Analysis
-
max time kernel
153s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe
Resource
win10v2004-20221111-en
General
-
Target
7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe
-
Size
72KB
-
MD5
2d30cf9977db65796c220d433f8bdbe3
-
SHA1
fa07de0af60caa06f00fbec465357a4b6962303b
-
SHA256
7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433
-
SHA512
d2acb3c979d9447a94d7e4081def81236d40b8d248bee7667954a4510afa0ac9ea8d8cfb7ae16712397d365a62b73ed2127eaa570a40ffdee33576b0055b912e
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf22:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrK
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 5044 backup.exe 832 backup.exe 3332 backup.exe 5076 backup.exe 208 backup.exe 3892 backup.exe 3776 backup.exe 4124 backup.exe 872 backup.exe 1136 backup.exe 4080 backup.exe 1800 backup.exe 3468 backup.exe 3512 backup.exe 1584 backup.exe 1824 update.exe 1664 backup.exe 1832 backup.exe 1808 backup.exe 2948 backup.exe 2520 backup.exe 3536 backup.exe 536 backup.exe 4796 backup.exe 4516 backup.exe 1920 backup.exe 2820 backup.exe 2072 backup.exe 4016 backup.exe 2332 backup.exe 3152 backup.exe 3116 backup.exe 2756 backup.exe 2252 backup.exe 4808 backup.exe 4164 backup.exe 4004 backup.exe 2684 backup.exe 1680 backup.exe 2208 backup.exe 4716 backup.exe 4396 backup.exe 3784 backup.exe 3820 System Restore.exe 4240 backup.exe 3096 backup.exe 1712 backup.exe 4236 backup.exe 4540 backup.exe 3468 backup.exe 4180 backup.exe 4692 backup.exe 2552 backup.exe 2796 backup.exe 2468 backup.exe 4916 backup.exe 3684 backup.exe 4784 backup.exe 1808 backup.exe 452 backup.exe 3232 backup.exe 400 data.exe 2936 backup.exe 4876 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe data.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\System Restore.exe update.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\Office16\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe data.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Policies\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe update.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\data.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 5044 backup.exe 832 backup.exe 3332 backup.exe 5076 backup.exe 208 backup.exe 3892 backup.exe 4124 backup.exe 3776 backup.exe 872 backup.exe 1136 backup.exe 4080 backup.exe 1800 backup.exe 3468 backup.exe 3512 backup.exe 1584 backup.exe 1824 update.exe 1664 backup.exe 1832 backup.exe 1808 backup.exe 2948 backup.exe 2520 backup.exe 3536 backup.exe 536 backup.exe 4796 backup.exe 4516 backup.exe 1920 backup.exe 2820 backup.exe 2072 backup.exe 4016 backup.exe 2332 backup.exe 2252 backup.exe 2756 backup.exe 4808 backup.exe 3152 backup.exe 3116 backup.exe 4164 backup.exe 4004 backup.exe 2684 backup.exe 1680 backup.exe 2208 backup.exe 4716 backup.exe 4396 backup.exe 3784 backup.exe 3820 System Restore.exe 3096 backup.exe 4236 backup.exe 1712 backup.exe 4240 backup.exe 4540 backup.exe 3468 backup.exe 4180 backup.exe 2796 backup.exe 2552 backup.exe 4692 backup.exe 2468 backup.exe 4916 backup.exe 3684 backup.exe 1808 backup.exe 3232 backup.exe 4784 backup.exe 452 backup.exe 400 data.exe 4876 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 5044 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 82 PID 4292 wrote to memory of 5044 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 82 PID 4292 wrote to memory of 5044 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 82 PID 4292 wrote to memory of 832 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 85 PID 4292 wrote to memory of 832 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 85 PID 4292 wrote to memory of 832 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 85 PID 4292 wrote to memory of 3332 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 86 PID 4292 wrote to memory of 3332 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 86 PID 4292 wrote to memory of 3332 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 86 PID 5044 wrote to memory of 5076 5044 backup.exe 87 PID 5044 wrote to memory of 5076 5044 backup.exe 87 PID 5044 wrote to memory of 5076 5044 backup.exe 87 PID 5076 wrote to memory of 208 5076 backup.exe 88 PID 5076 wrote to memory of 208 5076 backup.exe 88 PID 5076 wrote to memory of 208 5076 backup.exe 88 PID 4292 wrote to memory of 3892 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 89 PID 4292 wrote to memory of 3892 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 89 PID 4292 wrote to memory of 3892 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 89 PID 5076 wrote to memory of 3776 5076 backup.exe 90 PID 5076 wrote to memory of 3776 5076 backup.exe 90 PID 5076 wrote to memory of 3776 5076 backup.exe 90 PID 4292 wrote to memory of 4124 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 91 PID 4292 wrote to memory of 4124 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 91 PID 4292 wrote to memory of 4124 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 91 PID 4292 wrote to memory of 872 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 92 PID 4292 wrote to memory of 872 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 92 PID 4292 wrote to memory of 872 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 92 PID 5076 wrote to memory of 1136 5076 backup.exe 93 PID 5076 wrote to memory of 1136 5076 backup.exe 93 PID 5076 wrote to memory of 1136 5076 backup.exe 93 PID 4292 wrote to memory of 4080 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 94 PID 4292 wrote to memory of 4080 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 94 PID 4292 wrote to memory of 4080 4292 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe 94 PID 1136 wrote to memory of 1800 1136 backup.exe 95 PID 1136 wrote to memory of 1800 1136 backup.exe 95 PID 1136 wrote to memory of 1800 1136 backup.exe 95 PID 1800 wrote to memory of 3468 1800 backup.exe 96 PID 1800 wrote to memory of 3468 1800 backup.exe 96 PID 1800 wrote to memory of 3468 1800 backup.exe 96 PID 1136 wrote to memory of 3512 1136 backup.exe 97 PID 1136 wrote to memory of 3512 1136 backup.exe 97 PID 1136 wrote to memory of 3512 1136 backup.exe 97 PID 3512 wrote to memory of 1584 3512 backup.exe 98 PID 3512 wrote to memory of 1584 3512 backup.exe 98 PID 3512 wrote to memory of 1584 3512 backup.exe 98 PID 3512 wrote to memory of 1824 3512 backup.exe 99 PID 3512 wrote to memory of 1824 3512 backup.exe 99 PID 3512 wrote to memory of 1824 3512 backup.exe 99 PID 1824 wrote to memory of 1664 1824 update.exe 100 PID 1824 wrote to memory of 1664 1824 update.exe 100 PID 1824 wrote to memory of 1664 1824 update.exe 100 PID 1824 wrote to memory of 1832 1824 update.exe 101 PID 1824 wrote to memory of 1832 1824 update.exe 101 PID 1824 wrote to memory of 1832 1824 update.exe 101 PID 1832 wrote to memory of 1808 1832 backup.exe 102 PID 1832 wrote to memory of 1808 1832 backup.exe 102 PID 1832 wrote to memory of 1808 1832 backup.exe 102 PID 1832 wrote to memory of 2948 1832 backup.exe 103 PID 1832 wrote to memory of 2948 1832 backup.exe 103 PID 1832 wrote to memory of 2948 1832 backup.exe 103 PID 1832 wrote to memory of 2520 1832 backup.exe 104 PID 1832 wrote to memory of 2520 1832 backup.exe 104 PID 1832 wrote to memory of 2520 1832 backup.exe 104 PID 1832 wrote to memory of 3536 1832 backup.exe 105 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe"C:\Users\Admin\AppData\Local\Temp\7b6d89a8684b2cbdec13a3146da9ede67527f248c0dd4e8f714ad7fd62450433.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\1612738176\backup.exeC:\Users\Admin\AppData\Local\Temp\1612738176\backup.exe C:\Users\Admin\AppData\Local\Temp\1612738176\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:208
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3776
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1136 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1800 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3468
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
C:\Program Files\Common Files\microsoft shared\update.exe"C:\Program Files\Common Files\microsoft shared\update.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1664
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2948
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2520
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4796
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4516
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2820
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2072
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4016
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3820 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4540
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4876
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\update.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\update.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵PID:2820
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
PID:3244
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\9⤵PID:4172
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\9⤵PID:4020
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\9⤵PID:4696
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
PID:1700
-
-
-
C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\he-IL\8⤵
- System policy modification
PID:1804
-
-
C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2792
-
-
C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hu-HU\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:5068
-
-
C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\8⤵PID:1248
-
-
C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\it-IT\8⤵PID:4004
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2252 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4240
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3468
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4916
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3232
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- System policy modification
PID:3532
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- System policy modification
PID:1580 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2316
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵PID:4468
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\System Restore.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\System Restore.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
PID:4200
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Disables RegEdit via registry modification
PID:1724
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\System Restore.exe"C:\Program Files\Common Files\microsoft shared\TextConv\System Restore.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Disables RegEdit via registry modification
PID:2864 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵PID:2396
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1960 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵PID:4532
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4808
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4164 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4396 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:452
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Executes dropped EXE
PID:2936
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4684
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Disables RegEdit via registry modification
PID:1312
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:672
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:2000
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- System policy modification
PID:1892
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:740
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Disables RegEdit via registry modification
PID:1512
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵
- Modifies visibility of file extensions in Explorer
PID:1304
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- Disables RegEdit via registry modification
PID:3364
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3116 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3784 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3096 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4180
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3684
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:400
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1020
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4972 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- Drops file in Program Files directory
- System policy modification
PID:2972 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵
- Modifies visibility of file extensions in Explorer
PID:3164
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Modifies visibility of file extensions in Explorer
PID:3340
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Drops file in Program Files directory
PID:3528 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:460
-
-
C:\Program Files\Internet Explorer\en-US\System Restore.exe"C:\Program Files\Internet Explorer\en-US\System Restore.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:824
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1920
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:5020
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2452
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:2248
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
PID:1068
-
-
-
C:\Program Files\Java\data.exe"C:\Program Files\Java\data.exe" C:\Program Files\Java\5⤵
- Drops file in Program Files directory
PID:1244 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4868 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Disables RegEdit via registry modification
PID:3952
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1964 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\data.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\data.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵PID:2468
-
-
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3880 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵PID:4652
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵
- Disables RegEdit via registry modification
PID:3280
-
-
C:\Program Files\Microsoft Office\root\update.exe"C:\Program Files\Microsoft Office\root\update.exe" C:\Program Files\Microsoft Office\root\6⤵PID:4476
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3152 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4004 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4716 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4236
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4692 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4784 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵PID:4748
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Drops file in Program Files directory
PID:2228 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- System policy modification
PID:2140
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Disables RegEdit via registry modification
PID:4512
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:764
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
PID:4740 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- Disables RegEdit via registry modification
PID:1908
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
PID:112
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Drops file in Program Files directory
PID:3416 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3284 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:4592
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- Modifies visibility of file extensions in Explorer
PID:2296
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵PID:2972
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:2132 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\8⤵
- System policy modification
PID:832
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Drops file in Program Files directory
- System policy modification
PID:5036 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Drops file in Program Files directory
- System policy modification
PID:2680 -
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵PID:4972
-
-
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
PID:4680
-
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1076 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2384
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:4208
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
PID:4744
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:4500
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2704 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
PID:4648
-
-
C:\Users\Admin\Contacts\System Restore.exe"C:\Users\Admin\Contacts\System Restore.exe" C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
PID:2440
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:4216
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- System policy modification
PID:2788
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:220
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:5040
-
-
-
C:\Users\Public\System Restore.exe"C:\Users\Public\System Restore.exe" C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
PID:1800 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2160
-
-
C:\Users\Public\Downloads\update.exeC:\Users\Public\Downloads\update.exe C:\Users\Public\Downloads\6⤵PID:3480
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- System policy modification
PID:3564
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- System policy modification
PID:5064
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵PID:4720
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:700 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- System policy modification
PID:4920
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Drops file in Windows directory
PID:4396 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- System policy modification
PID:2812
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\1⤵PID:3432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD579b0ad941c59c8891bccea436c19863e
SHA1efc94f606bd67393dc4179d64064b0e412a526d7
SHA2563ee063f9a6bd76e5d7e1586d29eac26774ab69ab1577e226cc811e4aaa8e80f3
SHA51240d41239e4126f4e0eec4e5536ddd8fa44bd8ba1619b0d5fdb426e0eb61d386101da7839c41959f924d27dc0d0e1a583e619fb11bfcad2a707fb6759607a43ce
-
Filesize
72KB
MD579b0ad941c59c8891bccea436c19863e
SHA1efc94f606bd67393dc4179d64064b0e412a526d7
SHA2563ee063f9a6bd76e5d7e1586d29eac26774ab69ab1577e226cc811e4aaa8e80f3
SHA51240d41239e4126f4e0eec4e5536ddd8fa44bd8ba1619b0d5fdb426e0eb61d386101da7839c41959f924d27dc0d0e1a583e619fb11bfcad2a707fb6759607a43ce
-
Filesize
72KB
MD5d4a14909c2ad0f486c05520fb66a0431
SHA1fd7f1beac4bd4446d06a1d54ad20fa2bddd30409
SHA256f18930c19c26c45f2afb0c779aed0308d9fc142ae52cb92dbbcbe57efffc8833
SHA5121a6c1fcde8a18548137734e67a4107929f9ab59cdd778c4fa1991d39626afbea8711fac41a114e6a7de1b3f8fa281fddc466a8f27917cc62533b4701c604782f
-
Filesize
72KB
MD5b20276816971542efbc4ba87cbb55bf5
SHA1bc0e64d790d3563c836c5bb5c7a4979713b51010
SHA25699880e6b4b0214375100c87dccb903ed1e500152cb781ccfb327bfa7438bcd2c
SHA5127b7954e112ea96f63edf4fe1b23bd58c55eecbc6fd20a75f6d6b1572c365a9ab2fcb54b631bc01d5fb5c0016cd8caa65dcd25d6e287b31e3715741100533241e
-
Filesize
72KB
MD5b20276816971542efbc4ba87cbb55bf5
SHA1bc0e64d790d3563c836c5bb5c7a4979713b51010
SHA25699880e6b4b0214375100c87dccb903ed1e500152cb781ccfb327bfa7438bcd2c
SHA5127b7954e112ea96f63edf4fe1b23bd58c55eecbc6fd20a75f6d6b1572c365a9ab2fcb54b631bc01d5fb5c0016cd8caa65dcd25d6e287b31e3715741100533241e
-
Filesize
72KB
MD5de64d99a3f3605e79c62c5d3f2433419
SHA135555bcd8d0803ae2aa255ab0c057085789a1cb5
SHA2567e47ae5c46c577e977bca6a621a5267b0048c08de93f65d5fad1bba757c81a03
SHA51285974005182eec8d6d081e8235cfee12f751b18025cb992563176ea84134facd909fd88a553ba867b7b326fadd1a325f62191113a62c7381aa71f5ab8cddb0f5
-
Filesize
72KB
MD5de64d99a3f3605e79c62c5d3f2433419
SHA135555bcd8d0803ae2aa255ab0c057085789a1cb5
SHA2567e47ae5c46c577e977bca6a621a5267b0048c08de93f65d5fad1bba757c81a03
SHA51285974005182eec8d6d081e8235cfee12f751b18025cb992563176ea84134facd909fd88a553ba867b7b326fadd1a325f62191113a62c7381aa71f5ab8cddb0f5
-
Filesize
72KB
MD5bb146f32a5bd958481f70495b2c5ae35
SHA10afba801bcb9d17422ac21df90c79ad88bac37f6
SHA256c53d631eabadae8aa0908236e33b5e0315bac0c55d326822d623a96c167bcd9c
SHA5124f9f08b9a560fb93713800f16bc4ab177092fe1ae3c3992a94a2bd737157262d4c3ce44ca00e9cb470b88c61a1a4affdd06eb190e409ff428b0f14401b09b691
-
Filesize
72KB
MD5bb146f32a5bd958481f70495b2c5ae35
SHA10afba801bcb9d17422ac21df90c79ad88bac37f6
SHA256c53d631eabadae8aa0908236e33b5e0315bac0c55d326822d623a96c167bcd9c
SHA5124f9f08b9a560fb93713800f16bc4ab177092fe1ae3c3992a94a2bd737157262d4c3ce44ca00e9cb470b88c61a1a4affdd06eb190e409ff428b0f14401b09b691
-
Filesize
72KB
MD5812eaac31901e0b99a3275def48f3548
SHA1c87a708e81473df45d0fa7c4ed32797d0722f1cc
SHA256701bc141def24b619f402468838c00a49895100a2924a65e851db42cd5b47e98
SHA512a2ed96e9fc56e5beb1b988a7ebac2d2ed2623e136aa94073d38d6ada7ce474ac5b92ef53df0a33af94652adc4d34c1bab2cd09eadb90b11b168fe3024ee8eb9e
-
Filesize
72KB
MD5812eaac31901e0b99a3275def48f3548
SHA1c87a708e81473df45d0fa7c4ed32797d0722f1cc
SHA256701bc141def24b619f402468838c00a49895100a2924a65e851db42cd5b47e98
SHA512a2ed96e9fc56e5beb1b988a7ebac2d2ed2623e136aa94073d38d6ada7ce474ac5b92ef53df0a33af94652adc4d34c1bab2cd09eadb90b11b168fe3024ee8eb9e
-
Filesize
72KB
MD5f409ac8bbabfaea48714c682f6bec218
SHA11a35ec5ebbabe9b1bf8394e1725853bad7a8e4c3
SHA25635da47f9ac36ffdfdd3a2d48353b90d26a5f72fa6bbe9c40a8aecf4326503271
SHA512ec24e542923a4e7889e252a6bc9aea33c056019ee80d1b0cbbe5f78e0b0ddbdf9b276bad095209b9fd256c1e770a3020d96cd2fe946be9f02cf31935a16a66a4
-
Filesize
72KB
MD5f409ac8bbabfaea48714c682f6bec218
SHA11a35ec5ebbabe9b1bf8394e1725853bad7a8e4c3
SHA25635da47f9ac36ffdfdd3a2d48353b90d26a5f72fa6bbe9c40a8aecf4326503271
SHA512ec24e542923a4e7889e252a6bc9aea33c056019ee80d1b0cbbe5f78e0b0ddbdf9b276bad095209b9fd256c1e770a3020d96cd2fe946be9f02cf31935a16a66a4
-
Filesize
72KB
MD5735f58bbe7f7996a0c40b94e48fcc47c
SHA1a3bb9c6372df9a600bc5a6b91b25967e62add2b5
SHA256c850cab277c08f0c55ddabc75233a7316ac3cd2003df1f4dcad031e15f5db3a4
SHA512d94a17caab862404f808ce68ce15c057df9394ac392d0656e27f44f8006a5fddc77577203bc4e0a2bb77bdd8e051ab8661fc380ab82fc56e992ce5e75b233771
-
Filesize
72KB
MD5a1f704b132df9045c400a54a21609845
SHA17a621ec4330a4f369014ec349a880ab53cc0df5f
SHA2567c44aeb2facf6b55bf90f91a2c12693e109fe7fd9c7a00f0e48cbd018bdd5718
SHA512781ca996030e602ed1e1a62e8fcea52220d256ad8e6ce4986c07e3e22a4ce60e933e9dd807dca51601ecf2af8ce1b9dcde01fb6871496d77d79073c7be446b72
-
Filesize
72KB
MD5a1f704b132df9045c400a54a21609845
SHA17a621ec4330a4f369014ec349a880ab53cc0df5f
SHA2567c44aeb2facf6b55bf90f91a2c12693e109fe7fd9c7a00f0e48cbd018bdd5718
SHA512781ca996030e602ed1e1a62e8fcea52220d256ad8e6ce4986c07e3e22a4ce60e933e9dd807dca51601ecf2af8ce1b9dcde01fb6871496d77d79073c7be446b72
-
Filesize
72KB
MD5f409ac8bbabfaea48714c682f6bec218
SHA11a35ec5ebbabe9b1bf8394e1725853bad7a8e4c3
SHA25635da47f9ac36ffdfdd3a2d48353b90d26a5f72fa6bbe9c40a8aecf4326503271
SHA512ec24e542923a4e7889e252a6bc9aea33c056019ee80d1b0cbbe5f78e0b0ddbdf9b276bad095209b9fd256c1e770a3020d96cd2fe946be9f02cf31935a16a66a4
-
Filesize
72KB
MD5f409ac8bbabfaea48714c682f6bec218
SHA11a35ec5ebbabe9b1bf8394e1725853bad7a8e4c3
SHA25635da47f9ac36ffdfdd3a2d48353b90d26a5f72fa6bbe9c40a8aecf4326503271
SHA512ec24e542923a4e7889e252a6bc9aea33c056019ee80d1b0cbbe5f78e0b0ddbdf9b276bad095209b9fd256c1e770a3020d96cd2fe946be9f02cf31935a16a66a4
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD5dcd5ac12b7bb1123283a695ad66b64da
SHA1358cdf3e8ca3d073cef9606c4c704d80bc4f4449
SHA25666803c7a5759ebedc72ee4b17e154064a154ece3f03fde3a8be933bc2bc9a135
SHA51231f7710ceabc39b175e5f77c26c6b1768c8b1cda6b2a084d4f6af67b975c05d81fff15901d46acef1531ab609e45782a5cec54945b5768c4884dd06cd78c82af
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD51edb1c0237a02a4004bafbab339d70fa
SHA1ad00334e097d8c91614c43a3bf3a444e58871027
SHA25654ce0d4a7aa42d9f1febd2cccfa75782cc94434aeb76c72254f29b30d7276515
SHA5122559c31497661d09c07fdb4acdbab5a5fc5d3d9d3365550849cb806583777851fb872be69f165053530f7f78ac0c8fc255141ed4eb5d01e8b8cd664aaf9751e2
-
Filesize
72KB
MD5fe0a96bc2d72a3e7c25749b2603eafd4
SHA175ecf7b9dcc3b6ca1cf09c707a0047555c88fbb6
SHA2569d481d694a58d2ab9cbace7de8a802c2d9570ab32af1ea33386a514700ba47ef
SHA512ebeaeae77ec1e9b641b8c5c218677e4d7442cc0f68570de89d1234cf1bda463a585c0ff777c92a4b69da916fa95d646de925cd86692a5b2aba89d8a49f8abb1c
-
Filesize
72KB
MD5da2b86063a011b15272661dff94ccb46
SHA1d86bb4022d5814c9e610a2d9ad816ee9ef8e270f
SHA256d24dc2b6c8da2c6463e35d074d017dc033bf43773cc49afa054f904813fd9104
SHA512226a1f01e323f56b8f7543f86bd9c0bf43e790a82adb88c62b867345af5ba96b38e29cc1456234c856b9ca732704c280aa754d24183e79d26b7cbd4fd32b7660
-
Filesize
72KB
MD5da2b86063a011b15272661dff94ccb46
SHA1d86bb4022d5814c9e610a2d9ad816ee9ef8e270f
SHA256d24dc2b6c8da2c6463e35d074d017dc033bf43773cc49afa054f904813fd9104
SHA512226a1f01e323f56b8f7543f86bd9c0bf43e790a82adb88c62b867345af5ba96b38e29cc1456234c856b9ca732704c280aa754d24183e79d26b7cbd4fd32b7660
-
Filesize
72KB
MD590d1cd81f63819fada816a5b963e05ae
SHA1394d06c4cabff517867b1b99919e8755c705e9ae
SHA256771557021aeb4f79b3002e6f390594c365bf5c1582b4ddedbfc7d40ed98f4999
SHA5125ff6219779b06b516b079dadd84f87574dc3e1a6bc52ab3cd957ca2da7deed3a1b1f8fd844eede2bc66ac84d48a63420bed47cb45ae98c27010a7b0ccb9d85da
-
Filesize
72KB
MD559192d843d51925f18798d2e11fe4bab
SHA1883406add1972b1f8a98d836ba3dd6a583e491f7
SHA256b68f8bf40a04bec038df42a74cc599ecafef9737210a86a6464d7c30a9d5048b
SHA51222bf1a79762d8af68c0e4cdc1201ce52fb113dd581d6937d0db59784d09a076801db57aa13b5b616fc7cadb3d57836a840252ce3dd8f1c6ccfddbec5d168ea28
-
Filesize
72KB
MD559192d843d51925f18798d2e11fe4bab
SHA1883406add1972b1f8a98d836ba3dd6a583e491f7
SHA256b68f8bf40a04bec038df42a74cc599ecafef9737210a86a6464d7c30a9d5048b
SHA51222bf1a79762d8af68c0e4cdc1201ce52fb113dd581d6937d0db59784d09a076801db57aa13b5b616fc7cadb3d57836a840252ce3dd8f1c6ccfddbec5d168ea28
-
Filesize
72KB
MD5647b4dedc9308336d23f3114ffad50bf
SHA1b0c68d7fbb24f8a0810dda80146e77d26ee85ac8
SHA2562f54fdfb4fc7cc7dc233e995ed448f0407a6bf430fed0a366e2d20e2a32cbd25
SHA51225a8fefbb789973f6b58ef9c24ee0b2da0dfe0f464a7c1b6ab5c5534cec5d98da992acdcafc8d32c69e4ff9fa2f41b8de10cd3fcb06f46c68d0e81c7065a3dc1
-
Filesize
72KB
MD5647b4dedc9308336d23f3114ffad50bf
SHA1b0c68d7fbb24f8a0810dda80146e77d26ee85ac8
SHA2562f54fdfb4fc7cc7dc233e995ed448f0407a6bf430fed0a366e2d20e2a32cbd25
SHA51225a8fefbb789973f6b58ef9c24ee0b2da0dfe0f464a7c1b6ab5c5534cec5d98da992acdcafc8d32c69e4ff9fa2f41b8de10cd3fcb06f46c68d0e81c7065a3dc1
-
Filesize
72KB
MD5a9c7b4e66f2ea56491e33083c71735ce
SHA114e6e673257fe97111f165d3055a73c155416289
SHA2561164be2d100c3b86365b9229ee29fbf6c6074e622493ce2b7aed742c526f8b9f
SHA5121bf13da6e8d2d1bc17787ca0256f885e76544930002d2211705ff2a59777c61a364a1d10e3fd88460636a1b166372b1c5b1b70b63585b6d9b01eb9c78079b9fe
-
Filesize
72KB
MD5a9c7b4e66f2ea56491e33083c71735ce
SHA114e6e673257fe97111f165d3055a73c155416289
SHA2561164be2d100c3b86365b9229ee29fbf6c6074e622493ce2b7aed742c526f8b9f
SHA5121bf13da6e8d2d1bc17787ca0256f885e76544930002d2211705ff2a59777c61a364a1d10e3fd88460636a1b166372b1c5b1b70b63585b6d9b01eb9c78079b9fe
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a9c7b4e66f2ea56491e33083c71735ce
SHA114e6e673257fe97111f165d3055a73c155416289
SHA2561164be2d100c3b86365b9229ee29fbf6c6074e622493ce2b7aed742c526f8b9f
SHA5121bf13da6e8d2d1bc17787ca0256f885e76544930002d2211705ff2a59777c61a364a1d10e3fd88460636a1b166372b1c5b1b70b63585b6d9b01eb9c78079b9fe
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a9c7b4e66f2ea56491e33083c71735ce
SHA114e6e673257fe97111f165d3055a73c155416289
SHA2561164be2d100c3b86365b9229ee29fbf6c6074e622493ce2b7aed742c526f8b9f
SHA5121bf13da6e8d2d1bc17787ca0256f885e76544930002d2211705ff2a59777c61a364a1d10e3fd88460636a1b166372b1c5b1b70b63585b6d9b01eb9c78079b9fe
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53cf197bf103837584d42ca3fb4995090
SHA199d3ba6b44d4b4ee6f972da34ac9a3fd4c2e034c
SHA2561f1129274ed3cfce676597eb63cfff26c9ea9d93fcbd3adf6d464d804a5dd55b
SHA512bb47eeac70d1534e9a661bc9f717549b68a828d6c36c5a9a852105278021ce2bbf50c2b97b5028eb6b26ff78f66108acce31d7c35ebea8936d467ec36053e9f3
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53cf197bf103837584d42ca3fb4995090
SHA199d3ba6b44d4b4ee6f972da34ac9a3fd4c2e034c
SHA2561f1129274ed3cfce676597eb63cfff26c9ea9d93fcbd3adf6d464d804a5dd55b
SHA512bb47eeac70d1534e9a661bc9f717549b68a828d6c36c5a9a852105278021ce2bbf50c2b97b5028eb6b26ff78f66108acce31d7c35ebea8936d467ec36053e9f3
-
Filesize
72KB
MD55b90416d0b621aa616be68a56752a813
SHA15879730b03976210f99300fb2a7f5ef1b27090ac
SHA2561475e635c2c66cfc63ac81d5af91bd6b8d45633220f8247fd064ae76245a6e14
SHA512cf0b902b8802407af9fb754db36be03ae3a6288db3abdf4b43ace6a80da1b18630548c0dca0a2309d94e46a6d66b4a832e79ca8f30c82cbc171caca6ab27cef9
-
Filesize
72KB
MD55b90416d0b621aa616be68a56752a813
SHA15879730b03976210f99300fb2a7f5ef1b27090ac
SHA2561475e635c2c66cfc63ac81d5af91bd6b8d45633220f8247fd064ae76245a6e14
SHA512cf0b902b8802407af9fb754db36be03ae3a6288db3abdf4b43ace6a80da1b18630548c0dca0a2309d94e46a6d66b4a832e79ca8f30c82cbc171caca6ab27cef9
-
Filesize
72KB
MD5e4bf40274fdf2fa710812659531d80db
SHA182d97b6ea4278f3b7cf05592053d5afec95b716f
SHA25675a37c86db3bbf5f1441f95e56747c2521dbb483ad87f009efa7d7c599e91a1a
SHA5129bc275c5f0277c87f17ca9c6ece7036535925e275bc2e10ba55f147f5a7a932f70bef8142fc561e53a6db8fd437e76311dbe2772f81335a5745fa37b1ba7be88
-
Filesize
72KB
MD5e4bf40274fdf2fa710812659531d80db
SHA182d97b6ea4278f3b7cf05592053d5afec95b716f
SHA25675a37c86db3bbf5f1441f95e56747c2521dbb483ad87f009efa7d7c599e91a1a
SHA5129bc275c5f0277c87f17ca9c6ece7036535925e275bc2e10ba55f147f5a7a932f70bef8142fc561e53a6db8fd437e76311dbe2772f81335a5745fa37b1ba7be88
-
Filesize
72KB
MD53cf197bf103837584d42ca3fb4995090
SHA199d3ba6b44d4b4ee6f972da34ac9a3fd4c2e034c
SHA2561f1129274ed3cfce676597eb63cfff26c9ea9d93fcbd3adf6d464d804a5dd55b
SHA512bb47eeac70d1534e9a661bc9f717549b68a828d6c36c5a9a852105278021ce2bbf50c2b97b5028eb6b26ff78f66108acce31d7c35ebea8936d467ec36053e9f3
-
Filesize
72KB
MD53cf197bf103837584d42ca3fb4995090
SHA199d3ba6b44d4b4ee6f972da34ac9a3fd4c2e034c
SHA2561f1129274ed3cfce676597eb63cfff26c9ea9d93fcbd3adf6d464d804a5dd55b
SHA512bb47eeac70d1534e9a661bc9f717549b68a828d6c36c5a9a852105278021ce2bbf50c2b97b5028eb6b26ff78f66108acce31d7c35ebea8936d467ec36053e9f3
-
Filesize
72KB
MD58f5255533e05f365dc4608846a4fdd5a
SHA114159804a895e6a453a05b4bf7c63b97d9d0d046
SHA2560af37cb6f5b0d6e7873ffa89914d5236dbecd90b09fdcbdc15366b8dd92f900c
SHA512cadd58c3133c81c58eaf44528587b226f4fc34f68225468ceafd8e2bbc206f10de8ae98ac2dfabbdd3ff3d99a41d68c62aa317b43f641c765d7dfd59d5ea2559
-
Filesize
72KB
MD58f5255533e05f365dc4608846a4fdd5a
SHA114159804a895e6a453a05b4bf7c63b97d9d0d046
SHA2560af37cb6f5b0d6e7873ffa89914d5236dbecd90b09fdcbdc15366b8dd92f900c
SHA512cadd58c3133c81c58eaf44528587b226f4fc34f68225468ceafd8e2bbc206f10de8ae98ac2dfabbdd3ff3d99a41d68c62aa317b43f641c765d7dfd59d5ea2559
-
Filesize
72KB
MD579b0ad941c59c8891bccea436c19863e
SHA1efc94f606bd67393dc4179d64064b0e412a526d7
SHA2563ee063f9a6bd76e5d7e1586d29eac26774ab69ab1577e226cc811e4aaa8e80f3
SHA51240d41239e4126f4e0eec4e5536ddd8fa44bd8ba1619b0d5fdb426e0eb61d386101da7839c41959f924d27dc0d0e1a583e619fb11bfcad2a707fb6759607a43ce
-
Filesize
72KB
MD579b0ad941c59c8891bccea436c19863e
SHA1efc94f606bd67393dc4179d64064b0e412a526d7
SHA2563ee063f9a6bd76e5d7e1586d29eac26774ab69ab1577e226cc811e4aaa8e80f3
SHA51240d41239e4126f4e0eec4e5536ddd8fa44bd8ba1619b0d5fdb426e0eb61d386101da7839c41959f924d27dc0d0e1a583e619fb11bfcad2a707fb6759607a43ce