Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe
Resource
win10v2004-20221111-en
General
-
Target
65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe
-
Size
72KB
-
MD5
0225a421b7aeb8fee4d1f2dcedd5b325
-
SHA1
bb1d7873c3d9472d1a65c634dcc512559d410667
-
SHA256
65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600
-
SHA512
18a847d37cd95c57e12a8dde1acdc2ff343b7f156eee207eb079b116859b0dfb00a602e450bfde960b7fe8acc8e694dc9884d5cc887a530e2b44420a7fc58599
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2C:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1372 backup.exe 1488 backup.exe 216 backup.exe 3824 backup.exe 1544 backup.exe 3608 backup.exe 444 backup.exe 536 backup.exe 4504 backup.exe 3664 backup.exe 4284 backup.exe 4712 backup.exe 3312 backup.exe 3460 backup.exe 1552 backup.exe 2524 backup.exe 824 backup.exe 3668 backup.exe 2428 backup.exe 1844 backup.exe 4956 backup.exe 1832 backup.exe 1804 backup.exe 2488 backup.exe 5088 backup.exe 444 backup.exe 2696 backup.exe 3592 backup.exe 3652 backup.exe 2212 backup.exe 3692 backup.exe 2692 backup.exe 4624 data.exe 2736 backup.exe 1536 backup.exe 4696 backup.exe 4640 backup.exe 1260 backup.exe 2700 System Restore.exe 1776 backup.exe 2856 System Restore.exe 1492 System Restore.exe 4944 backup.exe 4212 backup.exe 4228 backup.exe 4648 backup.exe 3408 backup.exe 4616 data.exe 212 backup.exe 2584 backup.exe 224 data.exe 2108 backup.exe 2176 backup.exe 2888 backup.exe 2612 backup.exe 1032 backup.exe 4644 backup.exe 3152 System Restore.exe 440 backup.exe 4776 backup.exe 2688 backup.exe 1304 update.exe 3088 backup.exe 3496 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\update.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 1372 backup.exe 1488 backup.exe 216 backup.exe 3824 backup.exe 1544 backup.exe 3608 backup.exe 444 backup.exe 536 backup.exe 4504 backup.exe 3664 backup.exe 4284 backup.exe 4712 backup.exe 3312 backup.exe 3460 backup.exe 1552 backup.exe 2524 backup.exe 824 backup.exe 3668 backup.exe 2428 backup.exe 1844 backup.exe 4956 backup.exe 1832 backup.exe 2488 backup.exe 1804 backup.exe 5088 backup.exe 2696 backup.exe 444 backup.exe 2212 backup.exe 3652 backup.exe 3592 backup.exe 3692 backup.exe 2692 backup.exe 4624 data.exe 2736 backup.exe 1536 backup.exe 4696 backup.exe 4640 backup.exe 1260 backup.exe 2700 System Restore.exe 1776 backup.exe 2856 System Restore.exe 4944 backup.exe 4212 backup.exe 1492 System Restore.exe 4228 backup.exe 4648 backup.exe 3408 backup.exe 212 backup.exe 4616 data.exe 224 data.exe 2584 backup.exe 2176 backup.exe 2108 backup.exe 2888 backup.exe 2612 backup.exe 1032 backup.exe 4644 backup.exe 3152 System Restore.exe 440 backup.exe 2688 backup.exe 1304 update.exe 3284 backup.exe 4776 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1372 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 83 PID 3016 wrote to memory of 1372 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 83 PID 3016 wrote to memory of 1372 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 83 PID 3016 wrote to memory of 1488 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 84 PID 3016 wrote to memory of 1488 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 84 PID 3016 wrote to memory of 1488 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 84 PID 3016 wrote to memory of 216 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 85 PID 3016 wrote to memory of 216 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 85 PID 3016 wrote to memory of 216 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 85 PID 3016 wrote to memory of 3824 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 86 PID 3016 wrote to memory of 3824 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 86 PID 3016 wrote to memory of 3824 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 86 PID 1372 wrote to memory of 1544 1372 backup.exe 87 PID 1372 wrote to memory of 1544 1372 backup.exe 87 PID 1372 wrote to memory of 1544 1372 backup.exe 87 PID 3016 wrote to memory of 3608 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 88 PID 3016 wrote to memory of 3608 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 88 PID 3016 wrote to memory of 3608 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 88 PID 1544 wrote to memory of 444 1544 backup.exe 89 PID 1544 wrote to memory of 444 1544 backup.exe 89 PID 1544 wrote to memory of 444 1544 backup.exe 89 PID 3016 wrote to memory of 536 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 90 PID 3016 wrote to memory of 536 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 90 PID 3016 wrote to memory of 536 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 90 PID 1544 wrote to memory of 4504 1544 backup.exe 91 PID 1544 wrote to memory of 4504 1544 backup.exe 91 PID 1544 wrote to memory of 4504 1544 backup.exe 91 PID 3016 wrote to memory of 3664 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 92 PID 3016 wrote to memory of 3664 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 92 PID 3016 wrote to memory of 3664 3016 65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe 92 PID 1544 wrote to memory of 4284 1544 backup.exe 93 PID 1544 wrote to memory of 4284 1544 backup.exe 93 PID 1544 wrote to memory of 4284 1544 backup.exe 93 PID 4284 wrote to memory of 4712 4284 backup.exe 94 PID 4284 wrote to memory of 4712 4284 backup.exe 94 PID 4284 wrote to memory of 4712 4284 backup.exe 94 PID 4712 wrote to memory of 3312 4712 backup.exe 95 PID 4712 wrote to memory of 3312 4712 backup.exe 95 PID 4712 wrote to memory of 3312 4712 backup.exe 95 PID 4284 wrote to memory of 3460 4284 backup.exe 96 PID 4284 wrote to memory of 3460 4284 backup.exe 96 PID 4284 wrote to memory of 3460 4284 backup.exe 96 PID 3460 wrote to memory of 1552 3460 backup.exe 98 PID 3460 wrote to memory of 1552 3460 backup.exe 98 PID 3460 wrote to memory of 1552 3460 backup.exe 98 PID 3460 wrote to memory of 2524 3460 backup.exe 99 PID 3460 wrote to memory of 2524 3460 backup.exe 99 PID 3460 wrote to memory of 2524 3460 backup.exe 99 PID 2524 wrote to memory of 824 2524 backup.exe 100 PID 2524 wrote to memory of 824 2524 backup.exe 100 PID 2524 wrote to memory of 824 2524 backup.exe 100 PID 2524 wrote to memory of 3668 2524 backup.exe 101 PID 2524 wrote to memory of 3668 2524 backup.exe 101 PID 2524 wrote to memory of 3668 2524 backup.exe 101 PID 3668 wrote to memory of 2428 3668 backup.exe 102 PID 3668 wrote to memory of 2428 3668 backup.exe 102 PID 3668 wrote to memory of 2428 3668 backup.exe 102 PID 3460 wrote to memory of 1844 3460 backup.exe 105 PID 3460 wrote to memory of 1844 3460 backup.exe 105 PID 3460 wrote to memory of 1844 3460 backup.exe 105 PID 1544 wrote to memory of 4956 1544 backup.exe 109 PID 1544 wrote to memory of 4956 1544 backup.exe 109 PID 1544 wrote to memory of 4956 1544 backup.exe 109 PID 2524 wrote to memory of 1832 2524 backup.exe 108 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe"C:\Users\Admin\AppData\Local\Temp\65fa058786e633f5cdc8616525b3eb2358503d98dc5b8c310a6f38108d45f600.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\784948689\backup.exeC:\Users\Admin\AppData\Local\Temp\784948689\backup.exe C:\Users\Admin\AppData\Local\Temp\784948689\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1372 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:444
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4504
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4712 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:824
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3668 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2428
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3652
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3692
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2584
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\update.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\update.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1304
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵PID:3824
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
PID:3236
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
PID:4884
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4268
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Disables RegEdit via registry modification
PID:1316
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵PID:3672
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:444
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\data.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\data.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2700
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\data.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\data.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:3088
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵PID:764
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3408
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵PID:1112
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
PID:4452 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2128
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:2196 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵PID:4420
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵PID:3592
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2212 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4696
-
-
C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe"C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Program Files\Common Files\System\ado\fr-FR\data.exe"C:\Program Files\Common Files\System\ado\fr-FR\data.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:224
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4644
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1560
-
-
-
C:\Program Files\Common Files\System\de-DE\update.exe"C:\Program Files\Common Files\System\de-DE\update.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:2516
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2400
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3404
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- System policy modification
PID:4100
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:4612
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:3512
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3592 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4944 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4648
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
PID:3172
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
PID:4728
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4432 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵PID:3636
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:2940
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2108
-
-
C:\Program Files\Internet Explorer\en-US\System Restore.exe"C:\Program Files\Internet Explorer\en-US\System Restore.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3152
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- System policy modification
PID:2536
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1284
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4460
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3380
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2036
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:3660
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:3792 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3776 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1244
-
-
C:\Program Files\Java\jdk1.8.0_66\db\update.exe"C:\Program Files\Java\jdk1.8.0_66\db\update.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵PID:3232
-
-
-
C:\Program Files\Java\jre1.8.0_66\update.exe"C:\Program Files\Java\jre1.8.0_66\update.exe" C:\Program Files\Java\jre1.8.0_66\6⤵PID:388
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:4384
-
-
C:\Program Files\Microsoft Office 15\data.exe"C:\Program Files\Microsoft Office 15\data.exe" C:\Program Files\Microsoft Office 15\5⤵PID:1176
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4956 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2888 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3064 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:312
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Modifies visibility of file extensions in Explorer
PID:3056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Disables RegEdit via registry modification
PID:2368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
PID:2876 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵PID:1112
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵PID:4772
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:940 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Disables RegEdit via registry modification
PID:3984 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4388
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵PID:4040
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\7⤵
- Drops file in Program Files directory
- System policy modification
PID:4836 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\8⤵PID:764
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:852 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4896 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2412
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3800 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵PID:5108
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵PID:5080
-
-
-
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵PID:4856
-
-
-
C:\Program Files (x86)\Google\update.exe"C:\Program Files (x86)\Google\update.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2952 -
C:\Program Files (x86)\Google\CrashReports\update.exe"C:\Program Files (x86)\Google\CrashReports\update.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:4032
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1284
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4212 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:212 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:3496
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:3816
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:5080
-
-
C:\Users\Admin\Documents\System Restore.exe"C:\Users\Admin\Documents\System Restore.exe" C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
PID:404
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- System policy modification
PID:1788
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:4680
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:5052
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:1648
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- System policy modification
PID:2868 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
PID:4508
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1640
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:3624
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:2612 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1264
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Drops file in Windows directory
PID:3472 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:4736 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵PID:5096
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵PID:3632
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵PID:4068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50b284bf75da821bc491e6b1bd8665426
SHA1fc8d91208a215c0540f3886d56b595220bf9adf3
SHA256296326c8d8fdb10bba74e163346885662388e516f7734404802c21d9f297e585
SHA51259fab9fe4f570daaa8cf68afc3296d9f2de2f2d10b04a19ae824bbb77a878c233fdca2469f0244a44bbbeb3009aa2705123e041a385e753b832137620d726c17
-
Filesize
72KB
MD50b284bf75da821bc491e6b1bd8665426
SHA1fc8d91208a215c0540f3886d56b595220bf9adf3
SHA256296326c8d8fdb10bba74e163346885662388e516f7734404802c21d9f297e585
SHA51259fab9fe4f570daaa8cf68afc3296d9f2de2f2d10b04a19ae824bbb77a878c233fdca2469f0244a44bbbeb3009aa2705123e041a385e753b832137620d726c17
-
Filesize
72KB
MD53f9a03ebae663aacc93d71790c8cbb23
SHA1ca0136ff10d7ee4195f446d7e9d00edf7ddf98c3
SHA25608613f5016dc3eb475255c86d4756fb640b7941d4fce0e9e874524987f3532ce
SHA5121e1f14467bc062ad2acfdb16ee931a0c7ca0b588159743a32a61f2b13862280deecede1fcb33988e964b7e72eb536a9f996229e0f2cc6067a853261cff750d70
-
Filesize
72KB
MD53f9a03ebae663aacc93d71790c8cbb23
SHA1ca0136ff10d7ee4195f446d7e9d00edf7ddf98c3
SHA25608613f5016dc3eb475255c86d4756fb640b7941d4fce0e9e874524987f3532ce
SHA5121e1f14467bc062ad2acfdb16ee931a0c7ca0b588159743a32a61f2b13862280deecede1fcb33988e964b7e72eb536a9f996229e0f2cc6067a853261cff750d70
-
Filesize
72KB
MD5968741f556bbd4e3f9cdd26f5aa61532
SHA103eab90f03828f0e691f94e9948318c2b5d3555c
SHA2567d9677044fb2a2c25ff028b194b9d78a8558bf7a46636b751e30119011596cba
SHA512fe2f5c83c0bc3971621991ddaea668a5caeaabf228dd7614c47363de7d0bcd549a2bb3c653eafce91561c3e5501184af0812a0d3f209de4396d09f6346131ef8
-
Filesize
72KB
MD5968741f556bbd4e3f9cdd26f5aa61532
SHA103eab90f03828f0e691f94e9948318c2b5d3555c
SHA2567d9677044fb2a2c25ff028b194b9d78a8558bf7a46636b751e30119011596cba
SHA512fe2f5c83c0bc3971621991ddaea668a5caeaabf228dd7614c47363de7d0bcd549a2bb3c653eafce91561c3e5501184af0812a0d3f209de4396d09f6346131ef8
-
Filesize
72KB
MD526609e0f7642549b869b9c72be95d55d
SHA1f7fb7887d545d3ab20cbdc7cf267f2dfdf680aaf
SHA2567a6cb57dc90f9c8c1fde845e62ac112f637eb5cb1c82fa56e14436aa451e66c4
SHA51278a7d0548c6b3e3b40f67a6baca48c2fd4f6135c58e28d6aae789a4eb3c57a195611548c7fc2a9999fe04f26dfd2708b56169bfbfc1cba0c6353d1a3b72536e6
-
Filesize
72KB
MD526609e0f7642549b869b9c72be95d55d
SHA1f7fb7887d545d3ab20cbdc7cf267f2dfdf680aaf
SHA2567a6cb57dc90f9c8c1fde845e62ac112f637eb5cb1c82fa56e14436aa451e66c4
SHA51278a7d0548c6b3e3b40f67a6baca48c2fd4f6135c58e28d6aae789a4eb3c57a195611548c7fc2a9999fe04f26dfd2708b56169bfbfc1cba0c6353d1a3b72536e6
-
Filesize
72KB
MD56dba99c8bf27ead0e0fcded249ba5d54
SHA149a7ce0b6814b9ff7abb749a830f7b15efff2e1c
SHA256bab7099d532c2aa16d90ae2297f0eaddf4037df470598b58c82c0310aa42c82d
SHA512d3fdffa9bdf23a9cbb9ec4a1b13f3155512380b312104b15c38a6d4f97bfe72ec7e7135998b5f6183e61f755997bb8abc71cfcb2667822fcd754c8d9aaedaa96
-
Filesize
72KB
MD56dba99c8bf27ead0e0fcded249ba5d54
SHA149a7ce0b6814b9ff7abb749a830f7b15efff2e1c
SHA256bab7099d532c2aa16d90ae2297f0eaddf4037df470598b58c82c0310aa42c82d
SHA512d3fdffa9bdf23a9cbb9ec4a1b13f3155512380b312104b15c38a6d4f97bfe72ec7e7135998b5f6183e61f755997bb8abc71cfcb2667822fcd754c8d9aaedaa96
-
Filesize
72KB
MD52b3d82e065450142bf341e27ca38bb22
SHA1b5509ee43887144c559ac7b071706e9a462173e3
SHA256a7c3bb490151a5292238f175b59e44b4e919f3f60641a17dd7a363339de5fb58
SHA51274e8ed199656150dfe8f9a54e04410edf15e7c6d4b0de952596e65be6fec6f364f47d7ab52f32cd219b220109027cb403a74cfe479a16ede7528821f1a572c03
-
Filesize
72KB
MD52b3d82e065450142bf341e27ca38bb22
SHA1b5509ee43887144c559ac7b071706e9a462173e3
SHA256a7c3bb490151a5292238f175b59e44b4e919f3f60641a17dd7a363339de5fb58
SHA51274e8ed199656150dfe8f9a54e04410edf15e7c6d4b0de952596e65be6fec6f364f47d7ab52f32cd219b220109027cb403a74cfe479a16ede7528821f1a572c03
-
Filesize
72KB
MD55a29b0b1958d8122bb64fc9e18048778
SHA1be1db5ea4b33ef8123d4f6cf36dbf85d85d69c28
SHA2569383335faa7cb6d7146cf1e447dbee4855358e2d1eb6f62d4023c62261bb59b7
SHA512ba0bc10955a31412c1880db9cd095b440afd00010dc8e4cf05036df12ec3c3cde4cd83531a6c0e2c2a37c57e8f1c6ae90862b591d30df8f44c81cecfde374ba0
-
Filesize
72KB
MD55a29b0b1958d8122bb64fc9e18048778
SHA1be1db5ea4b33ef8123d4f6cf36dbf85d85d69c28
SHA2569383335faa7cb6d7146cf1e447dbee4855358e2d1eb6f62d4023c62261bb59b7
SHA512ba0bc10955a31412c1880db9cd095b440afd00010dc8e4cf05036df12ec3c3cde4cd83531a6c0e2c2a37c57e8f1c6ae90862b591d30df8f44c81cecfde374ba0
-
Filesize
72KB
MD51a983c94989cdfe7d6a46f45b80aeda1
SHA155b61e269a1f3b5895a0f872f7d7d0e180a3428e
SHA256ea7d27dbb72d96972a3a0666bc847e2765a5df28c46f68d7d91d4d2af1359170
SHA5125fd714d990d0e6b3bc74d8d2e77528fa63acedb3c436ed1411ce8962898fe532048448e372557d4e5612cef3759246da0c849c09dd7791c78011c4d7354970cf
-
Filesize
72KB
MD51a983c94989cdfe7d6a46f45b80aeda1
SHA155b61e269a1f3b5895a0f872f7d7d0e180a3428e
SHA256ea7d27dbb72d96972a3a0666bc847e2765a5df28c46f68d7d91d4d2af1359170
SHA5125fd714d990d0e6b3bc74d8d2e77528fa63acedb3c436ed1411ce8962898fe532048448e372557d4e5612cef3759246da0c849c09dd7791c78011c4d7354970cf
-
Filesize
72KB
MD58e269c4c4552d38e81700b393c66d87b
SHA15dd629760e5b950c5807f138e5c4f91fe7790c57
SHA256bf484c8533f145e00d28221386d7e51869bcf53590a3105c2b0c76949e4817b1
SHA512977d3e0f525b7b6f3113cb453a8de5d81994983a05359c52830e06e24f458fe7df72b07302f8000c761b9bd10eebdf108bf3b0a3a96482816d9897edcf7e197e
-
Filesize
72KB
MD58e269c4c4552d38e81700b393c66d87b
SHA15dd629760e5b950c5807f138e5c4f91fe7790c57
SHA256bf484c8533f145e00d28221386d7e51869bcf53590a3105c2b0c76949e4817b1
SHA512977d3e0f525b7b6f3113cb453a8de5d81994983a05359c52830e06e24f458fe7df72b07302f8000c761b9bd10eebdf108bf3b0a3a96482816d9897edcf7e197e
-
Filesize
72KB
MD51c67af523523f4fc58d8d8d64930a52c
SHA1ae99fc79cfda01fcc05b70d4a8a8892a0e32d811
SHA256cee8b431545bce46975d3d843b60471a9e5e90b5ddd956b296c469caaef4b97d
SHA5121b05841b8629e3983514ce66524f9a1120e9bffacc8fdb0b235beefad230b4cfa965d46e2436a0ce1f7d18ced0f73fcc478965bc935c09f3f1a4c36a6eb2aee7
-
Filesize
72KB
MD51c67af523523f4fc58d8d8d64930a52c
SHA1ae99fc79cfda01fcc05b70d4a8a8892a0e32d811
SHA256cee8b431545bce46975d3d843b60471a9e5e90b5ddd956b296c469caaef4b97d
SHA5121b05841b8629e3983514ce66524f9a1120e9bffacc8fdb0b235beefad230b4cfa965d46e2436a0ce1f7d18ced0f73fcc478965bc935c09f3f1a4c36a6eb2aee7
-
Filesize
72KB
MD5990863b98391b171e201b0022d93742f
SHA1495751def86c40899914bdae90adbd881bd39b62
SHA256a16a0691b19d2994f3780b3bea6c967ef453a6271668126146cbb78ebb935482
SHA512b223b5669e7231519a05dbb0d89ce21a77f7f209d2e6782315fa28b12762a796ca586b50ec5bd81c6ab13af227b225421900da7a31647ccb433ac6c8ccc2100d
-
Filesize
72KB
MD5990863b98391b171e201b0022d93742f
SHA1495751def86c40899914bdae90adbd881bd39b62
SHA256a16a0691b19d2994f3780b3bea6c967ef453a6271668126146cbb78ebb935482
SHA512b223b5669e7231519a05dbb0d89ce21a77f7f209d2e6782315fa28b12762a796ca586b50ec5bd81c6ab13af227b225421900da7a31647ccb433ac6c8ccc2100d
-
Filesize
72KB
MD53e564193a48269e140c8232454e0f278
SHA16a48c1546538c2005c1c654c6b573e5879dc8b89
SHA256da149d622e9ff9960344fbf4c57d4d8fbec7966c024b293a1b74e897696195ed
SHA512d246379553429f00de1d676735124092adf9711886bf688e31d8d4dc6a0064e4449028cadc42bc022efcb283fc61ddc7e01ea39b8e37f15da6b51b3de4a6275e
-
Filesize
72KB
MD53e564193a48269e140c8232454e0f278
SHA16a48c1546538c2005c1c654c6b573e5879dc8b89
SHA256da149d622e9ff9960344fbf4c57d4d8fbec7966c024b293a1b74e897696195ed
SHA512d246379553429f00de1d676735124092adf9711886bf688e31d8d4dc6a0064e4449028cadc42bc022efcb283fc61ddc7e01ea39b8e37f15da6b51b3de4a6275e
-
Filesize
72KB
MD5b348cc91ab11d587971e1899d14f1751
SHA1b822bfec620516c50e9fd2d7dcf190bed692816c
SHA2560cf0262a9792822721154197d7be767534fe2db1c054219cdb3cee25a3a2a8bf
SHA512c48dd79adf12a168bcaf78043085b84c003f71acc66864e28c7a2d06236d7968a2bf2edb5424f4309f32349921b059a21c650a33ec3ec442bd05635cd21eb672
-
Filesize
72KB
MD5b348cc91ab11d587971e1899d14f1751
SHA1b822bfec620516c50e9fd2d7dcf190bed692816c
SHA2560cf0262a9792822721154197d7be767534fe2db1c054219cdb3cee25a3a2a8bf
SHA512c48dd79adf12a168bcaf78043085b84c003f71acc66864e28c7a2d06236d7968a2bf2edb5424f4309f32349921b059a21c650a33ec3ec442bd05635cd21eb672
-
Filesize
72KB
MD556f5b93e70a4c9b7970bfea2b8b3a1cc
SHA122a21bce19561d4defb1542aa1fe9e8965c52efb
SHA256f77f2efefbe767b7df48c86db09763a1235e88ad0ef158fed029bdf397b880ac
SHA512186defe755e400857b245159ee6e611a6d6721c19e30d5677106cef8e6e5e0f2281422b5b52dab2141c38d73223d5a2a2c0130e93a1c769736471bb82efe0e3c
-
Filesize
72KB
MD556f5b93e70a4c9b7970bfea2b8b3a1cc
SHA122a21bce19561d4defb1542aa1fe9e8965c52efb
SHA256f77f2efefbe767b7df48c86db09763a1235e88ad0ef158fed029bdf397b880ac
SHA512186defe755e400857b245159ee6e611a6d6721c19e30d5677106cef8e6e5e0f2281422b5b52dab2141c38d73223d5a2a2c0130e93a1c769736471bb82efe0e3c
-
Filesize
72KB
MD5ef19666507b34202d132ac53c14da7fb
SHA14eeaf2253827d27938cd721c611d34df038754ce
SHA256886e4a6bc9d6864a13a581a1f12af2b28a28df9c2317d21152b2f4e1e2aab1e6
SHA512c7f12511e715130bf74eef8ecde4d2d80e24156d71bbee80f9b4ad1f55486b0375c078f74f78c66d2c3c852596f30280bfe2d92ff10e023bd51589acbdfe63a6
-
Filesize
72KB
MD5ef19666507b34202d132ac53c14da7fb
SHA14eeaf2253827d27938cd721c611d34df038754ce
SHA256886e4a6bc9d6864a13a581a1f12af2b28a28df9c2317d21152b2f4e1e2aab1e6
SHA512c7f12511e715130bf74eef8ecde4d2d80e24156d71bbee80f9b4ad1f55486b0375c078f74f78c66d2c3c852596f30280bfe2d92ff10e023bd51589acbdfe63a6
-
Filesize
72KB
MD50d6fe2b25dbc5d9cc814c38c65822593
SHA174447686c861fbf4fd33af7056277ca381ba6031
SHA2563ae67ee072937e1f46ca072eb7ed45318e988369f5aaf635d2e4f8ce4f2e0b34
SHA51298c8a5f3528b57fba3f995d0409ae08e5c6e90fee980dbcf47b55edd45c8112e558364021d23f5639bc7e514ae711e99224d48543ea05b8bc02c77a0b96161df
-
Filesize
72KB
MD50d6fe2b25dbc5d9cc814c38c65822593
SHA174447686c861fbf4fd33af7056277ca381ba6031
SHA2563ae67ee072937e1f46ca072eb7ed45318e988369f5aaf635d2e4f8ce4f2e0b34
SHA51298c8a5f3528b57fba3f995d0409ae08e5c6e90fee980dbcf47b55edd45c8112e558364021d23f5639bc7e514ae711e99224d48543ea05b8bc02c77a0b96161df
-
Filesize
72KB
MD53e564193a48269e140c8232454e0f278
SHA16a48c1546538c2005c1c654c6b573e5879dc8b89
SHA256da149d622e9ff9960344fbf4c57d4d8fbec7966c024b293a1b74e897696195ed
SHA512d246379553429f00de1d676735124092adf9711886bf688e31d8d4dc6a0064e4449028cadc42bc022efcb283fc61ddc7e01ea39b8e37f15da6b51b3de4a6275e
-
Filesize
72KB
MD53e564193a48269e140c8232454e0f278
SHA16a48c1546538c2005c1c654c6b573e5879dc8b89
SHA256da149d622e9ff9960344fbf4c57d4d8fbec7966c024b293a1b74e897696195ed
SHA512d246379553429f00de1d676735124092adf9711886bf688e31d8d4dc6a0064e4449028cadc42bc022efcb283fc61ddc7e01ea39b8e37f15da6b51b3de4a6275e
-
Filesize
72KB
MD5e6677d309c491c3c9528cc584fa82ff6
SHA1afa58c4fc1cbdd8532a9c6f4f9ba0be81160d4c9
SHA256afc1a52c2ba742dc3547c7cdc9c57057f6efe7b94b77b2297d9091c71a499448
SHA5126a27eeac79fd625098363ce2dec2a750315fa7fc65b7c3e1a9ff9637429ac47977566bdb28ca4db108a4f2a688332e95540da4e4484cbe31091073dd70fcd510
-
Filesize
72KB
MD5e6677d309c491c3c9528cc584fa82ff6
SHA1afa58c4fc1cbdd8532a9c6f4f9ba0be81160d4c9
SHA256afc1a52c2ba742dc3547c7cdc9c57057f6efe7b94b77b2297d9091c71a499448
SHA5126a27eeac79fd625098363ce2dec2a750315fa7fc65b7c3e1a9ff9637429ac47977566bdb28ca4db108a4f2a688332e95540da4e4484cbe31091073dd70fcd510
-
Filesize
72KB
MD52e778b45d8a18bb81f475cf13b6d906c
SHA11d6af5cda0015fc3cbeeaa189ca292a79adf6fb4
SHA256fe1e6183f78e81e1f8f95429b5b37f04a63c0990bfa14509808b338d5b66fe67
SHA512e831f5087a8c17382a32c590ea417a8e24c8682155374d9ad92cd84a6a3b491f34e9e3a06089bd1fe6d7e61c9f1ce026794125c475ec3907d8c705214dc72946
-
Filesize
72KB
MD52e778b45d8a18bb81f475cf13b6d906c
SHA11d6af5cda0015fc3cbeeaa189ca292a79adf6fb4
SHA256fe1e6183f78e81e1f8f95429b5b37f04a63c0990bfa14509808b338d5b66fe67
SHA512e831f5087a8c17382a32c590ea417a8e24c8682155374d9ad92cd84a6a3b491f34e9e3a06089bd1fe6d7e61c9f1ce026794125c475ec3907d8c705214dc72946
-
Filesize
72KB
MD584e4fb03864a8360f684bde1a1ce9243
SHA14b98db8a15250f193a1855c8db78957e7eb41080
SHA2566c8defd7acc10832b16c8309daaf90f0c5811320f3a0423fa227971d607815c6
SHA512a78ff5c04689789c3c6a1807d24172fdea593f5f47a51a5e13c0be8e3635d11d92863e4392b915143ae30b088f73f593559e3913fb6387c4e9ec5e4740fae8b3
-
Filesize
72KB
MD584e4fb03864a8360f684bde1a1ce9243
SHA14b98db8a15250f193a1855c8db78957e7eb41080
SHA2566c8defd7acc10832b16c8309daaf90f0c5811320f3a0423fa227971d607815c6
SHA512a78ff5c04689789c3c6a1807d24172fdea593f5f47a51a5e13c0be8e3635d11d92863e4392b915143ae30b088f73f593559e3913fb6387c4e9ec5e4740fae8b3
-
Filesize
72KB
MD5c372495a4516a3980a07c072b0d3f283
SHA1a26ee486d9cf64ba3deddb768538b1e028b6d8be
SHA256077aa7448e64f6cd94c4fce3262d4916fe599f59efa623c614298b64c39d00ca
SHA512653462fc23aff025d5d16a7231f2a18d9474f8abbb5c5c3d2fc714dc60980b9e8ccb7f63bf3c2edd4752b8c5ff9b8ccd388a976fe78b396576cd8d43bfa483bc
-
Filesize
72KB
MD5c372495a4516a3980a07c072b0d3f283
SHA1a26ee486d9cf64ba3deddb768538b1e028b6d8be
SHA256077aa7448e64f6cd94c4fce3262d4916fe599f59efa623c614298b64c39d00ca
SHA512653462fc23aff025d5d16a7231f2a18d9474f8abbb5c5c3d2fc714dc60980b9e8ccb7f63bf3c2edd4752b8c5ff9b8ccd388a976fe78b396576cd8d43bfa483bc
-
Filesize
72KB
MD5438ffc54248ff7363cef7fd0976bc136
SHA15ef25f76c64e6092b25d56dae1e970a5060dd8ec
SHA2565311c49aa846d6ebdb665172aeae618838912d0d18e7a8d0600dd4bcf54d94ac
SHA51280c4a216bca90118f78ff58cfc66f493c9a0d6166a7f4650e8ad15bebc5b2ae04b93b33dc533b7679ec570d2f3ef705156b9d978990fe471b9203e0fe1b1cb5f
-
Filesize
72KB
MD5438ffc54248ff7363cef7fd0976bc136
SHA15ef25f76c64e6092b25d56dae1e970a5060dd8ec
SHA2565311c49aa846d6ebdb665172aeae618838912d0d18e7a8d0600dd4bcf54d94ac
SHA51280c4a216bca90118f78ff58cfc66f493c9a0d6166a7f4650e8ad15bebc5b2ae04b93b33dc533b7679ec570d2f3ef705156b9d978990fe471b9203e0fe1b1cb5f
-
Filesize
72KB
MD50b284bf75da821bc491e6b1bd8665426
SHA1fc8d91208a215c0540f3886d56b595220bf9adf3
SHA256296326c8d8fdb10bba74e163346885662388e516f7734404802c21d9f297e585
SHA51259fab9fe4f570daaa8cf68afc3296d9f2de2f2d10b04a19ae824bbb77a878c233fdca2469f0244a44bbbeb3009aa2705123e041a385e753b832137620d726c17
-
Filesize
72KB
MD50b284bf75da821bc491e6b1bd8665426
SHA1fc8d91208a215c0540f3886d56b595220bf9adf3
SHA256296326c8d8fdb10bba74e163346885662388e516f7734404802c21d9f297e585
SHA51259fab9fe4f570daaa8cf68afc3296d9f2de2f2d10b04a19ae824bbb77a878c233fdca2469f0244a44bbbeb3009aa2705123e041a385e753b832137620d726c17
-
Filesize
72KB
MD57163b84ff02cb3a2c365ec78bcc3ca23
SHA1a38ee4ac0440ebd9e4c371bb4b42259d3bb72aac
SHA256faa18a5274f823a5bf48ac441797c8e92727534cf94c88189942e70ff9da4572
SHA512ab0080f65bc9957aff0cccb976aa9f9020da28bb5a2bdb394aac4614f2bf560235f9d44868f8944133ec41ea49f59941521e8d1a8c2933a0bc147ca52916a766
-
Filesize
72KB
MD57163b84ff02cb3a2c365ec78bcc3ca23
SHA1a38ee4ac0440ebd9e4c371bb4b42259d3bb72aac
SHA256faa18a5274f823a5bf48ac441797c8e92727534cf94c88189942e70ff9da4572
SHA512ab0080f65bc9957aff0cccb976aa9f9020da28bb5a2bdb394aac4614f2bf560235f9d44868f8944133ec41ea49f59941521e8d1a8c2933a0bc147ca52916a766
-
Filesize
72KB
MD5a6c7c9da7452a76dbd7022b50e5ffcae
SHA1c8227968e2447551fe51bf4b44ea5e8e6571d261
SHA256c7953a1f631e844196e44a17a2e5ba2a37c983284efcd848f14f775d6d4a5ee2
SHA5126dd1a918fbbd1986645793782875183a549271c8d962724806967784097552c689d13cea81c1f7f1573242a5f7486bae917d0c21873295e3984f2048213af110
-
Filesize
72KB
MD5a6c7c9da7452a76dbd7022b50e5ffcae
SHA1c8227968e2447551fe51bf4b44ea5e8e6571d261
SHA256c7953a1f631e844196e44a17a2e5ba2a37c983284efcd848f14f775d6d4a5ee2
SHA5126dd1a918fbbd1986645793782875183a549271c8d962724806967784097552c689d13cea81c1f7f1573242a5f7486bae917d0c21873295e3984f2048213af110
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a6c7c9da7452a76dbd7022b50e5ffcae
SHA1c8227968e2447551fe51bf4b44ea5e8e6571d261
SHA256c7953a1f631e844196e44a17a2e5ba2a37c983284efcd848f14f775d6d4a5ee2
SHA5126dd1a918fbbd1986645793782875183a549271c8d962724806967784097552c689d13cea81c1f7f1573242a5f7486bae917d0c21873295e3984f2048213af110
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a6c7c9da7452a76dbd7022b50e5ffcae
SHA1c8227968e2447551fe51bf4b44ea5e8e6571d261
SHA256c7953a1f631e844196e44a17a2e5ba2a37c983284efcd848f14f775d6d4a5ee2
SHA5126dd1a918fbbd1986645793782875183a549271c8d962724806967784097552c689d13cea81c1f7f1573242a5f7486bae917d0c21873295e3984f2048213af110
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5507a6c618f470b82b84f9317fa35c06a
SHA1cbd31dbd67a04dabec0ed9680150cd563e8d6184
SHA25674e5e2842fdedcfdfe5ea9bd9966a5b8581c2f878f9468333ecd65cf3a49bc4c
SHA512dd3d8e6a49f574a4c3e51e8f2d01712bc998dfa7686431bb833147d5c7b07ccbcd3b964c6241fcca17f3b0461cad78c1b6521d2230c5ea66da2dcff0b1304663
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5507a6c618f470b82b84f9317fa35c06a
SHA1cbd31dbd67a04dabec0ed9680150cd563e8d6184
SHA25674e5e2842fdedcfdfe5ea9bd9966a5b8581c2f878f9468333ecd65cf3a49bc4c
SHA512dd3d8e6a49f574a4c3e51e8f2d01712bc998dfa7686431bb833147d5c7b07ccbcd3b964c6241fcca17f3b0461cad78c1b6521d2230c5ea66da2dcff0b1304663
-
Filesize
72KB
MD57163b84ff02cb3a2c365ec78bcc3ca23
SHA1a38ee4ac0440ebd9e4c371bb4b42259d3bb72aac
SHA256faa18a5274f823a5bf48ac441797c8e92727534cf94c88189942e70ff9da4572
SHA512ab0080f65bc9957aff0cccb976aa9f9020da28bb5a2bdb394aac4614f2bf560235f9d44868f8944133ec41ea49f59941521e8d1a8c2933a0bc147ca52916a766
-
Filesize
72KB
MD57163b84ff02cb3a2c365ec78bcc3ca23
SHA1a38ee4ac0440ebd9e4c371bb4b42259d3bb72aac
SHA256faa18a5274f823a5bf48ac441797c8e92727534cf94c88189942e70ff9da4572
SHA512ab0080f65bc9957aff0cccb976aa9f9020da28bb5a2bdb394aac4614f2bf560235f9d44868f8944133ec41ea49f59941521e8d1a8c2933a0bc147ca52916a766
-
Filesize
72KB
MD57163b84ff02cb3a2c365ec78bcc3ca23
SHA1a38ee4ac0440ebd9e4c371bb4b42259d3bb72aac
SHA256faa18a5274f823a5bf48ac441797c8e92727534cf94c88189942e70ff9da4572
SHA512ab0080f65bc9957aff0cccb976aa9f9020da28bb5a2bdb394aac4614f2bf560235f9d44868f8944133ec41ea49f59941521e8d1a8c2933a0bc147ca52916a766
-
Filesize
72KB
MD57163b84ff02cb3a2c365ec78bcc3ca23
SHA1a38ee4ac0440ebd9e4c371bb4b42259d3bb72aac
SHA256faa18a5274f823a5bf48ac441797c8e92727534cf94c88189942e70ff9da4572
SHA512ab0080f65bc9957aff0cccb976aa9f9020da28bb5a2bdb394aac4614f2bf560235f9d44868f8944133ec41ea49f59941521e8d1a8c2933a0bc147ca52916a766
-
Filesize
72KB
MD5507a6c618f470b82b84f9317fa35c06a
SHA1cbd31dbd67a04dabec0ed9680150cd563e8d6184
SHA25674e5e2842fdedcfdfe5ea9bd9966a5b8581c2f878f9468333ecd65cf3a49bc4c
SHA512dd3d8e6a49f574a4c3e51e8f2d01712bc998dfa7686431bb833147d5c7b07ccbcd3b964c6241fcca17f3b0461cad78c1b6521d2230c5ea66da2dcff0b1304663
-
Filesize
72KB
MD5507a6c618f470b82b84f9317fa35c06a
SHA1cbd31dbd67a04dabec0ed9680150cd563e8d6184
SHA25674e5e2842fdedcfdfe5ea9bd9966a5b8581c2f878f9468333ecd65cf3a49bc4c
SHA512dd3d8e6a49f574a4c3e51e8f2d01712bc998dfa7686431bb833147d5c7b07ccbcd3b964c6241fcca17f3b0461cad78c1b6521d2230c5ea66da2dcff0b1304663
-
Filesize
72KB
MD5ac9a45b360c8061d3d46717d75c4ea15
SHA1446f2cd555d39bfb221570a9d6a954de7824a442
SHA25648fe62ba6712b2b8a9e0b357b704a3277e7028f25b9fbf56944f7f9dcf62b72c
SHA5127f9e92d5f3767a03a03d008ac38566d018e8cb4396e8b538e3198471a0adf40e67e813eafcd07d64654e0bb34bfc19c2376046e14f6ae8bdf5daf26577f6dd75
-
Filesize
72KB
MD5ac9a45b360c8061d3d46717d75c4ea15
SHA1446f2cd555d39bfb221570a9d6a954de7824a442
SHA25648fe62ba6712b2b8a9e0b357b704a3277e7028f25b9fbf56944f7f9dcf62b72c
SHA5127f9e92d5f3767a03a03d008ac38566d018e8cb4396e8b538e3198471a0adf40e67e813eafcd07d64654e0bb34bfc19c2376046e14f6ae8bdf5daf26577f6dd75
-
Filesize
72KB
MD5ca23dcab72bfd38881e0d50148eadbc2
SHA1c8178428c860af753bb3baf155cf32b4128f949d
SHA256ae7cb37d95fe3b66e8c4c3fffb4223da61592f2b3ff14111ad325d0fb2f259ee
SHA512cfd7c2a0cd2b028e7a52afcb2c8ac4bcddf55a22734b67e5a3fcd3174078949c45ad584e6fed5880a781c342020106338e1d63001250edfefc0aff663d60433c
-
Filesize
72KB
MD5ca23dcab72bfd38881e0d50148eadbc2
SHA1c8178428c860af753bb3baf155cf32b4128f949d
SHA256ae7cb37d95fe3b66e8c4c3fffb4223da61592f2b3ff14111ad325d0fb2f259ee
SHA512cfd7c2a0cd2b028e7a52afcb2c8ac4bcddf55a22734b67e5a3fcd3174078949c45ad584e6fed5880a781c342020106338e1d63001250edfefc0aff663d60433c