Analysis
-
max time kernel
169s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe
Resource
win10v2004-20220812-en
General
-
Target
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe
-
Size
72KB
-
MD5
0d69e0205cf8278837603e7bd028d3cd
-
SHA1
4d1c60e42606659da64fff675ab0df2fab6af89d
-
SHA256
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af
-
SHA512
fcc9c4e1019a2ff9e1a2c2faa61f12c2c50b77293ef954eead566968295c2052993842ff590a6cae7b45be3d796659fea3bea1d724394295fc6f2b7b6a405b10
-
SSDEEP
768:rpQNwC3BEc4QEfu0Ei8XxNDINE3BEJwRr3k70F:teThavEjDWguKUy
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4364 backup.exe 4136 backup.exe 2516 backup.exe 4268 backup.exe 1092 backup.exe 4288 backup.exe 5052 backup.exe 2588 backup.exe 3152 backup.exe 2260 backup.exe 4036 backup.exe 2372 backup.exe 3636 backup.exe 5028 backup.exe 1464 backup.exe 204 System Restore.exe 3712 backup.exe 4176 System Restore.exe 4948 backup.exe 3220 update.exe 4420 backup.exe 4692 backup.exe 4504 backup.exe 1284 backup.exe 3128 backup.exe 424 backup.exe 4460 backup.exe 844 backup.exe 2280 backup.exe 4112 backup.exe 5076 backup.exe 3208 backup.exe 4916 backup.exe 4240 backup.exe 3388 backup.exe 4772 backup.exe 2136 backup.exe 4008 backup.exe 1604 backup.exe 1160 backup.exe 1536 backup.exe 2464 backup.exe 4972 backup.exe 644 update.exe 4784 backup.exe 2392 backup.exe 3772 backup.exe 2752 backup.exe 2308 backup.exe 4332 backup.exe 4380 backup.exe 1420 backup.exe 1020 backup.exe 4180 backup.exe 4076 backup.exe 536 backup.exe 4760 data.exe 428 backup.exe 4304 backup.exe 5064 backup.exe 2016 backup.exe 1472 backup.exe 1100 backup.exe 3640 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\backup.exe System Restore.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Services\System Restore.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe update.exe File opened for modification C:\Program Files\Microsoft Office\Office16\backup.exe System Restore.exe File opened for modification C:\Program Files\Microsoft Office\root\backup.exe System Restore.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe data.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\backup.exe backup.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 4364 backup.exe 4136 backup.exe 2516 backup.exe 4268 backup.exe 1092 backup.exe 4288 backup.exe 5052 backup.exe 2588 backup.exe 3152 backup.exe 2260 backup.exe 4036 backup.exe 2372 backup.exe 3636 backup.exe 5028 backup.exe 1464 backup.exe 204 System Restore.exe 3712 backup.exe 4176 System Restore.exe 4948 backup.exe 4420 backup.exe 3220 update.exe 4504 backup.exe 4692 backup.exe 1284 backup.exe 3128 backup.exe 424 backup.exe 4460 backup.exe 844 backup.exe 2280 backup.exe 4112 backup.exe 5076 backup.exe 3208 backup.exe 4916 backup.exe 4240 backup.exe 3388 backup.exe 4772 backup.exe 2136 backup.exe 1604 backup.exe 4008 backup.exe 1160 backup.exe 1536 backup.exe 2464 backup.exe 4972 backup.exe 4784 backup.exe 644 update.exe 3772 backup.exe 2392 backup.exe 2752 backup.exe 2308 backup.exe 4332 backup.exe 4380 backup.exe 1420 backup.exe 1020 backup.exe 4180 backup.exe 4076 backup.exe 4760 data.exe 536 backup.exe 428 backup.exe 4304 backup.exe 5064 backup.exe 1472 backup.exe 2016 backup.exe 1100 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4364 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 79 PID 4456 wrote to memory of 4364 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 79 PID 4456 wrote to memory of 4364 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 79 PID 4456 wrote to memory of 4136 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 80 PID 4456 wrote to memory of 4136 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 80 PID 4456 wrote to memory of 4136 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 80 PID 4456 wrote to memory of 2516 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 81 PID 4456 wrote to memory of 2516 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 81 PID 4456 wrote to memory of 2516 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 81 PID 4456 wrote to memory of 4268 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 82 PID 4456 wrote to memory of 4268 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 82 PID 4456 wrote to memory of 4268 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 82 PID 4456 wrote to memory of 1092 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 83 PID 4456 wrote to memory of 1092 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 83 PID 4456 wrote to memory of 1092 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 83 PID 4456 wrote to memory of 4288 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 84 PID 4456 wrote to memory of 4288 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 84 PID 4456 wrote to memory of 4288 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 84 PID 4456 wrote to memory of 5052 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 85 PID 4456 wrote to memory of 5052 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 85 PID 4456 wrote to memory of 5052 4456 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 85 PID 4364 wrote to memory of 2588 4364 backup.exe 86 PID 4364 wrote to memory of 2588 4364 backup.exe 86 PID 4364 wrote to memory of 2588 4364 backup.exe 86 PID 2588 wrote to memory of 3152 2588 backup.exe 87 PID 2588 wrote to memory of 3152 2588 backup.exe 87 PID 2588 wrote to memory of 3152 2588 backup.exe 87 PID 2588 wrote to memory of 2260 2588 backup.exe 88 PID 2588 wrote to memory of 2260 2588 backup.exe 88 PID 2588 wrote to memory of 2260 2588 backup.exe 88 PID 2588 wrote to memory of 4036 2588 backup.exe 89 PID 2588 wrote to memory of 4036 2588 backup.exe 89 PID 2588 wrote to memory of 4036 2588 backup.exe 89 PID 4036 wrote to memory of 2372 4036 backup.exe 90 PID 4036 wrote to memory of 2372 4036 backup.exe 90 PID 4036 wrote to memory of 2372 4036 backup.exe 90 PID 2372 wrote to memory of 3636 2372 backup.exe 91 PID 2372 wrote to memory of 3636 2372 backup.exe 91 PID 2372 wrote to memory of 3636 2372 backup.exe 91 PID 4036 wrote to memory of 5028 4036 backup.exe 92 PID 4036 wrote to memory of 5028 4036 backup.exe 92 PID 4036 wrote to memory of 5028 4036 backup.exe 92 PID 5028 wrote to memory of 1464 5028 backup.exe 93 PID 5028 wrote to memory of 1464 5028 backup.exe 93 PID 5028 wrote to memory of 1464 5028 backup.exe 93 PID 5028 wrote to memory of 204 5028 backup.exe 95 PID 5028 wrote to memory of 204 5028 backup.exe 95 PID 5028 wrote to memory of 204 5028 backup.exe 95 PID 4036 wrote to memory of 3712 4036 backup.exe 96 PID 4036 wrote to memory of 3712 4036 backup.exe 96 PID 4036 wrote to memory of 3712 4036 backup.exe 96 PID 5028 wrote to memory of 4176 5028 backup.exe 97 PID 5028 wrote to memory of 4176 5028 backup.exe 97 PID 5028 wrote to memory of 4176 5028 backup.exe 97 PID 2588 wrote to memory of 4948 2588 backup.exe 99 PID 2588 wrote to memory of 4948 2588 backup.exe 99 PID 2588 wrote to memory of 4948 2588 backup.exe 99 PID 5028 wrote to memory of 3220 5028 backup.exe 100 PID 5028 wrote to memory of 3220 5028 backup.exe 100 PID 5028 wrote to memory of 3220 5028 backup.exe 100 PID 204 wrote to memory of 4420 204 System Restore.exe 103 PID 204 wrote to memory of 4420 204 System Restore.exe 103 PID 204 wrote to memory of 4420 204 System Restore.exe 103 PID 3712 wrote to memory of 4504 3712 backup.exe 102 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe"C:\Users\Admin\AppData\Local\Temp\77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3596539098\backup.exeC:\Users\Admin\AppData\Local\Temp\3596539098\backup.exe C:\Users\Admin\AppData\Local\Temp\3596539098\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2588 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3152
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2372 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3636
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1464
-
-
C:\Program Files\Common Files\microsoft shared\System Restore.exe"C:\Program Files\Common Files\microsoft shared\System Restore.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4420
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4916
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\update.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\update.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:644
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4076
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5064
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3152
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:1864
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵PID:1880
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:624
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- System policy modification
PID:5012
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵PID:1468
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
PID:868
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\data.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\data.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵PID:4228
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Drops file in Program Files directory
PID:1804 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- System policy modification
PID:1592
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵PID:2420
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵PID:1864
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵PID:3408
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4856
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\update.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\update.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\9⤵PID:1296
-
-
-
C:\Program Files\Common Files\microsoft shared\ink\he-IL\update.exe"C:\Program Files\Common Files\microsoft shared\ink\he-IL\update.exe" C:\Program Files\Common Files\microsoft shared\ink\he-IL\8⤵PID:2660
-
-
C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hr-HR\8⤵
- System policy modification
PID:4760
-
-
C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hu-HU\8⤵PID:4152
-
-
C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\8⤵PID:2468
-
-
C:\Program Files\Common Files\microsoft shared\ink\it-IT\update.exe"C:\Program Files\Common Files\microsoft shared\ink\it-IT\update.exe" C:\Program Files\Common Files\microsoft shared\ink\it-IT\8⤵PID:2696
-
-
C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2248
-
-
C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ko-KR\8⤵PID:1228
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\data.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\data.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1732 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:4844
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵PID:1564
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵PID:3996
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1680
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:3972
-
-
-
-
C:\Program Files\Common Files\Services\System Restore.exe"C:\Program Files\Common Files\Services\System Restore.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
C:\Program Files\Common Files\System\update.exe"C:\Program Files\Common Files\System\update.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3220 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:424 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3208
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3772
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
C:\Program Files\Common Files\System\ado\it-IT\data.exe"C:\Program Files\Common Files\System\ado\it-IT\data.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4760
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
PID:1600
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:4052
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1628
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- System policy modification
PID:2040
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:2504
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:2864
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- Drops file in Program Files directory
PID:3160 -
C:\Program Files\Common Files\System\msadc\de-DE\backup.exe"C:\Program Files\Common Files\System\msadc\de-DE\backup.exe" C:\Program Files\Common Files\System\msadc\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2836
-
-
C:\Program Files\Common Files\System\msadc\en-US\backup.exe"C:\Program Files\Common Files\System\msadc\en-US\backup.exe" C:\Program Files\Common Files\System\msadc\en-US\8⤵
- System policy modification
PID:3100
-
-
C:\Program Files\Common Files\System\msadc\es-ES\backup.exe"C:\Program Files\Common Files\System\msadc\es-ES\backup.exe" C:\Program Files\Common Files\System\msadc\es-ES\8⤵
- System policy modification
PID:3152
-
-
C:\Program Files\Common Files\System\msadc\fr-FR\update.exe"C:\Program Files\Common Files\System\msadc\fr-FR\update.exe" C:\Program Files\Common Files\System\msadc\fr-FR\8⤵PID:1880
-
-
C:\Program Files\Common Files\System\msadc\it-IT\backup.exe"C:\Program Files\Common Files\System\msadc\it-IT\backup.exe" C:\Program Files\Common Files\System\msadc\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:4156
-
-
C:\Program Files\Common Files\System\msadc\ja-JP\backup.exe"C:\Program Files\Common Files\System\msadc\ja-JP\backup.exe" C:\Program Files\Common Files\System\msadc\ja-JP\8⤵PID:4100
-
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:4920 -
C:\Program Files\Common Files\System\Ole DB\de-DE\backup.exe"C:\Program Files\Common Files\System\Ole DB\de-DE\backup.exe" C:\Program Files\Common Files\System\Ole DB\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:3596
-
-
C:\Program Files\Common Files\System\Ole DB\en-US\backup.exe"C:\Program Files\Common Files\System\Ole DB\en-US\backup.exe" C:\Program Files\Common Files\System\Ole DB\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:380
-
-
C:\Program Files\Common Files\System\Ole DB\es-ES\data.exe"C:\Program Files\Common Files\System\Ole DB\es-ES\data.exe" C:\Program Files\Common Files\System\Ole DB\es-ES\8⤵
- System policy modification
PID:4396
-
-
C:\Program Files\Common Files\System\Ole DB\fr-FR\data.exe"C:\Program Files\Common Files\System\Ole DB\fr-FR\data.exe" C:\Program Files\Common Files\System\Ole DB\fr-FR\8⤵PID:2192
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4504 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4460 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4112 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3388
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2136
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2464
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4784
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2752
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:428
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:3616 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵
- System policy modification
PID:4780
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:3800
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4692 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5076
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4772
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2392
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4380
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Drops file in Program Files directory
- System policy modification
PID:2844 -
C:\Program Files\Java\jdk1.8.0_66\data.exe"C:\Program Files\Java\jdk1.8.0_66\data.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1700 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵PID:3580
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:3564 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2356
-
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵PID:4292
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵
- Modifies visibility of file extensions in Explorer
PID:4652 -
C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\8⤵PID:3188
-
C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3176
-
-
-
-
C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\7⤵PID:4340
-
C:\Program Files\Java\jdk1.8.0_66\jre\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\bin\8⤵
- Drops file in Program Files directory
PID:4028 -
C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\9⤵
- Modifies visibility of file extensions in Explorer
PID:1368
-
-
C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\9⤵PID:1724
-
-
C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\9⤵PID:5112
-
-
-
-
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵
- Drops file in Program Files directory
- System policy modification
PID:2392 -
C:\Program Files\Java\jre1.8.0_66\bin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:3924 -
C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\8⤵PID:5092
-
-
C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\plugin2\8⤵
- Modifies visibility of file extensions in Explorer
PID:3252
-
-
C:\Program Files\Java\jre1.8.0_66\bin\server\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\server\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\server\8⤵PID:684
-
-
-
-
-
C:\Program Files\Microsoft Office\System Restore.exe"C:\Program Files\Microsoft Office\System Restore.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1232 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵
- System policy modification
PID:424
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵PID:4572
-
-
C:\Program Files\Microsoft Office\root\backup.exe"C:\Program Files\Microsoft Office\root\backup.exe" C:\Program Files\Microsoft Office\root\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1620 -
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\7⤵PID:1648
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4948 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1284 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3128 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4240
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4008 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4972 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4332
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4180 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Executes dropped EXE
- System policy modification
PID:3640
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Drops file in Program Files directory
PID:3532 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- System policy modification
PID:5068
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵PID:1184
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:480 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\9⤵PID:4456
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
PID:3180
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\8⤵PID:844
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\9⤵PID:4156
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\8⤵
- Drops file in Program Files directory
- System policy modification
PID:1692 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\9⤵
- System policy modification
PID:4072
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\8⤵PID:2316
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\9⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1704 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\10⤵
- System policy modification
PID:4900
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\9⤵
- Drops file in Program Files directory
PID:2792 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\10⤵PID:3876
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Drops file in Program Files directory
PID:2848 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2016 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:820
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- Modifies visibility of file extensions in Explorer
PID:4504
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵
- Modifies visibility of file extensions in Explorer
PID:1528 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\9⤵
- Modifies visibility of file extensions in Explorer
PID:4700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\10⤵PID:1120
-
-
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
PID:4004 -
C:\Program Files (x86)\Common Files\Adobe\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1416
-
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:4496
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:3676 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵PID:4488
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵PID:1436
-
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- System policy modification
PID:700 -
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1192
-
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- System policy modification
PID:4304
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:4128
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3428
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- System policy modification
PID:2504
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵PID:4140
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Drops file in Windows directory
PID:4056 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:536
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:4176 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Drops file in Windows directory
- System policy modification
PID:3864 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵
- Modifies visibility of file extensions in Explorer
PID:2196
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵
- Modifies visibility of file extensions in Explorer
PID:4684
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5052
-
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\1⤵PID:4388
-
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\2⤵PID:5092
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\2⤵PID:2704
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\2⤵PID:3272
-
-
C:\Users\Admin\Contacts\System Restore.exe"C:\Users\Admin\Contacts\System Restore.exe" C:\Users\Admin\Contacts\2⤵PID:3084
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\2⤵PID:4812
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\2⤵PID:4684
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\2⤵PID:1248
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\2⤵PID:756
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\2⤵
- Modifies visibility of file extensions in Explorer
PID:4180
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\2⤵
- Modifies visibility of file extensions in Explorer
PID:456 -
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\3⤵
- System policy modification
PID:3448
-
-
C:\Users\Admin\Pictures\Saved Pictures\backup.exe"C:\Users\Admin\Pictures\Saved Pictures\backup.exe" C:\Users\Admin\Pictures\Saved Pictures\3⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:736
-
-
-
C:\Users\Admin\Saved Games\update.exe"C:\Users\Admin\Saved Games\update.exe" C:\Users\Admin\Saved Games\2⤵
- Modifies visibility of file extensions in Explorer
PID:2464
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\2⤵PID:5020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50937f725caa35a2d605b7bc32ed81c55
SHA12527dcfea2c290353b82ce64fbc6c1f5ed85f7d2
SHA256009c8538b053ad937a55aa104f0a04c92e7b3d3d8296bd5b9c599589fead7dc9
SHA512d0ac032f2dda55c6f5a81c5001f6131f971a5dd16abd5bd99cd3d1c920d67150f9f74d7388e32c00f8917574e83e764246e140dbf0a6f2ed103307bee0d389ef
-
Filesize
72KB
MD50937f725caa35a2d605b7bc32ed81c55
SHA12527dcfea2c290353b82ce64fbc6c1f5ed85f7d2
SHA256009c8538b053ad937a55aa104f0a04c92e7b3d3d8296bd5b9c599589fead7dc9
SHA512d0ac032f2dda55c6f5a81c5001f6131f971a5dd16abd5bd99cd3d1c920d67150f9f74d7388e32c00f8917574e83e764246e140dbf0a6f2ed103307bee0d389ef
-
Filesize
72KB
MD5cf11b5cbb4ece38aa884252543c78f29
SHA136b897b27d497cef893f1988ac8ab18a8a5c9f35
SHA256f02655200b75274bf62b2a07716e16d0ac8847731aa701fbc97c47bc5d92fbd5
SHA512ee68d0f519ed53082a3a1ab84a67797543ebdd6bf3e894a59f76b8d26cc46c3e526b125795d00f9da5bce362f3cb9675f3e1f3f117d14289803a8cc409c36e22
-
Filesize
72KB
MD5cf11b5cbb4ece38aa884252543c78f29
SHA136b897b27d497cef893f1988ac8ab18a8a5c9f35
SHA256f02655200b75274bf62b2a07716e16d0ac8847731aa701fbc97c47bc5d92fbd5
SHA512ee68d0f519ed53082a3a1ab84a67797543ebdd6bf3e894a59f76b8d26cc46c3e526b125795d00f9da5bce362f3cb9675f3e1f3f117d14289803a8cc409c36e22
-
Filesize
72KB
MD5cd3ee7cdf137929c3bd30fdbc4276c4a
SHA1c505d284a66f2f8a70cd9aea411a70409c502dc7
SHA256b2beb62c9959ae64b7e01c18b988e21af03d79cde60c76d55239e24e0c1e713e
SHA512b581119ca313c5106041d35f3ca863b4814008bca10553d3a52eaf43fbc2c0abb687b7e2d34bc07a4f3dc53c6d55a9bf4d640af688f1e078edd1d3de989ae6c2
-
Filesize
72KB
MD5cd3ee7cdf137929c3bd30fdbc4276c4a
SHA1c505d284a66f2f8a70cd9aea411a70409c502dc7
SHA256b2beb62c9959ae64b7e01c18b988e21af03d79cde60c76d55239e24e0c1e713e
SHA512b581119ca313c5106041d35f3ca863b4814008bca10553d3a52eaf43fbc2c0abb687b7e2d34bc07a4f3dc53c6d55a9bf4d640af688f1e078edd1d3de989ae6c2
-
Filesize
72KB
MD5b428041a57d8648ddc195865e01c6439
SHA1faae2a212530483e00b19f4866838c751cc03d4d
SHA256bd659c15c479a69754470af6d679f1a571dcc17bf41e4a94f474e27c60e63a21
SHA512f298e56f0cbc55850bbbb7a5f2e47b12665e152493b6b7fcceabb0cebb8ccfb8bd2119062575ad4a88e4c6e6b31567e6a3ff96d7cabc3902237d662e1a1aead4
-
Filesize
72KB
MD5b428041a57d8648ddc195865e01c6439
SHA1faae2a212530483e00b19f4866838c751cc03d4d
SHA256bd659c15c479a69754470af6d679f1a571dcc17bf41e4a94f474e27c60e63a21
SHA512f298e56f0cbc55850bbbb7a5f2e47b12665e152493b6b7fcceabb0cebb8ccfb8bd2119062575ad4a88e4c6e6b31567e6a3ff96d7cabc3902237d662e1a1aead4
-
Filesize
72KB
MD51587781286566be16c19432a7309785d
SHA12dd3a3280066d034843f24b8e84fabb336e9404f
SHA256a34c2564081e85a52d675374325483a2553758a383da64323711085da560c477
SHA512074f55ea37ecd94951177927b29184ca38db533280dc7d69b58df5b035a5ff82d29e4ffd3d2b33f143e42a324bf8f418208b1169b8fb99b7c4ef4c4c0010524d
-
Filesize
72KB
MD51587781286566be16c19432a7309785d
SHA12dd3a3280066d034843f24b8e84fabb336e9404f
SHA256a34c2564081e85a52d675374325483a2553758a383da64323711085da560c477
SHA512074f55ea37ecd94951177927b29184ca38db533280dc7d69b58df5b035a5ff82d29e4ffd3d2b33f143e42a324bf8f418208b1169b8fb99b7c4ef4c4c0010524d
-
Filesize
72KB
MD5ca3c75cbc295094e1c56a1f57d3962a5
SHA1ee860e06ded56c57460d056724b94c6096308e83
SHA256afb83fde9294aa0f50465a50d0665818b5bb075d4b52dd25bbde51dc12c79432
SHA512761e0d84c057809483c8f1bec8fde98039d76599a9234ab115a0e90d6789244e829c300dea80ee486772c534f71cdb9cde6ada117a0db0bfe74a30a4480d2a8c
-
Filesize
72KB
MD5ca3c75cbc295094e1c56a1f57d3962a5
SHA1ee860e06ded56c57460d056724b94c6096308e83
SHA256afb83fde9294aa0f50465a50d0665818b5bb075d4b52dd25bbde51dc12c79432
SHA512761e0d84c057809483c8f1bec8fde98039d76599a9234ab115a0e90d6789244e829c300dea80ee486772c534f71cdb9cde6ada117a0db0bfe74a30a4480d2a8c
-
Filesize
72KB
MD51587781286566be16c19432a7309785d
SHA12dd3a3280066d034843f24b8e84fabb336e9404f
SHA256a34c2564081e85a52d675374325483a2553758a383da64323711085da560c477
SHA512074f55ea37ecd94951177927b29184ca38db533280dc7d69b58df5b035a5ff82d29e4ffd3d2b33f143e42a324bf8f418208b1169b8fb99b7c4ef4c4c0010524d
-
Filesize
72KB
MD51587781286566be16c19432a7309785d
SHA12dd3a3280066d034843f24b8e84fabb336e9404f
SHA256a34c2564081e85a52d675374325483a2553758a383da64323711085da560c477
SHA512074f55ea37ecd94951177927b29184ca38db533280dc7d69b58df5b035a5ff82d29e4ffd3d2b33f143e42a324bf8f418208b1169b8fb99b7c4ef4c4c0010524d
-
Filesize
72KB
MD565f86d08ce182823f6fe2ead279a4a3c
SHA1307a462a6c67f783c89fe4165677c092cd66e188
SHA256b98df8278f716e8163f7913248eb170ae4124519c7b005c1cdd0c1c688e4f380
SHA5124ed9876770ccf06e877568018583ce43fcab69a6f34c8a040bd0f2682e6461ddd776f6050231f0bd475953d7fc9974fcbcf3a9aff6b1c38aba2cd99bd4c4cf27
-
Filesize
72KB
MD565f86d08ce182823f6fe2ead279a4a3c
SHA1307a462a6c67f783c89fe4165677c092cd66e188
SHA256b98df8278f716e8163f7913248eb170ae4124519c7b005c1cdd0c1c688e4f380
SHA5124ed9876770ccf06e877568018583ce43fcab69a6f34c8a040bd0f2682e6461ddd776f6050231f0bd475953d7fc9974fcbcf3a9aff6b1c38aba2cd99bd4c4cf27
-
Filesize
72KB
MD500bf3440fc8fd6a421dfd3bd11b80a4d
SHA1b086c136355677e0b70d1caab73233db5bd2b89e
SHA256397fe9c2bb8ed1b0d526df7467fc0209b8b05b861c706cfeb9eafd2b323e6563
SHA51252b1d381cec0587ae2c03e14e919e3b850d9517a3fca6fc55a046c7a04c4307fd1ad22490268c3acce6f813d0c3751b76aa43580ba93f5df554890179be8eb88
-
Filesize
72KB
MD500bf3440fc8fd6a421dfd3bd11b80a4d
SHA1b086c136355677e0b70d1caab73233db5bd2b89e
SHA256397fe9c2bb8ed1b0d526df7467fc0209b8b05b861c706cfeb9eafd2b323e6563
SHA51252b1d381cec0587ae2c03e14e919e3b850d9517a3fca6fc55a046c7a04c4307fd1ad22490268c3acce6f813d0c3751b76aa43580ba93f5df554890179be8eb88
-
Filesize
72KB
MD530a927784ee9acaaeed4b8662cdfba2c
SHA108acdbeaa27b493f37995cf234f54822639f7734
SHA256b99c06c1482eab7519b3bd779270d0818134fb810ac598d7c4377eea19650c52
SHA512e1d2e5fc063d485d96e697488a28c2052fd97c12310b798b74c8683105c34752f4865e86626a5771b41eaea0ba8285d9c7fe034def6adffa2568964ef384c074
-
Filesize
72KB
MD530a927784ee9acaaeed4b8662cdfba2c
SHA108acdbeaa27b493f37995cf234f54822639f7734
SHA256b99c06c1482eab7519b3bd779270d0818134fb810ac598d7c4377eea19650c52
SHA512e1d2e5fc063d485d96e697488a28c2052fd97c12310b798b74c8683105c34752f4865e86626a5771b41eaea0ba8285d9c7fe034def6adffa2568964ef384c074
-
Filesize
72KB
MD5f0315cb1d6dcad18d16b8984a21102fd
SHA1b52a28e665dd51785014001e6efbcbd27dc5f06b
SHA256cd16166721c5c9b3d26f0ed63fb0f3202468a415854e1168a79e6ed040406f29
SHA51267840af97ee810b6298340d6cdcc94487d53bf27362548044190fb15b95f9431bc52fd73a69fbc4d1e1882b53710eca12103b4f94c76ea39d7453082bfa16f10
-
Filesize
72KB
MD5f0315cb1d6dcad18d16b8984a21102fd
SHA1b52a28e665dd51785014001e6efbcbd27dc5f06b
SHA256cd16166721c5c9b3d26f0ed63fb0f3202468a415854e1168a79e6ed040406f29
SHA51267840af97ee810b6298340d6cdcc94487d53bf27362548044190fb15b95f9431bc52fd73a69fbc4d1e1882b53710eca12103b4f94c76ea39d7453082bfa16f10
-
Filesize
72KB
MD5ca3c75cbc295094e1c56a1f57d3962a5
SHA1ee860e06ded56c57460d056724b94c6096308e83
SHA256afb83fde9294aa0f50465a50d0665818b5bb075d4b52dd25bbde51dc12c79432
SHA512761e0d84c057809483c8f1bec8fde98039d76599a9234ab115a0e90d6789244e829c300dea80ee486772c534f71cdb9cde6ada117a0db0bfe74a30a4480d2a8c
-
Filesize
72KB
MD5ca3c75cbc295094e1c56a1f57d3962a5
SHA1ee860e06ded56c57460d056724b94c6096308e83
SHA256afb83fde9294aa0f50465a50d0665818b5bb075d4b52dd25bbde51dc12c79432
SHA512761e0d84c057809483c8f1bec8fde98039d76599a9234ab115a0e90d6789244e829c300dea80ee486772c534f71cdb9cde6ada117a0db0bfe74a30a4480d2a8c
-
Filesize
72KB
MD5f29250e022a069ac4f79c0a397dd59bb
SHA1f69413f51f96010af79cb84f2bbe214e7b95f380
SHA256fb751ceaf1a664092ec54f56a5405c8bdf39023f7d06a9aa4431bc74cde65361
SHA51254bafa8948b5d660e15e7345104ea81da3d7c3a375d9b17f11e54ba2d05515d653e1d52f3e4bc83a71b83650ffd23f3b88feb53b4a6d485f18d2c6970df8417f
-
Filesize
72KB
MD5f29250e022a069ac4f79c0a397dd59bb
SHA1f69413f51f96010af79cb84f2bbe214e7b95f380
SHA256fb751ceaf1a664092ec54f56a5405c8bdf39023f7d06a9aa4431bc74cde65361
SHA51254bafa8948b5d660e15e7345104ea81da3d7c3a375d9b17f11e54ba2d05515d653e1d52f3e4bc83a71b83650ffd23f3b88feb53b4a6d485f18d2c6970df8417f
-
Filesize
72KB
MD51587781286566be16c19432a7309785d
SHA12dd3a3280066d034843f24b8e84fabb336e9404f
SHA256a34c2564081e85a52d675374325483a2553758a383da64323711085da560c477
SHA512074f55ea37ecd94951177927b29184ca38db533280dc7d69b58df5b035a5ff82d29e4ffd3d2b33f143e42a324bf8f418208b1169b8fb99b7c4ef4c4c0010524d
-
Filesize
72KB
MD51587781286566be16c19432a7309785d
SHA12dd3a3280066d034843f24b8e84fabb336e9404f
SHA256a34c2564081e85a52d675374325483a2553758a383da64323711085da560c477
SHA512074f55ea37ecd94951177927b29184ca38db533280dc7d69b58df5b035a5ff82d29e4ffd3d2b33f143e42a324bf8f418208b1169b8fb99b7c4ef4c4c0010524d
-
Filesize
72KB
MD52ffcc64da24a4d0390b9f12475856579
SHA199ffd20f9bbc4a02791f32e3d166e0c50af3136c
SHA256a41c886617b478dadb957a3114f79b978540ecf9a07a76f684dc1d7bbc1ee628
SHA512f91df54ad10d325b3ed21772d0c76284266b0bf5d4cada6934e9f0f39d595230f00a093437f6d7ee4a87a57bed77cd193fb52f115569daaba21884f9b645afdb
-
Filesize
72KB
MD52ffcc64da24a4d0390b9f12475856579
SHA199ffd20f9bbc4a02791f32e3d166e0c50af3136c
SHA256a41c886617b478dadb957a3114f79b978540ecf9a07a76f684dc1d7bbc1ee628
SHA512f91df54ad10d325b3ed21772d0c76284266b0bf5d4cada6934e9f0f39d595230f00a093437f6d7ee4a87a57bed77cd193fb52f115569daaba21884f9b645afdb
-
Filesize
72KB
MD506c037f24ea86605340e3cbdf06aae4c
SHA1d3668f5841edafdfdffcbdf952298a288bb9aff0
SHA2561c88a188b08ba5c9e12aec706b7e4944c8b05cc9cfe1784a9650699eeddab1e5
SHA512083a8a913298d28a2114408fe796f54f27b42b20abe5a8ffde102ef5e8816d780973e16f7b92e68e0e5e0ca6a956a84033587dae28b97d9d7bc4c92102872ce8
-
Filesize
72KB
MD506c037f24ea86605340e3cbdf06aae4c
SHA1d3668f5841edafdfdffcbdf952298a288bb9aff0
SHA2561c88a188b08ba5c9e12aec706b7e4944c8b05cc9cfe1784a9650699eeddab1e5
SHA512083a8a913298d28a2114408fe796f54f27b42b20abe5a8ffde102ef5e8816d780973e16f7b92e68e0e5e0ca6a956a84033587dae28b97d9d7bc4c92102872ce8
-
Filesize
72KB
MD581fd5d8b71ce687b9f3577e55873b0ce
SHA1e26a525f5fefa512bf60ec3a55ed1f4dd3b200c2
SHA256b410d4bdac6af3f7bfbd50a8a3301963a3214a7d5a5317e2f3457918b49873a6
SHA5124e688ce2c0b0b54e4cf6d971f83d7e9d00807816cb303ee9eaffc9058bcf93a99d3e149927ac3b2c148d44f2c45938be48feb9faf2120b8e39afaa766811a5c0
-
Filesize
72KB
MD581fd5d8b71ce687b9f3577e55873b0ce
SHA1e26a525f5fefa512bf60ec3a55ed1f4dd3b200c2
SHA256b410d4bdac6af3f7bfbd50a8a3301963a3214a7d5a5317e2f3457918b49873a6
SHA5124e688ce2c0b0b54e4cf6d971f83d7e9d00807816cb303ee9eaffc9058bcf93a99d3e149927ac3b2c148d44f2c45938be48feb9faf2120b8e39afaa766811a5c0
-
Filesize
72KB
MD59a373582860c01a28936c65c9d8ee5bb
SHA13c895333bc940e059b4f079f396bcae2cb160a22
SHA2569382bcaa1e559ece7771830795d1c77293980c43fed3c634e7f629a1762e3a6a
SHA512488397a904e4abff12e180f8898cd8b042b3cd738f1e3e1d7ccef64a048380504e16281f65136fdb8743c5478ca8f7b234456c26e7da90a698887953404b3762
-
Filesize
72KB
MD59a373582860c01a28936c65c9d8ee5bb
SHA13c895333bc940e059b4f079f396bcae2cb160a22
SHA2569382bcaa1e559ece7771830795d1c77293980c43fed3c634e7f629a1762e3a6a
SHA512488397a904e4abff12e180f8898cd8b042b3cd738f1e3e1d7ccef64a048380504e16281f65136fdb8743c5478ca8f7b234456c26e7da90a698887953404b3762
-
Filesize
72KB
MD52a7914aa8aa1fda8cbfac70df4ce90be
SHA10a6d4edb471a32934819e775e4791db2f728d1cd
SHA2561bae665a7ed68b802bc2d651d693dc1e765cf8510fcc4241beb564c559307599
SHA5125024a3b6a1e7db6d45c005ca262b78ec31df080f7505a4b8fd58cc4fabc10baa1ae50c66e13fa36227c1963ae75a56ef1d3a6eddccff435aa566fab9eda9687d
-
Filesize
72KB
MD52a7914aa8aa1fda8cbfac70df4ce90be
SHA10a6d4edb471a32934819e775e4791db2f728d1cd
SHA2561bae665a7ed68b802bc2d651d693dc1e765cf8510fcc4241beb564c559307599
SHA5125024a3b6a1e7db6d45c005ca262b78ec31df080f7505a4b8fd58cc4fabc10baa1ae50c66e13fa36227c1963ae75a56ef1d3a6eddccff435aa566fab9eda9687d
-
Filesize
72KB
MD58bfcc5d9de8865b3002153d0d3febaa7
SHA16c6f948c80d1d464c041b230795cf9db6bd74ecb
SHA2568aea2ac92ed938f05a989d56257b6fe49e0757ee5b708f0669bd5994a6e54fcc
SHA512346e49c59d103d2b153028e878c8c9019eb827c13e3e267ae43f15fa8e112f552fafd264bb73e40a59fd222fb029d79a4d1ef7a355b4f1153c2e57803c895ddb
-
Filesize
72KB
MD58bfcc5d9de8865b3002153d0d3febaa7
SHA16c6f948c80d1d464c041b230795cf9db6bd74ecb
SHA2568aea2ac92ed938f05a989d56257b6fe49e0757ee5b708f0669bd5994a6e54fcc
SHA512346e49c59d103d2b153028e878c8c9019eb827c13e3e267ae43f15fa8e112f552fafd264bb73e40a59fd222fb029d79a4d1ef7a355b4f1153c2e57803c895ddb
-
Filesize
72KB
MD5f2235138fc3efe30496328ba9b70ef74
SHA12e8f4c61e92b425523ac25fbf4014f52bc4292d5
SHA256a21b914b5ab1d5cfc99bccda073c76d72def0c1721f2ef4ee962e3d314266840
SHA51223b44bd3ba2a572350b50792ae2d0024c5628b533b8e59f68291f23b630d2f701ed3b956c1331d3294f54aca4ccb60d347c728dd7187af198a1b09fe4eafc335
-
Filesize
72KB
MD5f2235138fc3efe30496328ba9b70ef74
SHA12e8f4c61e92b425523ac25fbf4014f52bc4292d5
SHA256a21b914b5ab1d5cfc99bccda073c76d72def0c1721f2ef4ee962e3d314266840
SHA51223b44bd3ba2a572350b50792ae2d0024c5628b533b8e59f68291f23b630d2f701ed3b956c1331d3294f54aca4ccb60d347c728dd7187af198a1b09fe4eafc335
-
Filesize
72KB
MD5f2235138fc3efe30496328ba9b70ef74
SHA12e8f4c61e92b425523ac25fbf4014f52bc4292d5
SHA256a21b914b5ab1d5cfc99bccda073c76d72def0c1721f2ef4ee962e3d314266840
SHA51223b44bd3ba2a572350b50792ae2d0024c5628b533b8e59f68291f23b630d2f701ed3b956c1331d3294f54aca4ccb60d347c728dd7187af198a1b09fe4eafc335
-
Filesize
72KB
MD5f2235138fc3efe30496328ba9b70ef74
SHA12e8f4c61e92b425523ac25fbf4014f52bc4292d5
SHA256a21b914b5ab1d5cfc99bccda073c76d72def0c1721f2ef4ee962e3d314266840
SHA51223b44bd3ba2a572350b50792ae2d0024c5628b533b8e59f68291f23b630d2f701ed3b956c1331d3294f54aca4ccb60d347c728dd7187af198a1b09fe4eafc335
-
Filesize
72KB
MD50a693a524291c0048adfc0a9af0b0885
SHA1a239d4b604b7969101a76f0739ca2384ee6e48ac
SHA2561f68666ca66c34867ba9461b6ffdb2ba70a4e9a5a26a0a995c67304345d5f973
SHA512d24e39ef05b2070d4dc02ac063520883d853d8d3a3221e2267b45d1c446c1210333417df21a25fa8b63c839a0ae95f5e54dec572057f99892e0bf87553ed9724
-
Filesize
72KB
MD50a693a524291c0048adfc0a9af0b0885
SHA1a239d4b604b7969101a76f0739ca2384ee6e48ac
SHA2561f68666ca66c34867ba9461b6ffdb2ba70a4e9a5a26a0a995c67304345d5f973
SHA512d24e39ef05b2070d4dc02ac063520883d853d8d3a3221e2267b45d1c446c1210333417df21a25fa8b63c839a0ae95f5e54dec572057f99892e0bf87553ed9724
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5d6e8792d0b207f26cbb51be8d52a7a5b
SHA10efe6958f29d31b73ec31439574ed3f1ee8964eb
SHA2561837dda9f2b363baa8ac70670f45cf639bcd8547b1c866b5cbafa6153b1d804e
SHA512252b19e964a6e485c29137acea3d3155ec9947a16eeb75cfe4b88d55c5a3fe3ef9590e724a97f61f4b064eff571658ccfad957806d0a3b0591791706a6fd5414
-
Filesize
72KB
MD5b89ad690a7276f78ff6dc188ca650c2a
SHA1eca4c963be7f091ae02e6ec8745a49a13b25c06e
SHA256470740fc0c92cdd032e13ca09d9a929430f77083c76bba2db5ebee019f4a39d1
SHA51222c1bf5f5838188e7ddda932c52d83de4581012811ec41641c3f8a4f825f6d8db07f9cb845cdaaa8ea1b3c191878c87a4fd797debe0cb6a1996471ff0ea3a8d1
-
Filesize
72KB
MD5b89ad690a7276f78ff6dc188ca650c2a
SHA1eca4c963be7f091ae02e6ec8745a49a13b25c06e
SHA256470740fc0c92cdd032e13ca09d9a929430f77083c76bba2db5ebee019f4a39d1
SHA51222c1bf5f5838188e7ddda932c52d83de4581012811ec41641c3f8a4f825f6d8db07f9cb845cdaaa8ea1b3c191878c87a4fd797debe0cb6a1996471ff0ea3a8d1
-
Filesize
72KB
MD5fabd13ae88d0f620c310220842b542e4
SHA13e4a08a5544e0cd1dc398a3bf51a2ece8a3ee86c
SHA25626dfae49be80df0f8d1779642412f3c101f262c70f76b4f69eb2a8c4a822bef2
SHA512f8e36cf2101648c2d41359598f6a02436554b6d4768550ae3661e919ca80b2867fd9e73e19ed3b20f205c9349cb9e7a66bc4d126eaf5171ba4244e8846321707
-
Filesize
72KB
MD5fabd13ae88d0f620c310220842b542e4
SHA13e4a08a5544e0cd1dc398a3bf51a2ece8a3ee86c
SHA25626dfae49be80df0f8d1779642412f3c101f262c70f76b4f69eb2a8c4a822bef2
SHA512f8e36cf2101648c2d41359598f6a02436554b6d4768550ae3661e919ca80b2867fd9e73e19ed3b20f205c9349cb9e7a66bc4d126eaf5171ba4244e8846321707
-
Filesize
72KB
MD50937f725caa35a2d605b7bc32ed81c55
SHA12527dcfea2c290353b82ce64fbc6c1f5ed85f7d2
SHA256009c8538b053ad937a55aa104f0a04c92e7b3d3d8296bd5b9c599589fead7dc9
SHA512d0ac032f2dda55c6f5a81c5001f6131f971a5dd16abd5bd99cd3d1c920d67150f9f74d7388e32c00f8917574e83e764246e140dbf0a6f2ed103307bee0d389ef
-
Filesize
72KB
MD50937f725caa35a2d605b7bc32ed81c55
SHA12527dcfea2c290353b82ce64fbc6c1f5ed85f7d2
SHA256009c8538b053ad937a55aa104f0a04c92e7b3d3d8296bd5b9c599589fead7dc9
SHA512d0ac032f2dda55c6f5a81c5001f6131f971a5dd16abd5bd99cd3d1c920d67150f9f74d7388e32c00f8917574e83e764246e140dbf0a6f2ed103307bee0d389ef