
Source: C:\Users\user\Desktop\iBackupViewerSetup.exeįile opened: C:\Users\H ERBBL~1\Ap pData\įile opened: C:\Users\H ERBBL~1\Ap pData\Loca l\Temp\įile opened: C:\Users\H ERBBL~1\Ap pData\Loca l\Temp\is- AO5AL.tmp\ iBackupVie werSetup.t mpįile opened: C:\Users\H ERBBL~1\Ap pData\Loca l\įile opened: C:\Users\H ERBBL~1\Ap pData\Loca l\Temp\is- AO5AL.tmp\Ĭontains functionality to enumerate / list files inside a directory

#Ibackup viewer user experiences windows
Behaviorgraph top1 signatures2 2 Behavior Graph ID: 73789 Sample: iBackupViewerSetup.exe Startdate: Architecture: WINDOWS Score: 20 35 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 2->35 8 iBackupViewerSetup.exe 2 2->8 started process3 file4 19 C:\Users\HERBBL~1\.\iBackupViewerSetup.tmp, PE32 8->19 dropped 11 iBackupViewerSetup.tmp 24 84 8->11 started process5 file6 21 C:\Program Files\iMacTools\.\is-5JAJK.tmp, PE32 11->21 dropped 23 C:\Program Files\iMacTools\.\is-4RL69.tmp, PE32 11->23 dropped 25 C:\Program Files\iMacTools\.\is-4GQ8I.tmp, PE32 11->25 dropped 27 56 other files (6 malicious) 11->27 dropped 14 iBackup Viewer.exe 1 57 11->14 started process7 dnsIp8 29 127.0.0.1 unknown unknown 14->29 31 192.168.2.2 unknown unknown 14->31 33 192.168.2.255 unknown unknown 14->33 17 iBackup Viewer.exe 14 14->17 started process9
