Analysis
-
max time kernel
193s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe
Resource
win10v2004-20220812-en
General
-
Target
547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe
-
Size
72KB
-
MD5
4ec2f2556ff3f87f8834c6cb2269c68d
-
SHA1
37dd7843276b4fd7edcf62aa2d475727ac01801d
-
SHA256
547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9
-
SHA512
012ee24468d2d6c4055cefa080b940219e0d5c03f4ca4229b8ca4a101a87c7a0ee300b7f0cc744e41bc7441249f994ec38ec02016cd8b5f7c435e22621347121
-
SSDEEP
768:rpQNwC3BEc4QEfu0Ei8XxNDINE3BEJwRr9j:teThavEjDWguK9j
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4716 data.exe 3360 backup.exe 1504 backup.exe 5052 update.exe 2944 backup.exe 4004 backup.exe 208 backup.exe 2152 backup.exe 4964 backup.exe 1224 backup.exe 4816 backup.exe 3576 backup.exe 3552 backup.exe 4952 backup.exe 2272 backup.exe 4804 backup.exe 4912 backup.exe 3096 backup.exe 360 backup.exe 3636 data.exe 3108 backup.exe 916 backup.exe 2168 backup.exe 2108 update.exe 3324 backup.exe 2252 backup.exe 4616 backup.exe 3000 backup.exe 928 System Restore.exe 3464 backup.exe 1004 backup.exe 4484 backup.exe 1044 backup.exe 376 backup.exe 3024 data.exe 2076 backup.exe 3792 backup.exe 3120 backup.exe 1844 backup.exe 4836 backup.exe 1668 backup.exe 984 backup.exe 2536 backup.exe 4748 backup.exe 1612 backup.exe 3276 System Restore.exe 4268 data.exe 4764 data.exe 3336 backup.exe 848 backup.exe 1092 update.exe 4692 backup.exe 4444 backup.exe 5016 System Restore.exe 2204 backup.exe 4324 backup.exe 2692 backup.exe 4768 backup.exe 4188 backup.exe 4636 backup.exe 4312 backup.exe 1676 backup.exe 3916 backup.exe 2288 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\update.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\update.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\update.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\update.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe data.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\update.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 4716 data.exe 3360 backup.exe 1504 backup.exe 5052 update.exe 2944 backup.exe 4004 backup.exe 208 backup.exe 4964 backup.exe 2152 backup.exe 1224 backup.exe 4816 backup.exe 3576 backup.exe 3552 backup.exe 4952 backup.exe 2272 backup.exe 4804 backup.exe 4912 backup.exe 3096 backup.exe 360 backup.exe 3636 data.exe 3108 backup.exe 916 backup.exe 2168 backup.exe 2108 update.exe 3324 backup.exe 4616 backup.exe 3000 backup.exe 3464 backup.exe 928 System Restore.exe 2252 backup.exe 3024 data.exe 1004 backup.exe 4484 backup.exe 376 backup.exe 1044 backup.exe 2076 backup.exe 3792 backup.exe 3120 backup.exe 4836 backup.exe 1844 backup.exe 1668 backup.exe 984 backup.exe 2536 backup.exe 4748 backup.exe 3276 System Restore.exe 4268 data.exe 4764 data.exe 1612 backup.exe 848 backup.exe 1092 update.exe 4444 backup.exe 4692 backup.exe 5016 System Restore.exe 2204 backup.exe 4324 backup.exe 2692 backup.exe 4636 backup.exe 4768 backup.exe 4312 backup.exe 4188 backup.exe 1676 backup.exe 4048 backup.exe 3916 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4716 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 80 PID 3332 wrote to memory of 4716 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 80 PID 3332 wrote to memory of 4716 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 80 PID 3332 wrote to memory of 3360 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 83 PID 3332 wrote to memory of 3360 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 83 PID 3332 wrote to memory of 3360 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 83 PID 3332 wrote to memory of 1504 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 84 PID 3332 wrote to memory of 1504 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 84 PID 3332 wrote to memory of 1504 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 84 PID 4716 wrote to memory of 5052 4716 data.exe 85 PID 4716 wrote to memory of 5052 4716 data.exe 85 PID 4716 wrote to memory of 5052 4716 data.exe 85 PID 3332 wrote to memory of 2944 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 86 PID 3332 wrote to memory of 2944 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 86 PID 3332 wrote to memory of 2944 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 86 PID 3332 wrote to memory of 4004 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 87 PID 3332 wrote to memory of 4004 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 87 PID 3332 wrote to memory of 4004 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 87 PID 5052 wrote to memory of 208 5052 update.exe 88 PID 5052 wrote to memory of 208 5052 update.exe 88 PID 5052 wrote to memory of 208 5052 update.exe 88 PID 5052 wrote to memory of 2152 5052 update.exe 89 PID 5052 wrote to memory of 2152 5052 update.exe 89 PID 5052 wrote to memory of 2152 5052 update.exe 89 PID 3332 wrote to memory of 4964 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 90 PID 3332 wrote to memory of 4964 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 90 PID 3332 wrote to memory of 4964 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 90 PID 5052 wrote to memory of 1224 5052 update.exe 91 PID 5052 wrote to memory of 1224 5052 update.exe 91 PID 5052 wrote to memory of 1224 5052 update.exe 91 PID 3332 wrote to memory of 4816 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 92 PID 3332 wrote to memory of 4816 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 92 PID 3332 wrote to memory of 4816 3332 547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe 92 PID 1224 wrote to memory of 3576 1224 backup.exe 93 PID 1224 wrote to memory of 3576 1224 backup.exe 93 PID 1224 wrote to memory of 3576 1224 backup.exe 93 PID 3576 wrote to memory of 3552 3576 backup.exe 94 PID 3576 wrote to memory of 3552 3576 backup.exe 94 PID 3576 wrote to memory of 3552 3576 backup.exe 94 PID 1224 wrote to memory of 4952 1224 backup.exe 95 PID 1224 wrote to memory of 4952 1224 backup.exe 95 PID 1224 wrote to memory of 4952 1224 backup.exe 95 PID 4952 wrote to memory of 2272 4952 backup.exe 96 PID 4952 wrote to memory of 2272 4952 backup.exe 96 PID 4952 wrote to memory of 2272 4952 backup.exe 96 PID 4952 wrote to memory of 4804 4952 backup.exe 97 PID 4952 wrote to memory of 4804 4952 backup.exe 97 PID 4952 wrote to memory of 4804 4952 backup.exe 97 PID 4804 wrote to memory of 4912 4804 backup.exe 98 PID 4804 wrote to memory of 4912 4804 backup.exe 98 PID 4804 wrote to memory of 4912 4804 backup.exe 98 PID 4804 wrote to memory of 3096 4804 backup.exe 99 PID 4804 wrote to memory of 3096 4804 backup.exe 99 PID 4804 wrote to memory of 3096 4804 backup.exe 99 PID 3096 wrote to memory of 360 3096 backup.exe 100 PID 3096 wrote to memory of 360 3096 backup.exe 100 PID 3096 wrote to memory of 360 3096 backup.exe 100 PID 3096 wrote to memory of 3636 3096 backup.exe 101 PID 3096 wrote to memory of 3636 3096 backup.exe 101 PID 3096 wrote to memory of 3636 3096 backup.exe 101 PID 3096 wrote to memory of 3108 3096 backup.exe 102 PID 3096 wrote to memory of 3108 3096 backup.exe 102 PID 3096 wrote to memory of 3108 3096 backup.exe 102 PID 3096 wrote to memory of 916 3096 backup.exe 103 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe"C:\Users\Admin\AppData\Local\Temp\547bbd817b8e130e8492f50810cba046196fd63f0df21c02559a91516a1ce2d9.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\4105260281\data.exeC:\Users\Admin\AppData\Local\Temp\4105260281\data.exe C:\Users\Admin\AppData\Local\Temp\4105260281\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\update.exe\update.exe \3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:208
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2152
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3552
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4912
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:360
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\data.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\data.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3636
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3108
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:916
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2108
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3464
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4836
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2536
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:3336
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4188
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵PID:2360
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Drops file in Program Files directory
PID:1200 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵PID:4968
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Modifies visibility of file extensions in Explorer
PID:3540
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:916
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:728
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵
- System policy modification
PID:2380
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\9⤵PID:3628
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\9⤵PID:2540
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\9⤵PID:4628
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\9⤵PID:2180
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
PID:4492
-
-
-
C:\Program Files\Common Files\microsoft shared\ink\he-IL\update.exe"C:\Program Files\Common Files\microsoft shared\ink\he-IL\update.exe" C:\Program Files\Common Files\microsoft shared\ink\he-IL\8⤵
- System policy modification
PID:3456
-
-
C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hr-HR\8⤵
- System policy modification
PID:3584
-
-
C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hu-HU\8⤵PID:1944
-
-
C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\8⤵PID:2296
-
-
C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\it-IT\8⤵PID:4540
-
-
C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ja-JP\8⤵PID:4908
-
-
C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ko-KR\8⤵
- System policy modification
PID:1044
-
-
C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\8⤵PID:4764
-
-
C:\Program Files\Common Files\microsoft shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\lt-LT\8⤵PID:2328
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3120
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4324
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3916 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
PID:740
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\update.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\update.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵PID:1836
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Modifies visibility of file extensions in Explorer
PID:2588
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵PID:2248
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- System policy modification
PID:1228 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵PID:1388
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\System Restore.exe"C:\Program Files\Common Files\microsoft shared\Triedit\System Restore.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵PID:1704
-
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\System Restore.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\System Restore.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵PID:5048
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4032
-
-
C:\Program Files\Common Files\microsoft shared\VGX\backup.exe"C:\Program Files\Common Files\microsoft shared\VGX\backup.exe" C:\Program Files\Common Files\microsoft shared\VGX\7⤵
- System policy modification
PID:208
-
-
C:\Program Files\Common Files\microsoft shared\VSTO\update.exe"C:\Program Files\Common Files\microsoft shared\VSTO\update.exe" C:\Program Files\Common Files\microsoft shared\VSTO\7⤵PID:3832
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4616
-
-
C:\Program Files\Common Files\System\data.exe"C:\Program Files\Common Files\System\data.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3024 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3792 -
C:\Program Files\Common Files\System\ado\de-DE\data.exe"C:\Program Files\Common Files\System\ado\de-DE\data.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4764
-
-
C:\Program Files\Common Files\System\ado\en-US\System Restore.exe"C:\Program Files\Common Files\System\ado\en-US\System Restore.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4636
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Executes dropped EXE
- System policy modification
PID:2288
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:3844
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- System policy modification
PID:1980
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
PID:2900
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:380
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:3564
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Modifies visibility of file extensions in Explorer
PID:4688
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:1576
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1488
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- Drops file in Program Files directory
PID:3320 -
C:\Program Files\Common Files\System\msadc\de-DE\backup.exe"C:\Program Files\Common Files\System\msadc\de-DE\backup.exe" C:\Program Files\Common Files\System\msadc\de-DE\8⤵PID:4816
-
-
C:\Program Files\Common Files\System\msadc\en-US\backup.exe"C:\Program Files\Common Files\System\msadc\en-US\backup.exe" C:\Program Files\Common Files\System\msadc\en-US\8⤵
- System policy modification
PID:4260
-
-
C:\Program Files\Common Files\System\msadc\es-ES\backup.exe"C:\Program Files\Common Files\System\msadc\es-ES\backup.exe" C:\Program Files\Common Files\System\msadc\es-ES\8⤵PID:4388
-
-
C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe"C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe" C:\Program Files\Common Files\System\msadc\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1976
-
-
C:\Program Files\Common Files\System\msadc\it-IT\backup.exe"C:\Program Files\Common Files\System\msadc\it-IT\backup.exe" C:\Program Files\Common Files\System\msadc\it-IT\8⤵PID:1456
-
-
C:\Program Files\Common Files\System\msadc\ja-JP\backup.exe"C:\Program Files\Common Files\System\msadc\ja-JP\backup.exe" C:\Program Files\Common Files\System\msadc\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:1388
-
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:4836
-
C:\Program Files\Common Files\System\Ole DB\de-DE\backup.exe"C:\Program Files\Common Files\System\Ole DB\de-DE\backup.exe" C:\Program Files\Common Files\System\Ole DB\de-DE\8⤵PID:2368
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3324 -
C:\Program Files\Google\Chrome\System Restore.exe"C:\Program Files\Google\Chrome\System Restore.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:928 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4268
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4444
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4768
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Suspicious use of SetWindowsHookEx
PID:4048
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- System policy modification
PID:616
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- System policy modification
PID:2772
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:628 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- Drops file in Program Files directory
PID:1260 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵
- Modifies visibility of file extensions in Explorer
PID:1988
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:2268
-
-
-
-
-
C:\Program Files\Internet Explorer\System Restore.exe"C:\Program Files\Internet Explorer\System Restore.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3276 -
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
C:\Program Files\Internet Explorer\de-DE\update.exe"C:\Program Files\Internet Explorer\de-DE\update.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:504
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
PID:4580
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:2296
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- System policy modification
PID:4392
-
-
C:\Program Files\Internet Explorer\SIGNUP\data.exe"C:\Program Files\Internet Explorer\SIGNUP\data.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4852
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Drops file in Program Files directory
PID:3304 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Drops file in Program Files directory
PID:3756 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵PID:1716
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1680 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵
- Modifies visibility of file extensions in Explorer
PID:3684
-
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵
- System policy modification
PID:2112
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵
- System policy modification
PID:1520
-
-
C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\7⤵PID:4692
-
C:\Program Files\Java\jdk1.8.0_66\jre\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\bin\8⤵PID:3504
-
-
-
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:3992 -
C:\Program Files\Java\jre1.8.0_66\bin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\7⤵
- Drops file in Program Files directory
PID:3904 -
C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\8⤵
- Modifies visibility of file extensions in Explorer
PID:4924
-
-
C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\plugin2\8⤵PID:3772
-
-
C:\Program Files\Java\jre1.8.0_66\bin\server\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\server\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\server\8⤵PID:2444
-
-
-
C:\Program Files\Java\jre1.8.0_66\lib\backup.exe"C:\Program Files\Java\jre1.8.0_66\lib\backup.exe" C:\Program Files\Java\jre1.8.0_66\lib\7⤵
- Modifies visibility of file extensions in Explorer
PID:4392 -
C:\Program Files\Java\jre1.8.0_66\lib\amd64\backup.exe"C:\Program Files\Java\jre1.8.0_66\lib\amd64\backup.exe" C:\Program Files\Java\jre1.8.0_66\lib\amd64\8⤵
- Modifies visibility of file extensions in Explorer
PID:4668
-
-
C:\Program Files\Java\jre1.8.0_66\lib\applet\backup.exe"C:\Program Files\Java\jre1.8.0_66\lib\applet\backup.exe" C:\Program Files\Java\jre1.8.0_66\lib\applet\8⤵PID:1400
-
-
C:\Program Files\Java\jre1.8.0_66\lib\cmm\update.exe"C:\Program Files\Java\jre1.8.0_66\lib\cmm\update.exe" C:\Program Files\Java\jre1.8.0_66\lib\cmm\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4212
-
-
C:\Program Files\Java\jre1.8.0_66\lib\deploy\backup.exe"C:\Program Files\Java\jre1.8.0_66\lib\deploy\backup.exe" C:\Program Files\Java\jre1.8.0_66\lib\deploy\8⤵PID:1588
-
-
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Drops file in Program Files directory
PID:2140 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵
- Modifies visibility of file extensions in Explorer
PID:3676
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵PID:2200
-
-
C:\Program Files\Microsoft Office\root\System Restore.exe"C:\Program Files\Microsoft Office\root\System Restore.exe" C:\Program Files\Microsoft Office\root\6⤵
- Drops file in Program Files directory
- System policy modification
PID:3348 -
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\7⤵
- System policy modification
PID:1404
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\7⤵
- Modifies visibility of file extensions in Explorer
PID:1700 -
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\8⤵PID:456
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\update.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\update.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\8⤵PID:1264
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\8⤵PID:4712
-
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1004 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2076 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2204 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵PID:260
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵PID:4820
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵PID:4532
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- System policy modification
PID:360
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵PID:3192
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3744
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
PID:2480 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
PID:1300
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4836
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
PID:3092 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\9⤵
- System policy modification
PID:1832
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\8⤵
- System policy modification
PID:1048 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\9⤵PID:4184
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\8⤵
- Drops file in Program Files directory
PID:4868 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\9⤵
- Modifies visibility of file extensions in Explorer
PID:2388 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\10⤵
- Modifies visibility of file extensions in Explorer
PID:1852
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2960 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\10⤵PID:848
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Drops file in Program Files directory
PID:1216 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- System policy modification
PID:4756 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:4504
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- Modifies visibility of file extensions in Explorer
PID:1948
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵PID:220
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1668
-
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:3112 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:4520
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- System policy modification
PID:316 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵PID:1656
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\update.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\update.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Modifies visibility of file extensions in Explorer
PID:2416 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\8⤵PID:3212
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\7⤵
- Modifies visibility of file extensions in Explorer
PID:3040 -
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\8⤵
- Drops file in Program Files directory
PID:4364 -
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\update.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\update.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\9⤵
- Drops file in Program Files directory
PID:4268 -
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\10⤵PID:2532
-
-
-
-
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
PID:3120 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:4332
-
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵PID:3376
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- System policy modification
PID:3900
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- System policy modification
PID:3472
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3356
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
PID:4852
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:4952
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1952
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:3544
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵PID:3100
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4816
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\1⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1988
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\update.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\update.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\1⤵PID:2500
-
C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\1⤵PID:3648
-
C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\2⤵
- Modifies visibility of file extensions in Explorer
PID:1244
-
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1⤵
- Drops file in Program Files directory
PID:2300
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\1⤵
- Drops file in Program Files directory
PID:4424 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\2⤵
- System policy modification
PID:4488 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\3⤵
- System policy modification
PID:3336
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\3⤵PID:1912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5682c1b09050f77e1bf5508720ea5e7ac
SHA146f3ec6148c0a4daeb5f4e3ff5d3fa9c4143d3bc
SHA2568c0de411df9832578acd171de249c7e9cb66c5656597fead314af7d7ecad35d8
SHA5126445e7dfdabfed9c384da8edaf63f6b608557a4f4fd09dff5c510636e5f53a0496c13ca573ec3a45795e72a7c2fcfb35e004df4d8107abcf8afc50d8de46ff9a
-
Filesize
72KB
MD5682c1b09050f77e1bf5508720ea5e7ac
SHA146f3ec6148c0a4daeb5f4e3ff5d3fa9c4143d3bc
SHA2568c0de411df9832578acd171de249c7e9cb66c5656597fead314af7d7ecad35d8
SHA5126445e7dfdabfed9c384da8edaf63f6b608557a4f4fd09dff5c510636e5f53a0496c13ca573ec3a45795e72a7c2fcfb35e004df4d8107abcf8afc50d8de46ff9a
-
Filesize
72KB
MD50d7cbed5fbd2e4d6f6203eedfd3d53be
SHA1590e4f0df150c51717ec3aa93f0602dfeb7413b8
SHA256e4312bd31201b3bce328f656894398324331aefb11227fc6197a334ebe23427d
SHA5121e87cdf66dccb23797bea78c12f54810595d54b0908b121c160404e326fe7c62ac2856bb92e63e7c0f18f36e7c669150fef5743adfd4ed112f82696c9f121b35
-
Filesize
72KB
MD50d7cbed5fbd2e4d6f6203eedfd3d53be
SHA1590e4f0df150c51717ec3aa93f0602dfeb7413b8
SHA256e4312bd31201b3bce328f656894398324331aefb11227fc6197a334ebe23427d
SHA5121e87cdf66dccb23797bea78c12f54810595d54b0908b121c160404e326fe7c62ac2856bb92e63e7c0f18f36e7c669150fef5743adfd4ed112f82696c9f121b35
-
Filesize
72KB
MD557e83893fb0d2494e04ee979ebd1fecc
SHA125eab7d82e03607f93dbb53fd3b93f7fe01a6555
SHA2566bdc29e1bbf47af370953ef8346318aef0bf466172b240a347dbf9baeaeb44f3
SHA512b2a66b5e655692263f12fdc733f6c9f59e9fafe5b474c7c48fadfded05af8c7482c93b3c6fa3ddd1f8b9db47896b2f4a6207ccbeb3a326e6943c642fc85faa48
-
Filesize
72KB
MD557e83893fb0d2494e04ee979ebd1fecc
SHA125eab7d82e03607f93dbb53fd3b93f7fe01a6555
SHA2566bdc29e1bbf47af370953ef8346318aef0bf466172b240a347dbf9baeaeb44f3
SHA512b2a66b5e655692263f12fdc733f6c9f59e9fafe5b474c7c48fadfded05af8c7482c93b3c6fa3ddd1f8b9db47896b2f4a6207ccbeb3a326e6943c642fc85faa48
-
Filesize
72KB
MD5cedfc60e3b43550670b815a9fb43b56d
SHA1e6896ae1847d1530d4b3ef3ef11e32fab9e1dca1
SHA256fa121f6276ca94af116ec59c569c7dd1199bae287ce8513cb16c1f9a67d0fb88
SHA512e46b67df4c369641a2acd7b284f94ee559d7d769f0e0c8b55d05f9d962290941e2a7e5f9ac5efcd342e6c89016fdbe04f7cff745632df31198e6e4a111333578
-
Filesize
72KB
MD5cedfc60e3b43550670b815a9fb43b56d
SHA1e6896ae1847d1530d4b3ef3ef11e32fab9e1dca1
SHA256fa121f6276ca94af116ec59c569c7dd1199bae287ce8513cb16c1f9a67d0fb88
SHA512e46b67df4c369641a2acd7b284f94ee559d7d769f0e0c8b55d05f9d962290941e2a7e5f9ac5efcd342e6c89016fdbe04f7cff745632df31198e6e4a111333578
-
Filesize
72KB
MD51fb4d739e2892e11ad3234bca172aaff
SHA1846db90c2dc128ed33a9c58463b88f7cb6302486
SHA25686e11b854dc3a7c300038f928d61ffaa6d11395333cdf44c7d481e555185c986
SHA5126cab4838b9127836acdf42e8dafbcc49a7b2857f9be5ae471106ccf27835e2318d452141cf13febf62f581ea2e01440ccd50b461409e96c0edf210d85d72cb95
-
Filesize
72KB
MD51fb4d739e2892e11ad3234bca172aaff
SHA1846db90c2dc128ed33a9c58463b88f7cb6302486
SHA25686e11b854dc3a7c300038f928d61ffaa6d11395333cdf44c7d481e555185c986
SHA5126cab4838b9127836acdf42e8dafbcc49a7b2857f9be5ae471106ccf27835e2318d452141cf13febf62f581ea2e01440ccd50b461409e96c0edf210d85d72cb95
-
Filesize
72KB
MD5a97a8c38fe02ad7115d897177b2060f4
SHA1d5af38a2fe85bd69ca0978ce96d33a9db92b7a96
SHA256538a3a0ab07152e4729d5412f155439a910f7b7186dc715dd2ddfe61476a2bec
SHA512fd7b15c396a1f363a9b2c2f705fbcd1229362369c8ba13a1f249bc18b2c367b01d2d65d1e4fe8894d348b3917d0f7f27e280c5e38942c2f5cb3ee430c626e7eb
-
Filesize
72KB
MD5a97a8c38fe02ad7115d897177b2060f4
SHA1d5af38a2fe85bd69ca0978ce96d33a9db92b7a96
SHA256538a3a0ab07152e4729d5412f155439a910f7b7186dc715dd2ddfe61476a2bec
SHA512fd7b15c396a1f363a9b2c2f705fbcd1229362369c8ba13a1f249bc18b2c367b01d2d65d1e4fe8894d348b3917d0f7f27e280c5e38942c2f5cb3ee430c626e7eb
-
Filesize
72KB
MD5b225da8b5d49a11c10648394f246ebc8
SHA124ce7c96c9227e80ca63a7b8c2194f4a991e7740
SHA2565ee48833d02bb713a2424f8055a9a550e6f27df5607c6c0c89d905e38bb6aca6
SHA512909355f3ed8b8ed3fab972c45defd73aa30c05eb597648e72fd3bd291a5a46a93698a1952be508d59cc2c27b7709c67addf4744df7aa6dec6af9ddc91365b43f
-
Filesize
72KB
MD5b225da8b5d49a11c10648394f246ebc8
SHA124ce7c96c9227e80ca63a7b8c2194f4a991e7740
SHA2565ee48833d02bb713a2424f8055a9a550e6f27df5607c6c0c89d905e38bb6aca6
SHA512909355f3ed8b8ed3fab972c45defd73aa30c05eb597648e72fd3bd291a5a46a93698a1952be508d59cc2c27b7709c67addf4744df7aa6dec6af9ddc91365b43f
-
Filesize
72KB
MD5a041c7b2ba158b307b39bf40b605bec5
SHA106563d36455c679e92b233c0bad88a5690835815
SHA256c6d78b57124e9373523bf008e112ae65454d154b1fd387ba2031cd516b731605
SHA512cc0e2776950087d7a40b41fd603325f9fb4fcd9dfe2ba7759f2191008987ee480d745318b397aa128435a9639a94b9b2c2321065099ef4949fe2b74a4d971851
-
Filesize
72KB
MD5a041c7b2ba158b307b39bf40b605bec5
SHA106563d36455c679e92b233c0bad88a5690835815
SHA256c6d78b57124e9373523bf008e112ae65454d154b1fd387ba2031cd516b731605
SHA512cc0e2776950087d7a40b41fd603325f9fb4fcd9dfe2ba7759f2191008987ee480d745318b397aa128435a9639a94b9b2c2321065099ef4949fe2b74a4d971851
-
Filesize
72KB
MD5641a35620725d9a8867c1451bd18430a
SHA1ec40a6c67cb1f9209370f4b64cc4b6e3600a6b23
SHA256b6cf89fee423aa26a53cf6c2ba525f2aaec273052c9ea1bacf72ce71549a9799
SHA5127f5643aab08aef1f9dfb44a5c83bfeb314e129b89b5841291e82ea39f29c267caeed5e6d969da5c76cd51e806fcf07c1ee95fd36939a1d29092dd500c2beb98c
-
Filesize
72KB
MD5641a35620725d9a8867c1451bd18430a
SHA1ec40a6c67cb1f9209370f4b64cc4b6e3600a6b23
SHA256b6cf89fee423aa26a53cf6c2ba525f2aaec273052c9ea1bacf72ce71549a9799
SHA5127f5643aab08aef1f9dfb44a5c83bfeb314e129b89b5841291e82ea39f29c267caeed5e6d969da5c76cd51e806fcf07c1ee95fd36939a1d29092dd500c2beb98c
-
Filesize
72KB
MD549f2faddd0eaa0c66372314981c03eda
SHA1bbe38aa3d509aa252f0705846c5266cbc0c0cd06
SHA2563d0f307d7d24b6f1cd90d3aa9757793cd4417545f7bc052803cee60b63ef754c
SHA512d16dec1620e2edbb93faf949c17ccd59b8dd171e7a431aac002ea941e1bd6c111a4013554ee3d72c9270971bc003a30c0d94f9a9cbeaf352a162ce2d88eab8dd
-
Filesize
72KB
MD549f2faddd0eaa0c66372314981c03eda
SHA1bbe38aa3d509aa252f0705846c5266cbc0c0cd06
SHA2563d0f307d7d24b6f1cd90d3aa9757793cd4417545f7bc052803cee60b63ef754c
SHA512d16dec1620e2edbb93faf949c17ccd59b8dd171e7a431aac002ea941e1bd6c111a4013554ee3d72c9270971bc003a30c0d94f9a9cbeaf352a162ce2d88eab8dd
-
Filesize
72KB
MD5347711ad5b3b1f9075ab7855dfb72d01
SHA117c5c9185c0133f92226fa49aad96b43ce3b3606
SHA256caec6ddfc3bb47bfb8c27dd8cf10f5e939c7a662f8f14b63c7ce71dbb438bcc5
SHA51255b370d8a72abc9d6d2ae84cfa36a03a911173a0a36752033158428839a2327f38488ace7d812bc5576f0bcdcbee110721974cab351947138372fb961ab00d3b
-
Filesize
72KB
MD5a97a8c38fe02ad7115d897177b2060f4
SHA1d5af38a2fe85bd69ca0978ce96d33a9db92b7a96
SHA256538a3a0ab07152e4729d5412f155439a910f7b7186dc715dd2ddfe61476a2bec
SHA512fd7b15c396a1f363a9b2c2f705fbcd1229362369c8ba13a1f249bc18b2c367b01d2d65d1e4fe8894d348b3917d0f7f27e280c5e38942c2f5cb3ee430c626e7eb
-
Filesize
72KB
MD5a97a8c38fe02ad7115d897177b2060f4
SHA1d5af38a2fe85bd69ca0978ce96d33a9db92b7a96
SHA256538a3a0ab07152e4729d5412f155439a910f7b7186dc715dd2ddfe61476a2bec
SHA512fd7b15c396a1f363a9b2c2f705fbcd1229362369c8ba13a1f249bc18b2c367b01d2d65d1e4fe8894d348b3917d0f7f27e280c5e38942c2f5cb3ee430c626e7eb
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD506fe8b411654b0b96cd3c17f02efc5c9
SHA1c936c54d1d9fa4e7393c13acc5a5de52366e4424
SHA25677be0d363a73537e7551a97d89f45a5cb423fa524ae803c02b590d580b70ed71
SHA512358b10559879738ac4eb819172b4ae9d58043ce17f8944272d5b73bd1aae5959d776342042f72f3f77806e44964037ce155449c450a84adfd1105e0f82cee936
-
Filesize
72KB
MD506fe8b411654b0b96cd3c17f02efc5c9
SHA1c936c54d1d9fa4e7393c13acc5a5de52366e4424
SHA25677be0d363a73537e7551a97d89f45a5cb423fa524ae803c02b590d580b70ed71
SHA512358b10559879738ac4eb819172b4ae9d58043ce17f8944272d5b73bd1aae5959d776342042f72f3f77806e44964037ce155449c450a84adfd1105e0f82cee936
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5feff39db2b4fa6bb0f025ea3b47829b4
SHA192a4e4b3361d176de6cca05f7f867527d828571b
SHA256ab15b73af6a6000940e6e98d6cc203a9c861ddd0b1cb49d65d56ce4690cf2b18
SHA512e07ac07f0c1d562bd7c3145c11d91d0e8ffbbbda8a74c4ae031b0398194ffef806a2c184bf29a996c8cb8d3ce6daf6fd16da708db8208e932a34cc9ee70d64ed
-
Filesize
72KB
MD5aa1c565292da7561380b7536273f6eb6
SHA125e28628c14e7900b41825f473420369f865095d
SHA2562f279afb6e5378967ff86ee9c1fd1c5bea086e6df3b2135c0e56f759e72881a0
SHA512cab16755986a95c2100b506c9d66f9c66344a8f7e334ea8b1e43b8b742ab49de42076b81c0fc2bbfbf6a0d81904a4787e0f8e9c6177fe49827b92f977d5b1362
-
Filesize
72KB
MD5aa1c565292da7561380b7536273f6eb6
SHA125e28628c14e7900b41825f473420369f865095d
SHA2562f279afb6e5378967ff86ee9c1fd1c5bea086e6df3b2135c0e56f759e72881a0
SHA512cab16755986a95c2100b506c9d66f9c66344a8f7e334ea8b1e43b8b742ab49de42076b81c0fc2bbfbf6a0d81904a4787e0f8e9c6177fe49827b92f977d5b1362
-
Filesize
72KB
MD5fb73a73d3641d34873d7725bc0bbb4a9
SHA1565937af60cba4c532bd6b4b42edbc00ef1e406a
SHA256161d8b65a6ad4ac29a7626d460d5ac9afa5ea79cca48c65bbe1f3e986e494867
SHA512066b37c149ceee6b135ed463c9bbdc31a766c5abc4c8de1655424401c72fc10437901ccd753b7b2e1e65228fa52845eb8f6f78e1e0ef9a46b42c66a342407336
-
Filesize
72KB
MD5fb73a73d3641d34873d7725bc0bbb4a9
SHA1565937af60cba4c532bd6b4b42edbc00ef1e406a
SHA256161d8b65a6ad4ac29a7626d460d5ac9afa5ea79cca48c65bbe1f3e986e494867
SHA512066b37c149ceee6b135ed463c9bbdc31a766c5abc4c8de1655424401c72fc10437901ccd753b7b2e1e65228fa52845eb8f6f78e1e0ef9a46b42c66a342407336
-
Filesize
72KB
MD58b851c64a2a0208e4ee3577554066916
SHA14ed5eb811c1f9a62e2ebd83841ec2829726f520e
SHA256123aa7ee7d45cac54c55a52be956664646951fa3873dab596d352ef05aa3b678
SHA512650ccda7c1d80bf5cd2d0b25607006ff26a9053cf98414cbc43809cd570c97380eb0c76c7a31d8737992912fcad55606f560d4e725089df3d3d702776f0d2ff5
-
Filesize
72KB
MD5809ac697c92d3dfa654a169142a27792
SHA1c0392ff7dc9c7d4c94f257a6c528f90d7f85ff5a
SHA2560153b90069eee141f5b6f3e4a3f491420fb97513b870d130b2f452d1280ed04b
SHA512f4ab161b251f12b7da9eff0d2df29cbeb056506060ef657e3b3ae31c5018d1661029afc2ad0bd22cb2e59c9700536c89426371afbef8fc05dfb6ae422d283523
-
Filesize
72KB
MD5809ac697c92d3dfa654a169142a27792
SHA1c0392ff7dc9c7d4c94f257a6c528f90d7f85ff5a
SHA2560153b90069eee141f5b6f3e4a3f491420fb97513b870d130b2f452d1280ed04b
SHA512f4ab161b251f12b7da9eff0d2df29cbeb056506060ef657e3b3ae31c5018d1661029afc2ad0bd22cb2e59c9700536c89426371afbef8fc05dfb6ae422d283523
-
Filesize
72KB
MD59126465feba079ab1bb8833c74d38134
SHA1d933ced56fe43baf77775465b5e17b31b5e1df25
SHA256374246de0c54aef845698568c20e578a8476d85d8374c3a25c5e3b1156ef34b0
SHA512eadc77332b39b72a14411b93f9ec8cfe3c8cb10ea6e682d77955d96e4e0089c4fdea32013839099e00adaf8cefda8145d0ef8abed26dc50797ac61b39404bbab
-
Filesize
72KB
MD59126465feba079ab1bb8833c74d38134
SHA1d933ced56fe43baf77775465b5e17b31b5e1df25
SHA256374246de0c54aef845698568c20e578a8476d85d8374c3a25c5e3b1156ef34b0
SHA512eadc77332b39b72a14411b93f9ec8cfe3c8cb10ea6e682d77955d96e4e0089c4fdea32013839099e00adaf8cefda8145d0ef8abed26dc50797ac61b39404bbab
-
Filesize
72KB
MD5279d85d146f457332c676cfdea91035b
SHA16e1cecb4f42691f30b0f8bbc57eb432778bc99b8
SHA2568a9abd609d7fc20013c43a5b3505c7a2929956fe4fb2f3610835f64346b8e6cf
SHA5129b63a96a23f334ee6960f46a6a8a1656e700cc300e0f09317214a7677ad01987cef5e4d761eb76fe0583ec72cd7a65cea22ff84cbf6c4b5ce910ed04fd7a5bdd
-
Filesize
72KB
MD5279d85d146f457332c676cfdea91035b
SHA16e1cecb4f42691f30b0f8bbc57eb432778bc99b8
SHA2568a9abd609d7fc20013c43a5b3505c7a2929956fe4fb2f3610835f64346b8e6cf
SHA5129b63a96a23f334ee6960f46a6a8a1656e700cc300e0f09317214a7677ad01987cef5e4d761eb76fe0583ec72cd7a65cea22ff84cbf6c4b5ce910ed04fd7a5bdd
-
Filesize
72KB
MD52b0da3b22f8ddf49acb50eb66ae1d72b
SHA144226005963f44bb44cabe81eb8c2b14f592a19b
SHA2560bef3c9a9a32f32269f814211d41cdf9bf42ce59fa3bbdc9918cc3d77cb92881
SHA512daa1e03582db7af55120437c383a119ff52edfe27c2e2e3056a3bed60e7331e0f0ee776e55a7a6c2d8931c94d3d437561b4b84a7ce5152612d5cb7685f5778c3
-
Filesize
72KB
MD52b0da3b22f8ddf49acb50eb66ae1d72b
SHA144226005963f44bb44cabe81eb8c2b14f592a19b
SHA2560bef3c9a9a32f32269f814211d41cdf9bf42ce59fa3bbdc9918cc3d77cb92881
SHA512daa1e03582db7af55120437c383a119ff52edfe27c2e2e3056a3bed60e7331e0f0ee776e55a7a6c2d8931c94d3d437561b4b84a7ce5152612d5cb7685f5778c3
-
Filesize
72KB
MD5964e5f1a8aedd9745973d7872d7caaf6
SHA1b8cf5adfb6e552a71f0d11a643e830586fd17f08
SHA2563322e9936bf27d814675315f943021d7b6192127c31f63678a1cd5192a1bef1a
SHA512dab495f34d7ed36b32d0dddbe2bc7daa8c2abdc13016d311342fb46cfb9d6b0fcec77920ca9eba6e6e1cba87a0066f9fb8c4a736b3c935a9cbd41aae9df4aa94
-
Filesize
72KB
MD5964e5f1a8aedd9745973d7872d7caaf6
SHA1b8cf5adfb6e552a71f0d11a643e830586fd17f08
SHA2563322e9936bf27d814675315f943021d7b6192127c31f63678a1cd5192a1bef1a
SHA512dab495f34d7ed36b32d0dddbe2bc7daa8c2abdc13016d311342fb46cfb9d6b0fcec77920ca9eba6e6e1cba87a0066f9fb8c4a736b3c935a9cbd41aae9df4aa94
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5964e5f1a8aedd9745973d7872d7caaf6
SHA1b8cf5adfb6e552a71f0d11a643e830586fd17f08
SHA2563322e9936bf27d814675315f943021d7b6192127c31f63678a1cd5192a1bef1a
SHA512dab495f34d7ed36b32d0dddbe2bc7daa8c2abdc13016d311342fb46cfb9d6b0fcec77920ca9eba6e6e1cba87a0066f9fb8c4a736b3c935a9cbd41aae9df4aa94
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5964e5f1a8aedd9745973d7872d7caaf6
SHA1b8cf5adfb6e552a71f0d11a643e830586fd17f08
SHA2563322e9936bf27d814675315f943021d7b6192127c31f63678a1cd5192a1bef1a
SHA512dab495f34d7ed36b32d0dddbe2bc7daa8c2abdc13016d311342fb46cfb9d6b0fcec77920ca9eba6e6e1cba87a0066f9fb8c4a736b3c935a9cbd41aae9df4aa94
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5964e5f1a8aedd9745973d7872d7caaf6
SHA1b8cf5adfb6e552a71f0d11a643e830586fd17f08
SHA2563322e9936bf27d814675315f943021d7b6192127c31f63678a1cd5192a1bef1a
SHA512dab495f34d7ed36b32d0dddbe2bc7daa8c2abdc13016d311342fb46cfb9d6b0fcec77920ca9eba6e6e1cba87a0066f9fb8c4a736b3c935a9cbd41aae9df4aa94
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5964e5f1a8aedd9745973d7872d7caaf6
SHA1b8cf5adfb6e552a71f0d11a643e830586fd17f08
SHA2563322e9936bf27d814675315f943021d7b6192127c31f63678a1cd5192a1bef1a
SHA512dab495f34d7ed36b32d0dddbe2bc7daa8c2abdc13016d311342fb46cfb9d6b0fcec77920ca9eba6e6e1cba87a0066f9fb8c4a736b3c935a9cbd41aae9df4aa94
-
Filesize
72KB
MD5d672130078900078622b6bd02e45d6f4
SHA1feb8d20aa523ac376c54e67ac1fe5cae8c2acb92
SHA256929e8634c535cb02ff14c45e40226020d99b68b62d3b40ca375b12d7019c41f4
SHA512830005ee18a06a448071d80764f9f039d85cf152f525c6702b2188c0848c8bbd2399242313f6a751731c46380f3d962539b7c8bb11b833db66ea76243d84f4a3
-
Filesize
72KB
MD5d672130078900078622b6bd02e45d6f4
SHA1feb8d20aa523ac376c54e67ac1fe5cae8c2acb92
SHA256929e8634c535cb02ff14c45e40226020d99b68b62d3b40ca375b12d7019c41f4
SHA512830005ee18a06a448071d80764f9f039d85cf152f525c6702b2188c0848c8bbd2399242313f6a751731c46380f3d962539b7c8bb11b833db66ea76243d84f4a3
-
Filesize
72KB
MD5305b596459fdf3757dd0152d62bab6ee
SHA1c3ebfc0602af3198124c0c7975972c72d5f0bc4c
SHA256a32811cafbb8e2ace60b43427830d0d7a0ece5822998a0f64bf4dd7d3d59bbb9
SHA5129a67ba90c355f46e2832f5517d43ce4e719168d87cd21e030d5e97e932214f05708c5269277cd703de9bd577200d1b422c5daedac0e454e40edcf9a6af18f149
-
Filesize
72KB
MD5305b596459fdf3757dd0152d62bab6ee
SHA1c3ebfc0602af3198124c0c7975972c72d5f0bc4c
SHA256a32811cafbb8e2ace60b43427830d0d7a0ece5822998a0f64bf4dd7d3d59bbb9
SHA5129a67ba90c355f46e2832f5517d43ce4e719168d87cd21e030d5e97e932214f05708c5269277cd703de9bd577200d1b422c5daedac0e454e40edcf9a6af18f149
-
Filesize
72KB
MD59cf3d7a2c6ed2bd42d26896117aaa6e5
SHA1c71d38307a0ac7fde22f3508559a54ea94f7dded
SHA256ed1e4d5182910fecb2eb95524bb231c417a4a5147ae32cc1f180de40fe34b1f3
SHA512cb972f48a45dc7c42fa4154c20fc08026f02979668529b6a3915f9ec82aec5d6f7fbf18527df2c7dce3e6244d65510b1722df97950a7bf112cbd7036aedf5703
-
Filesize
72KB
MD59cf3d7a2c6ed2bd42d26896117aaa6e5
SHA1c71d38307a0ac7fde22f3508559a54ea94f7dded
SHA256ed1e4d5182910fecb2eb95524bb231c417a4a5147ae32cc1f180de40fe34b1f3
SHA512cb972f48a45dc7c42fa4154c20fc08026f02979668529b6a3915f9ec82aec5d6f7fbf18527df2c7dce3e6244d65510b1722df97950a7bf112cbd7036aedf5703
-
Filesize
72KB
MD5682c1b09050f77e1bf5508720ea5e7ac
SHA146f3ec6148c0a4daeb5f4e3ff5d3fa9c4143d3bc
SHA2568c0de411df9832578acd171de249c7e9cb66c5656597fead314af7d7ecad35d8
SHA5126445e7dfdabfed9c384da8edaf63f6b608557a4f4fd09dff5c510636e5f53a0496c13ca573ec3a45795e72a7c2fcfb35e004df4d8107abcf8afc50d8de46ff9a
-
Filesize
72KB
MD5682c1b09050f77e1bf5508720ea5e7ac
SHA146f3ec6148c0a4daeb5f4e3ff5d3fa9c4143d3bc
SHA2568c0de411df9832578acd171de249c7e9cb66c5656597fead314af7d7ecad35d8
SHA5126445e7dfdabfed9c384da8edaf63f6b608557a4f4fd09dff5c510636e5f53a0496c13ca573ec3a45795e72a7c2fcfb35e004df4d8107abcf8afc50d8de46ff9a
-
Filesize
72KB
MD53b35510ccd4941e12bf922a624bee8d0
SHA1a3e5b246470e3f72399c4d203d0db218bac0db3e
SHA256ffd754445471bfa8f2fd29b0e5e6096d88009c452347a2c869f8a2ab7cee8dab
SHA512d7449cbd90ec2057d0c7cf665b9b7643ff3f12c68be093596ca9e94dd1dc23293a67b9b39c89eb20033312057fbd51efe2cbba62666c2d1ebfc4c41f06423c0e
-
Filesize
72KB
MD53b35510ccd4941e12bf922a624bee8d0
SHA1a3e5b246470e3f72399c4d203d0db218bac0db3e
SHA256ffd754445471bfa8f2fd29b0e5e6096d88009c452347a2c869f8a2ab7cee8dab
SHA512d7449cbd90ec2057d0c7cf665b9b7643ff3f12c68be093596ca9e94dd1dc23293a67b9b39c89eb20033312057fbd51efe2cbba62666c2d1ebfc4c41f06423c0e