Analysis
-
max time kernel
200s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe
Resource
win10v2004-20221111-en
General
-
Target
12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe
-
Size
72KB
-
MD5
02989c2b62634fd12a3f86f487aa65b5
-
SHA1
4855c1922ce631c9ae0036e65bb997e6f784dcd5
-
SHA256
12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79
-
SHA512
24be599647848cd78ef2d6276cbac2dacdab7f2b3ad69acd741e99d7df983505b25e9ba717e6b4ab2c4f898eead55de860d5ac0b431c235e9004e80c37bf3697
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2x:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPF
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4820 backup.exe 4940 backup.exe 4432 backup.exe 4332 backup.exe 3944 backup.exe 4328 backup.exe 3160 backup.exe 1016 backup.exe 2932 backup.exe 4760 backup.exe 3116 backup.exe 3768 backup.exe 4308 backup.exe 1564 backup.exe 4272 backup.exe 3108 backup.exe 1920 backup.exe 4828 backup.exe 4216 backup.exe 1152 backup.exe 4468 backup.exe 3556 backup.exe 1548 backup.exe 1960 backup.exe 4640 update.exe 4412 update.exe 3264 backup.exe 3388 backup.exe 3772 backup.exe 3672 backup.exe 2260 backup.exe 1624 backup.exe 1368 backup.exe 3564 backup.exe 1204 backup.exe 3088 backup.exe 4184 backup.exe 3788 backup.exe 1692 backup.exe 2512 backup.exe 1016 backup.exe 4656 backup.exe 2932 backup.exe 2928 backup.exe 4288 update.exe 1388 backup.exe 1716 backup.exe 4584 backup.exe 1004 backup.exe 5092 backup.exe 4272 backup.exe 1828 data.exe 3164 backup.exe 2300 backup.exe 4872 backup.exe 3932 backup.exe 5032 backup.exe 1872 backup.exe 2144 backup.exe 1468 backup.exe 4496 backup.exe 4560 backup.exe 3896 backup.exe 4216 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\Office16\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Google\Update\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\ModifiableWindowsApps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\System Restore.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office 15\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\data.exe backup.exe -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\apppatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\apppatch\de-DE\backup.exe backup.exe File opened for modification C:\Windows\apppatch\en-US\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\apppatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC_32\update.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\apppatch\CustomSDB\backup.exe backup.exe File opened for modification C:\Windows\bcastdvr\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe backup.exe File opened for modification C:\Windows\appcompat\Programs\backup.exe backup.exe File opened for modification C:\Windows\apppatch\Custom\Custom64\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\ADODB\backup.exe System Restore.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppReadiness\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\System Restore.exe backup.exe File opened for modification C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\Extensibility\backup.exe System Restore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 4820 backup.exe 4940 backup.exe 4432 backup.exe 4332 backup.exe 3944 backup.exe 4328 backup.exe 3160 backup.exe 1016 backup.exe 2932 backup.exe 4760 backup.exe 3116 backup.exe 3768 backup.exe 4308 backup.exe 1564 backup.exe 4272 backup.exe 3108 backup.exe 1920 backup.exe 4828 backup.exe 4216 backup.exe 1152 backup.exe 3556 backup.exe 4468 backup.exe 1548 backup.exe 4640 update.exe 4412 update.exe 1960 backup.exe 3264 backup.exe 3388 backup.exe 3672 backup.exe 2260 backup.exe 3772 backup.exe 1624 backup.exe 1368 backup.exe 3564 backup.exe 3088 backup.exe 1204 backup.exe 4184 backup.exe 3788 backup.exe 1692 backup.exe 2512 backup.exe 1016 backup.exe 4656 backup.exe 2932 backup.exe 2928 backup.exe 4288 update.exe 1388 backup.exe 1716 backup.exe 4584 backup.exe 1004 backup.exe 5092 backup.exe 4272 backup.exe 1828 data.exe 3164 backup.exe 3932 backup.exe 2300 backup.exe 5032 backup.exe 1872 backup.exe 2144 backup.exe 4872 backup.exe 1468 backup.exe 4496 backup.exe 4560 backup.exe 4216 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4820 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 84 PID 3012 wrote to memory of 4820 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 84 PID 3012 wrote to memory of 4820 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 84 PID 3012 wrote to memory of 4940 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 85 PID 3012 wrote to memory of 4940 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 85 PID 3012 wrote to memory of 4940 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 85 PID 3012 wrote to memory of 4432 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 86 PID 3012 wrote to memory of 4432 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 86 PID 3012 wrote to memory of 4432 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 86 PID 3012 wrote to memory of 4332 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 87 PID 3012 wrote to memory of 4332 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 87 PID 3012 wrote to memory of 4332 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 87 PID 3012 wrote to memory of 3944 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 88 PID 3012 wrote to memory of 3944 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 88 PID 3012 wrote to memory of 3944 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 88 PID 4820 wrote to memory of 4328 4820 backup.exe 89 PID 4820 wrote to memory of 4328 4820 backup.exe 89 PID 4820 wrote to memory of 4328 4820 backup.exe 89 PID 3012 wrote to memory of 1016 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 90 PID 3012 wrote to memory of 1016 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 90 PID 3012 wrote to memory of 1016 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 90 PID 4328 wrote to memory of 3160 4328 backup.exe 91 PID 4328 wrote to memory of 3160 4328 backup.exe 91 PID 4328 wrote to memory of 3160 4328 backup.exe 91 PID 3012 wrote to memory of 2932 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 92 PID 3012 wrote to memory of 2932 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 92 PID 3012 wrote to memory of 2932 3012 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe 92 PID 4328 wrote to memory of 4760 4328 backup.exe 93 PID 4328 wrote to memory of 4760 4328 backup.exe 93 PID 4328 wrote to memory of 4760 4328 backup.exe 93 PID 4328 wrote to memory of 3116 4328 backup.exe 94 PID 4328 wrote to memory of 3116 4328 backup.exe 94 PID 4328 wrote to memory of 3116 4328 backup.exe 94 PID 3116 wrote to memory of 3768 3116 backup.exe 95 PID 3116 wrote to memory of 3768 3116 backup.exe 95 PID 3116 wrote to memory of 3768 3116 backup.exe 95 PID 3768 wrote to memory of 4308 3768 backup.exe 96 PID 3768 wrote to memory of 4308 3768 backup.exe 96 PID 3768 wrote to memory of 4308 3768 backup.exe 96 PID 3116 wrote to memory of 1564 3116 backup.exe 97 PID 3116 wrote to memory of 1564 3116 backup.exe 97 PID 3116 wrote to memory of 1564 3116 backup.exe 97 PID 1564 wrote to memory of 4272 1564 backup.exe 98 PID 1564 wrote to memory of 4272 1564 backup.exe 98 PID 1564 wrote to memory of 4272 1564 backup.exe 98 PID 1564 wrote to memory of 3108 1564 backup.exe 99 PID 1564 wrote to memory of 3108 1564 backup.exe 99 PID 1564 wrote to memory of 3108 1564 backup.exe 99 PID 3116 wrote to memory of 1920 3116 backup.exe 100 PID 3116 wrote to memory of 1920 3116 backup.exe 100 PID 3116 wrote to memory of 1920 3116 backup.exe 100 PID 4328 wrote to memory of 4828 4328 backup.exe 101 PID 4328 wrote to memory of 4828 4328 backup.exe 101 PID 4328 wrote to memory of 4828 4328 backup.exe 101 PID 1564 wrote to memory of 4216 1564 backup.exe 102 PID 1564 wrote to memory of 4216 1564 backup.exe 102 PID 1564 wrote to memory of 4216 1564 backup.exe 102 PID 4328 wrote to memory of 1152 4328 backup.exe 103 PID 4328 wrote to memory of 1152 4328 backup.exe 103 PID 4328 wrote to memory of 1152 4328 backup.exe 103 PID 3116 wrote to memory of 4468 3116 backup.exe 105 PID 3116 wrote to memory of 4468 3116 backup.exe 105 PID 3116 wrote to memory of 4468 3116 backup.exe 105 PID 1920 wrote to memory of 3556 1920 backup.exe 104 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe"C:\Users\Admin\AppData\Local\Temp\12387ea3bdcb2ff7a732d9cc806121ce65f0054b2b5462a9f86f061938f14c79.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\2271672686\backup.exeC:\Users\Admin\AppData\Local\Temp\2271672686\backup.exe C:\Users\Admin\AppData\Local\Temp\2271672686\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4820 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4328 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3160
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4760
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4308
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3108 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3788
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵PID:4864
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- System policy modification
PID:4192
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵PID:4028
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
PID:4840
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵PID:4000
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
PID:1548
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵PID:3032
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:4616
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- System policy modification
PID:5036
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Disables RegEdit via registry modification
PID:2264
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\data.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\data.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵PID:1508
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:4196
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:4936
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Executes dropped EXE
PID:3896 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- System policy modification
PID:4060
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵PID:1884
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\update.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\update.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵PID:2312
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2252
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵PID:1600
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:3616
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4216
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1368 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
C:\Program Files\Common Files\System\ado\en-US\update.exe"C:\Program Files\Common Files\System\ado\en-US\update.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\Program Files\Common Files\System\ado\es-ES\data.exe"C:\Program Files\Common Files\System\ado\es-ES\data.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Disables RegEdit via registry modification
PID:4396
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- System policy modification
PID:404
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:800
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4872
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- System policy modification
PID:4204
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3528
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:2392
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2444
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵
- System policy modification
PID:1060
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3556 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3672 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3088 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2932
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5092
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4496
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Disables RegEdit via registry modification
PID:760
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- System policy modification
PID:4080
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Drops file in Program Files directory
PID:3156 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵PID:1388
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4468 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3772
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:952
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:3460
-
-
C:\Program Files\Internet Explorer\it-IT\data.exe"C:\Program Files\Internet Explorer\it-IT\data.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:892
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3044
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵
- Modifies visibility of file extensions in Explorer
PID:4180
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- System policy modification
PID:632 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Disables RegEdit via registry modification
PID:2820
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:4856 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵PID:868
-
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵PID:1244
-
-
-
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:2372 -
C:\Program Files\Java\jre1.8.0_66\bin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:4420 -
C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\plugin2\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\plugin2\8⤵PID:4336
-
-
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:4012 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵
- Disables RegEdit via registry modification
PID:3420
-
-
C:\Program Files\Microsoft Office\PackageManifests\update.exe"C:\Program Files\Microsoft Office\PackageManifests\update.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵
- Disables RegEdit via registry modification
PID:3576
-
-
C:\Program Files\Microsoft Office\root\backup.exe"C:\Program Files\Microsoft Office\root\backup.exe" C:\Program Files\Microsoft Office\root\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3584 -
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\7⤵
- Disables RegEdit via registry modification
PID:5060
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\7⤵PID:1752
-
-
-
-
C:\Program Files\Microsoft Office 15\backup.exe"C:\Program Files\Microsoft Office 15\backup.exe" C:\Program Files\Microsoft Office 15\5⤵PID:3096
-
C:\Program Files\Microsoft Office 15\ClientX64\backup.exe"C:\Program Files\Microsoft Office 15\ClientX64\backup.exe" C:\Program Files\Microsoft Office 15\ClientX64\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2728
-
-
-
C:\Program Files\Mozilla Firefox\System Restore.exe"C:\Program Files\Mozilla Firefox\System Restore.exe" C:\Program Files\Mozilla Firefox\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3580 -
C:\Program Files\Mozilla Firefox\browser\backup.exe"C:\Program Files\Mozilla Firefox\browser\backup.exe" C:\Program Files\Mozilla Firefox\browser\6⤵
- Drops file in Program Files directory
PID:1456 -
C:\Program Files\Mozilla Firefox\browser\features\backup.exe"C:\Program Files\Mozilla Firefox\browser\features\backup.exe" C:\Program Files\Mozilla Firefox\browser\features\7⤵
- System policy modification
PID:3500
-
-
C:\Program Files\Mozilla Firefox\browser\VisualElements\backup.exe"C:\Program Files\Mozilla Firefox\browser\VisualElements\backup.exe" C:\Program Files\Mozilla Firefox\browser\VisualElements\7⤵PID:4868
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4828 -
C:\Program Files (x86)\Adobe\update.exe"C:\Program Files (x86)\Adobe\update.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3264 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1016 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4584 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2144
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4560 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
PID:3260
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Disables RegEdit via registry modification
PID:4588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:432
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵PID:4068
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4796
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵PID:1428
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1696 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵PID:3708
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- System policy modification
PID:1792
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3392 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\9⤵
- Modifies visibility of file extensions in Explorer
PID:1292
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- Disables RegEdit via registry modification
PID:4192
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\7⤵
- Disables RegEdit via registry modification
PID:4656 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4088
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3164 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Disables RegEdit via registry modification
PID:1472 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Disables RegEdit via registry modification
PID:516
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3460 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- Modifies visibility of file extensions in Explorer
PID:4668
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4428
-
-
-
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4288 -
C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe"C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe" C:\Program Files (x86)\Common Files\Java\Java Update\7⤵PID:5040
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\6⤵
- Drops file in Program Files directory
- System policy modification
PID:180 -
C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\7⤵
- System policy modification
PID:660
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4808
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\System Restore.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\System Restore.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\ink\7⤵PID:1152
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\8⤵PID:1264
-
-
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4216 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
PID:4272
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
PID:1244
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵
- Disables RegEdit via registry modification
PID:2068
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:1656
-
C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe" C:\Program Files (x86)\Google\Update\1.3.36.71\7⤵PID:4612
-
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3716 -
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵PID:4224
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:2900
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe"C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵
- Disables RegEdit via registry modification
PID:3696
-
-
C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe" C:\Program Files (x86)\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:4500
-
-
-
C:\Program Files (x86)\Microsoft\backup.exe"C:\Program Files (x86)\Microsoft\backup.exe" C:\Program Files (x86)\Microsoft\5⤵PID:4948
-
C:\Program Files (x86)\Microsoft\Edge\backup.exe"C:\Program Files (x86)\Microsoft\Edge\backup.exe" C:\Program Files (x86)\Microsoft\Edge\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4408
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\update.exeC:\Users\Admin\update.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4412 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4656
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1004
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Disables RegEdit via registry modification
PID:212
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:3940
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3152
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
PID:452
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- System policy modification
PID:4524
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵
- System policy modification
PID:4544 -
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\7⤵PID:4972
-
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
PID:3732
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
PID:4932
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:4432
-
-
C:\Users\Public\Videos\data.exeC:\Users\Public\Videos\data.exe C:\Users\Public\Videos\6⤵
- Modifies visibility of file extensions in Explorer
PID:2084
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- Disables RegEdit via registry modification
PID:3028
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4184
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Drops file in Windows directory
- System policy modification
PID:3392 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵
- Disables RegEdit via registry modification
PID:3712
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2868
-
-
C:\Windows\appcompat\Programs\backup.exeC:\Windows\appcompat\Programs\backup.exe C:\Windows\appcompat\Programs\6⤵PID:4572
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Windows\apppatch\AppPatch64\backup.exeC:\Windows\apppatch\AppPatch64\backup.exe C:\Windows\apppatch\AppPatch64\6⤵PID:1860
-
-
C:\Windows\apppatch\Custom\backup.exeC:\Windows\apppatch\Custom\backup.exe C:\Windows\apppatch\Custom\6⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:4416 -
C:\Windows\apppatch\Custom\Custom64\backup.exeC:\Windows\apppatch\Custom\Custom64\backup.exe C:\Windows\apppatch\Custom\Custom64\7⤵
- System policy modification
PID:4852
-
-
-
C:\Windows\apppatch\de-DE\backup.exeC:\Windows\apppatch\de-DE\backup.exe C:\Windows\apppatch\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
PID:1356
-
-
C:\Windows\apppatch\CustomSDB\backup.exeC:\Windows\apppatch\CustomSDB\backup.exe C:\Windows\apppatch\CustomSDB\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1712
-
-
C:\Windows\apppatch\en-US\backup.exeC:\Windows\apppatch\en-US\backup.exe C:\Windows\apppatch\en-US\6⤵PID:1748
-
-
-
C:\Windows\AppReadiness\backup.exeC:\Windows\AppReadiness\backup.exe C:\Windows\AppReadiness\5⤵PID:3580
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵
- Drops file in Windows directory
PID:2036 -
C:\Windows\assembly\GAC\System Restore.exe"C:\Windows\assembly\GAC\System Restore.exe" C:\Windows\assembly\GAC\6⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:4324 -
C:\Windows\assembly\GAC\ADODB\backup.exeC:\Windows\assembly\GAC\ADODB\backup.exe C:\Windows\assembly\GAC\ADODB\7⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:3732 -
C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\backup.exeC:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\backup.exe C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\8⤵
- System policy modification
PID:3472
-
-
-
C:\Windows\assembly\GAC\Extensibility\backup.exeC:\Windows\assembly\GAC\Extensibility\backup.exe C:\Windows\assembly\GAC\Extensibility\7⤵PID:4072
-
-
-
-
C:\Windows\bcastdvr\backup.exeC:\Windows\bcastdvr\backup.exe C:\Windows\bcastdvr\5⤵PID:660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2932
-
-
C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\1⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4604
-
C:\Program Files (x86)\Microsoft\Edge\Application\backup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\backup.exe" C:\Program Files (x86)\Microsoft\Edge\Application\1⤵
- Drops file in Program Files directory
PID:4920 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\backup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\backup.exe" C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\2⤵
- Disables RegEdit via registry modification
PID:4728
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\1⤵PID:456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5356c9b55a6b745eb90160fc767e10a5b
SHA15664cc3be12f37d583a8cce179ce43e6b1a0f298
SHA256743fdd5ac9d092473866403ffd9f0de092aab6fc36c6c5556c6da3f6db6709e4
SHA512050fe110a92434101c22df985a7b53158b989876e49d26f11d7523971ca3c418244db390776c51449016913ea98e197e3dbe446e514bf68a51f4e91978ced7e5
-
Filesize
72KB
MD5356c9b55a6b745eb90160fc767e10a5b
SHA15664cc3be12f37d583a8cce179ce43e6b1a0f298
SHA256743fdd5ac9d092473866403ffd9f0de092aab6fc36c6c5556c6da3f6db6709e4
SHA512050fe110a92434101c22df985a7b53158b989876e49d26f11d7523971ca3c418244db390776c51449016913ea98e197e3dbe446e514bf68a51f4e91978ced7e5
-
Filesize
72KB
MD5bfc1cd21c71ddf19467af573fe6c934b
SHA13a9b38157e98fe10521d046158c0403dd420faff
SHA256930371979b8b5b91b19f87d98e5035edd449c377c6c7676b2600fe523b387550
SHA5125960293be77284d03d7604ab4cf21434f66478ac719519711221e60156a10342851f6caf3e43003fe79c778a31d7f9ee910c5e29dce77db551cb9954c02e4931
-
Filesize
72KB
MD5bfc1cd21c71ddf19467af573fe6c934b
SHA13a9b38157e98fe10521d046158c0403dd420faff
SHA256930371979b8b5b91b19f87d98e5035edd449c377c6c7676b2600fe523b387550
SHA5125960293be77284d03d7604ab4cf21434f66478ac719519711221e60156a10342851f6caf3e43003fe79c778a31d7f9ee910c5e29dce77db551cb9954c02e4931
-
Filesize
72KB
MD5d18a4bddc1232cb89ff7dad298905803
SHA1b5928875c452c218de8740a0869ce376bab3e141
SHA256ed441221e67615f862a3bfa61d00f6793300b1511a430a69a34d8d1fc68c7bc5
SHA512fbdae887db031a7a39231ec51b31e70f1584c5d8252576115b7c3226d405d0acf3e359d91cfce0da349b044433372dda2d8fd9301f862ebed3989789a6da6ea9
-
Filesize
72KB
MD5d18a4bddc1232cb89ff7dad298905803
SHA1b5928875c452c218de8740a0869ce376bab3e141
SHA256ed441221e67615f862a3bfa61d00f6793300b1511a430a69a34d8d1fc68c7bc5
SHA512fbdae887db031a7a39231ec51b31e70f1584c5d8252576115b7c3226d405d0acf3e359d91cfce0da349b044433372dda2d8fd9301f862ebed3989789a6da6ea9
-
Filesize
72KB
MD5a3275cd7b37afb49e9c0bb0c7711df8c
SHA11da01ff42132160a4682f9f252e9b74e38749eb5
SHA2569e6a18615241786890828af2d9af5b41c3fb5b75c83339d040864fb9207d9961
SHA512d18ecfa205891f89475ce8fbff9322d2e7182a9ea6788621abc477068241cb0214298f02eb45f768c60c407ada70173fdf301ca1be19f92f5d28262eb1d93621
-
Filesize
72KB
MD5a3275cd7b37afb49e9c0bb0c7711df8c
SHA11da01ff42132160a4682f9f252e9b74e38749eb5
SHA2569e6a18615241786890828af2d9af5b41c3fb5b75c83339d040864fb9207d9961
SHA512d18ecfa205891f89475ce8fbff9322d2e7182a9ea6788621abc477068241cb0214298f02eb45f768c60c407ada70173fdf301ca1be19f92f5d28262eb1d93621
-
Filesize
72KB
MD59b485ea9fae6a48a9cbcc38230087296
SHA1b126d455da673d4a8ea49b5efea714a064aaf141
SHA256bb0eaf689b0f98915579817e8777dfe50a01aa40b342f46759241e18581db379
SHA5128f290f9c6a88703a4aa3c9a003e0e9db53402dac7ef455bbdd84c1d807079943b3c23a24be7b5cc00ccd33e8812bda62df3db24d3e994fa6e446d73c4c285800
-
Filesize
72KB
MD59b485ea9fae6a48a9cbcc38230087296
SHA1b126d455da673d4a8ea49b5efea714a064aaf141
SHA256bb0eaf689b0f98915579817e8777dfe50a01aa40b342f46759241e18581db379
SHA5128f290f9c6a88703a4aa3c9a003e0e9db53402dac7ef455bbdd84c1d807079943b3c23a24be7b5cc00ccd33e8812bda62df3db24d3e994fa6e446d73c4c285800
-
Filesize
72KB
MD5bb728c57d078e54e58e1c6d436313ea0
SHA1678aa09e53b1eb602fd8139ad141896d9f9fcec5
SHA256f6615eeb0ba170a3ed1b72d1c2ff910d8c64f0d2c235fa98692ee4bd479fbb7c
SHA51206decf87d861d1c81a6471d45dfc47f624914830ce23a51d44650230d461b201e62252cb45c602cc51fb537e734b8f648181bcb9bb845f99adfe17fca73f6217
-
Filesize
72KB
MD5bb728c57d078e54e58e1c6d436313ea0
SHA1678aa09e53b1eb602fd8139ad141896d9f9fcec5
SHA256f6615eeb0ba170a3ed1b72d1c2ff910d8c64f0d2c235fa98692ee4bd479fbb7c
SHA51206decf87d861d1c81a6471d45dfc47f624914830ce23a51d44650230d461b201e62252cb45c602cc51fb537e734b8f648181bcb9bb845f99adfe17fca73f6217
-
Filesize
72KB
MD59b485ea9fae6a48a9cbcc38230087296
SHA1b126d455da673d4a8ea49b5efea714a064aaf141
SHA256bb0eaf689b0f98915579817e8777dfe50a01aa40b342f46759241e18581db379
SHA5128f290f9c6a88703a4aa3c9a003e0e9db53402dac7ef455bbdd84c1d807079943b3c23a24be7b5cc00ccd33e8812bda62df3db24d3e994fa6e446d73c4c285800
-
Filesize
72KB
MD59b485ea9fae6a48a9cbcc38230087296
SHA1b126d455da673d4a8ea49b5efea714a064aaf141
SHA256bb0eaf689b0f98915579817e8777dfe50a01aa40b342f46759241e18581db379
SHA5128f290f9c6a88703a4aa3c9a003e0e9db53402dac7ef455bbdd84c1d807079943b3c23a24be7b5cc00ccd33e8812bda62df3db24d3e994fa6e446d73c4c285800
-
Filesize
72KB
MD5fb9113f9a49efb45c9991e6519008300
SHA175b9c05c02e0fe2ba7bd7cd06ce49aaeea24f7b2
SHA25645e7be34d82da4dded5d4415e7a4e983e676698d57a61ffb0bc98e41f7ca79ac
SHA512b90f6831f33e89675de2dd45a1f1cda60ec85a78e09df15d5355e74e465e2c743b0512d0a1d42e482894cf63773ab9fef12b9161b9b9b9a9a4704d8da2cd14e7
-
Filesize
72KB
MD5fb9113f9a49efb45c9991e6519008300
SHA175b9c05c02e0fe2ba7bd7cd06ce49aaeea24f7b2
SHA25645e7be34d82da4dded5d4415e7a4e983e676698d57a61ffb0bc98e41f7ca79ac
SHA512b90f6831f33e89675de2dd45a1f1cda60ec85a78e09df15d5355e74e465e2c743b0512d0a1d42e482894cf63773ab9fef12b9161b9b9b9a9a4704d8da2cd14e7
-
Filesize
72KB
MD54bc6857b49715eec5c2b2fc43377480d
SHA118e322081d800faf20c430389703c779744421a1
SHA2565603b9ffb9ba24a9a82ccdd06eeac2a2f8bb26e51cc619526b9d17d4f7aa43f2
SHA5126d1bb65f0221e4ce3d7231b6b107d1d7e4713030603c733f1fab8d3a58f7c5115a0ffda8571dfc11a6a04ad3530f79536f13afc2c314505f9b15515ffe88ebf5
-
Filesize
72KB
MD54bc6857b49715eec5c2b2fc43377480d
SHA118e322081d800faf20c430389703c779744421a1
SHA2565603b9ffb9ba24a9a82ccdd06eeac2a2f8bb26e51cc619526b9d17d4f7aa43f2
SHA5126d1bb65f0221e4ce3d7231b6b107d1d7e4713030603c733f1fab8d3a58f7c5115a0ffda8571dfc11a6a04ad3530f79536f13afc2c314505f9b15515ffe88ebf5
-
Filesize
72KB
MD5bb728c57d078e54e58e1c6d436313ea0
SHA1678aa09e53b1eb602fd8139ad141896d9f9fcec5
SHA256f6615eeb0ba170a3ed1b72d1c2ff910d8c64f0d2c235fa98692ee4bd479fbb7c
SHA51206decf87d861d1c81a6471d45dfc47f624914830ce23a51d44650230d461b201e62252cb45c602cc51fb537e734b8f648181bcb9bb845f99adfe17fca73f6217
-
Filesize
72KB
MD5bb728c57d078e54e58e1c6d436313ea0
SHA1678aa09e53b1eb602fd8139ad141896d9f9fcec5
SHA256f6615eeb0ba170a3ed1b72d1c2ff910d8c64f0d2c235fa98692ee4bd479fbb7c
SHA51206decf87d861d1c81a6471d45dfc47f624914830ce23a51d44650230d461b201e62252cb45c602cc51fb537e734b8f648181bcb9bb845f99adfe17fca73f6217
-
Filesize
72KB
MD59d559b62119163d75283e6c773bec2c3
SHA198b3e215b78a0fc25ee896d378e121dc81ec2fb8
SHA2563b01377113f3ca0c50d53991d698a0e538b12da5a7838e6e17039722314091e4
SHA5124bcb49f8aeb14e543261c8e197d9649c369c498acf37d2f220a0d23fc3e1c2a61474dab24d302e1c0fb806ca3f4ee32fb41e223dafee97d2d080376627863537
-
Filesize
72KB
MD59d559b62119163d75283e6c773bec2c3
SHA198b3e215b78a0fc25ee896d378e121dc81ec2fb8
SHA2563b01377113f3ca0c50d53991d698a0e538b12da5a7838e6e17039722314091e4
SHA5124bcb49f8aeb14e543261c8e197d9649c369c498acf37d2f220a0d23fc3e1c2a61474dab24d302e1c0fb806ca3f4ee32fb41e223dafee97d2d080376627863537
-
Filesize
72KB
MD59b485ea9fae6a48a9cbcc38230087296
SHA1b126d455da673d4a8ea49b5efea714a064aaf141
SHA256bb0eaf689b0f98915579817e8777dfe50a01aa40b342f46759241e18581db379
SHA5128f290f9c6a88703a4aa3c9a003e0e9db53402dac7ef455bbdd84c1d807079943b3c23a24be7b5cc00ccd33e8812bda62df3db24d3e994fa6e446d73c4c285800
-
Filesize
72KB
MD59b485ea9fae6a48a9cbcc38230087296
SHA1b126d455da673d4a8ea49b5efea714a064aaf141
SHA256bb0eaf689b0f98915579817e8777dfe50a01aa40b342f46759241e18581db379
SHA5128f290f9c6a88703a4aa3c9a003e0e9db53402dac7ef455bbdd84c1d807079943b3c23a24be7b5cc00ccd33e8812bda62df3db24d3e994fa6e446d73c4c285800
-
Filesize
72KB
MD571beb0553f2cd3f99020ae20a32afd27
SHA1b898f15476cdb549a557d3e972632f5948f375c3
SHA2563d0b0098c8fa5fa74317041542a8166c9cb991f2a573cce376cd46bb541f3efd
SHA5120c0afbf8b1cc46cb58f3ebf51d1b6db575cf78ff44de891b771c40e1d7b4bbb725f04f8851ce566b094eeff9f4b6719c4731d5b6391ee1268575bc5c15d709b1
-
Filesize
72KB
MD571beb0553f2cd3f99020ae20a32afd27
SHA1b898f15476cdb549a557d3e972632f5948f375c3
SHA2563d0b0098c8fa5fa74317041542a8166c9cb991f2a573cce376cd46bb541f3efd
SHA5120c0afbf8b1cc46cb58f3ebf51d1b6db575cf78ff44de891b771c40e1d7b4bbb725f04f8851ce566b094eeff9f4b6719c4731d5b6391ee1268575bc5c15d709b1
-
Filesize
72KB
MD50d2867b17eb59186880a10da77cffe01
SHA1e444d3698ae8936fc46db7d186d7839ad8d049fe
SHA2563a20c43b37ea1415c7cac9c6ea1eaf2cfd22d3724baa41e956f0a3ac8ac20c53
SHA512256aab3c47ea6ca12e2b117985f3d3ab215846a282ec7d321fa44c72cbb69543ec234a8ff98531084c886ee415b80991a88e26807a187357bd592c935b25ff66
-
Filesize
72KB
MD50d2867b17eb59186880a10da77cffe01
SHA1e444d3698ae8936fc46db7d186d7839ad8d049fe
SHA2563a20c43b37ea1415c7cac9c6ea1eaf2cfd22d3724baa41e956f0a3ac8ac20c53
SHA512256aab3c47ea6ca12e2b117985f3d3ab215846a282ec7d321fa44c72cbb69543ec234a8ff98531084c886ee415b80991a88e26807a187357bd592c935b25ff66
-
Filesize
72KB
MD5236cc8536e1b0a2a32d133f9b2f81a13
SHA14df352050792a05afab6090ad0a8f186b3c9ce39
SHA256f9b1e3be4c8bdb68f0835786f7f19ffc54bfa8d1bce99dc6316e944a9c9d0f49
SHA5125b3871c1d325d86d457a79e76e919f802df16f41e7f3aa8c183bed7105e2d3568e469d97e1585801d606180aca197acf3bfacce421c71f2e865b532b8d49998d
-
Filesize
72KB
MD5236cc8536e1b0a2a32d133f9b2f81a13
SHA14df352050792a05afab6090ad0a8f186b3c9ce39
SHA256f9b1e3be4c8bdb68f0835786f7f19ffc54bfa8d1bce99dc6316e944a9c9d0f49
SHA5125b3871c1d325d86d457a79e76e919f802df16f41e7f3aa8c183bed7105e2d3568e469d97e1585801d606180aca197acf3bfacce421c71f2e865b532b8d49998d
-
Filesize
72KB
MD511b57b5980e6baf9edffab4c81d396b6
SHA1441cfa260622d4abda7357bef122688222612974
SHA256ae50c759f1f0702b8fa304233e00b447942e3299debc7190c85745c2c7a736c9
SHA512690a7221556c71608efcd77fb170b422f3e4d5b84694f50ff3a0fbc16ce29c010a6e3781d9d4b537f47b6b0a0c755fc7e2c3d93c8bdb2f9c7bdad86364292969
-
Filesize
72KB
MD511b57b5980e6baf9edffab4c81d396b6
SHA1441cfa260622d4abda7357bef122688222612974
SHA256ae50c759f1f0702b8fa304233e00b447942e3299debc7190c85745c2c7a736c9
SHA512690a7221556c71608efcd77fb170b422f3e4d5b84694f50ff3a0fbc16ce29c010a6e3781d9d4b537f47b6b0a0c755fc7e2c3d93c8bdb2f9c7bdad86364292969
-
Filesize
72KB
MD5c19b7d86818f86d8f545286de7d8cc50
SHA19e1c4abf0b8e8042f993e712a2bbf1ea49508a40
SHA2565151462f3416432e567b628349742d2d1b716e75ce2bba126ac958efcd97e1cb
SHA5125df27c81bba618d677780c84dbd4c7773e00c9b90c3512ad40493d288d4368b719b5fc4adc18689ac4ab8ca91cb5460a1b10b795709931622ba776e37aa42ac0
-
Filesize
72KB
MD5c19b7d86818f86d8f545286de7d8cc50
SHA19e1c4abf0b8e8042f993e712a2bbf1ea49508a40
SHA2565151462f3416432e567b628349742d2d1b716e75ce2bba126ac958efcd97e1cb
SHA5125df27c81bba618d677780c84dbd4c7773e00c9b90c3512ad40493d288d4368b719b5fc4adc18689ac4ab8ca91cb5460a1b10b795709931622ba776e37aa42ac0
-
Filesize
72KB
MD56bf65262316c4d8f804e4b6c5f2afe59
SHA184b204041cbcdf834c6a1a09a0db373380376329
SHA256ae9fe46f1ede21f3114737eea3a51fc3b324a7531911a7460f197916e8f82cd6
SHA5123d7db95480bb29399a327dd68b6d5f701ba3060af41ed975b1c9235c32d7b4a85470413555ac7fdc2abaf83c41e8229d44016fd84a03a2656e3d5d21db5b49d0
-
Filesize
72KB
MD56bf65262316c4d8f804e4b6c5f2afe59
SHA184b204041cbcdf834c6a1a09a0db373380376329
SHA256ae9fe46f1ede21f3114737eea3a51fc3b324a7531911a7460f197916e8f82cd6
SHA5123d7db95480bb29399a327dd68b6d5f701ba3060af41ed975b1c9235c32d7b4a85470413555ac7fdc2abaf83c41e8229d44016fd84a03a2656e3d5d21db5b49d0
-
Filesize
72KB
MD5168a06e48a805839909ae522609be42c
SHA106ef854e96511f3122449b805ed9e841ae45c79a
SHA256ee4415fe8187730e5bb36e3d6a935c01e4ad5b64efa3a25f8d2fbf91287fb52a
SHA512b5fdeba0e63b95f1bf4278464ed1f4a96b79c2327126c81fb6f262cf446616a99e331a85e83e45c82b6bb9ee3958df7f17ab82d2443dbb58dc4864dd3d6d14f1
-
Filesize
72KB
MD5168a06e48a805839909ae522609be42c
SHA106ef854e96511f3122449b805ed9e841ae45c79a
SHA256ee4415fe8187730e5bb36e3d6a935c01e4ad5b64efa3a25f8d2fbf91287fb52a
SHA512b5fdeba0e63b95f1bf4278464ed1f4a96b79c2327126c81fb6f262cf446616a99e331a85e83e45c82b6bb9ee3958df7f17ab82d2443dbb58dc4864dd3d6d14f1
-
Filesize
72KB
MD50a34f0a743a66fead85d153afd6d7b32
SHA17b2387cca4236ba2e8dc207b6416205aaae12b8f
SHA256ce5a2c5c6003a0f09cddd8622738101f423d24298b35174953d66bc3226e07f4
SHA512fcb4969ae01dbf2e6f51a59179de23dbdaff5ca74ada7ac9d5dc1a66c1004d0d33a79e379f73029efc49978fc83b2549dd891341e545c213686e64da7dc8b78f
-
Filesize
72KB
MD50a34f0a743a66fead85d153afd6d7b32
SHA17b2387cca4236ba2e8dc207b6416205aaae12b8f
SHA256ce5a2c5c6003a0f09cddd8622738101f423d24298b35174953d66bc3226e07f4
SHA512fcb4969ae01dbf2e6f51a59179de23dbdaff5ca74ada7ac9d5dc1a66c1004d0d33a79e379f73029efc49978fc83b2549dd891341e545c213686e64da7dc8b78f
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5355db2adb8ea02e5af7e306c650b0eb4
SHA1e7b298688a440383bb9735cfd3948eadc89048cc
SHA256af9f7c5dcf469e85c6e6cc6a533d80b63088f9fc2b798aa47a22239630e50d03
SHA512cd7d47490cf463c3c8aa58cce44d37b2cf4b2b94a8529b71a0538d27e21f9c02b66c53294adc3f3c0a1301bb54083823db570f15a0eac31a19d0d7f42df254fe
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5355db2adb8ea02e5af7e306c650b0eb4
SHA1e7b298688a440383bb9735cfd3948eadc89048cc
SHA256af9f7c5dcf469e85c6e6cc6a533d80b63088f9fc2b798aa47a22239630e50d03
SHA512cd7d47490cf463c3c8aa58cce44d37b2cf4b2b94a8529b71a0538d27e21f9c02b66c53294adc3f3c0a1301bb54083823db570f15a0eac31a19d0d7f42df254fe
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5355db2adb8ea02e5af7e306c650b0eb4
SHA1e7b298688a440383bb9735cfd3948eadc89048cc
SHA256af9f7c5dcf469e85c6e6cc6a533d80b63088f9fc2b798aa47a22239630e50d03
SHA512cd7d47490cf463c3c8aa58cce44d37b2cf4b2b94a8529b71a0538d27e21f9c02b66c53294adc3f3c0a1301bb54083823db570f15a0eac31a19d0d7f42df254fe
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5355db2adb8ea02e5af7e306c650b0eb4
SHA1e7b298688a440383bb9735cfd3948eadc89048cc
SHA256af9f7c5dcf469e85c6e6cc6a533d80b63088f9fc2b798aa47a22239630e50d03
SHA512cd7d47490cf463c3c8aa58cce44d37b2cf4b2b94a8529b71a0538d27e21f9c02b66c53294adc3f3c0a1301bb54083823db570f15a0eac31a19d0d7f42df254fe
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
Filesize
72KB
MD57e5fb53d6fd5de65f141962c6c1b008c
SHA1a5706029da41eac6253c4ded50199994d01a9bd1
SHA2568e9cbd09f29e366955a060c39d8fb8fef317cfc94a7c0614fa8130fc2a17a36f
SHA512efdb48b28e512c501fa7f5479f99932c5a16c2ce525b92072de02a47290481fc773ecc41e97f2c313baddfe19030322e821213c5279fc3116f7a9e05dae5b658
-
Filesize
72KB
MD5355db2adb8ea02e5af7e306c650b0eb4
SHA1e7b298688a440383bb9735cfd3948eadc89048cc
SHA256af9f7c5dcf469e85c6e6cc6a533d80b63088f9fc2b798aa47a22239630e50d03
SHA512cd7d47490cf463c3c8aa58cce44d37b2cf4b2b94a8529b71a0538d27e21f9c02b66c53294adc3f3c0a1301bb54083823db570f15a0eac31a19d0d7f42df254fe
-
Filesize
72KB
MD5355db2adb8ea02e5af7e306c650b0eb4
SHA1e7b298688a440383bb9735cfd3948eadc89048cc
SHA256af9f7c5dcf469e85c6e6cc6a533d80b63088f9fc2b798aa47a22239630e50d03
SHA512cd7d47490cf463c3c8aa58cce44d37b2cf4b2b94a8529b71a0538d27e21f9c02b66c53294adc3f3c0a1301bb54083823db570f15a0eac31a19d0d7f42df254fe
-
Filesize
72KB
MD5bf2668785a904c5b3322ee473190295a
SHA12a726de6631254a996559dbb0b7b0338b372034f
SHA256786898ddbe3892a7ffa8fcdcacd6698babba81a50d0589dbdaf72fe01653babf
SHA512beca259eefb8acb87dc34200be54cfd4f10b0d1df330705b67b5d986c4eb8470d4827c73905184607672034921a5cb798dcc6daaf758cf4c86832cce39b051d8
-
Filesize
72KB
MD5bf2668785a904c5b3322ee473190295a
SHA12a726de6631254a996559dbb0b7b0338b372034f
SHA256786898ddbe3892a7ffa8fcdcacd6698babba81a50d0589dbdaf72fe01653babf
SHA512beca259eefb8acb87dc34200be54cfd4f10b0d1df330705b67b5d986c4eb8470d4827c73905184607672034921a5cb798dcc6daaf758cf4c86832cce39b051d8
-
Filesize
72KB
MD53e134be8ca391a3df3f9c2a4af705645
SHA1e356326d9bd0db0fe12bae4b86ab698105fc2cd4
SHA256f7ffa9e37273436782b7c6de0da5791f709482a3b0d3b2c0b04e8808cef6e44b
SHA512142ee7d8b87618cfc8a938d04dd9c528a5e67d21d7be21cb6de85a48acae9003d900083d068cfc0f8394f86eec566782fe60022fb1c296aab31d953219382500
-
Filesize
72KB
MD53e134be8ca391a3df3f9c2a4af705645
SHA1e356326d9bd0db0fe12bae4b86ab698105fc2cd4
SHA256f7ffa9e37273436782b7c6de0da5791f709482a3b0d3b2c0b04e8808cef6e44b
SHA512142ee7d8b87618cfc8a938d04dd9c528a5e67d21d7be21cb6de85a48acae9003d900083d068cfc0f8394f86eec566782fe60022fb1c296aab31d953219382500
-
Filesize
72KB
MD5dce2e14ab022ea29f221e4c5f273c44d
SHA1fa0ae5afadc3b7ff29161f3b035b326fe163addb
SHA256c6c6803e7d63796f0de2245042728b60f72c14d4edfac02aa5b4776c0dcc02c9
SHA5127ac73073a1777da765cdf87cf1d259c9fcbcd21a895a84be98f4a9bcf1e508716c5d5d5c14864ebf392bf45fa6a9bae915a179d33fc8a49f6c633364165a7b69
-
Filesize
72KB
MD5dce2e14ab022ea29f221e4c5f273c44d
SHA1fa0ae5afadc3b7ff29161f3b035b326fe163addb
SHA256c6c6803e7d63796f0de2245042728b60f72c14d4edfac02aa5b4776c0dcc02c9
SHA5127ac73073a1777da765cdf87cf1d259c9fcbcd21a895a84be98f4a9bcf1e508716c5d5d5c14864ebf392bf45fa6a9bae915a179d33fc8a49f6c633364165a7b69
-
Filesize
72KB
MD5a033b73e7826fc7f699620aa17d56634
SHA181f8e0263a267e672b30feccde344fdcd71389be
SHA256d393de8b3c398eb6deae8f2cc9708a18fee2ee6977f9273120bba9419270b540
SHA5121c39c0945efecd809199f117396e91d1e946f61b828dc7fb2515b94cb566608ed2bc327e193d862c4e1f877dd12d362862f133b660ff76167c8b9e0501fd2ed7
-
Filesize
72KB
MD5a033b73e7826fc7f699620aa17d56634
SHA181f8e0263a267e672b30feccde344fdcd71389be
SHA256d393de8b3c398eb6deae8f2cc9708a18fee2ee6977f9273120bba9419270b540
SHA5121c39c0945efecd809199f117396e91d1e946f61b828dc7fb2515b94cb566608ed2bc327e193d862c4e1f877dd12d362862f133b660ff76167c8b9e0501fd2ed7
-
Filesize
72KB
MD5356c9b55a6b745eb90160fc767e10a5b
SHA15664cc3be12f37d583a8cce179ce43e6b1a0f298
SHA256743fdd5ac9d092473866403ffd9f0de092aab6fc36c6c5556c6da3f6db6709e4
SHA512050fe110a92434101c22df985a7b53158b989876e49d26f11d7523971ca3c418244db390776c51449016913ea98e197e3dbe446e514bf68a51f4e91978ced7e5
-
Filesize
72KB
MD5356c9b55a6b745eb90160fc767e10a5b
SHA15664cc3be12f37d583a8cce179ce43e6b1a0f298
SHA256743fdd5ac9d092473866403ffd9f0de092aab6fc36c6c5556c6da3f6db6709e4
SHA512050fe110a92434101c22df985a7b53158b989876e49d26f11d7523971ca3c418244db390776c51449016913ea98e197e3dbe446e514bf68a51f4e91978ced7e5