Analysis
-
max time kernel
192s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe
Resource
win10v2004-20221111-en
General
-
Target
b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe
-
Size
72KB
-
MD5
6f3fb0134a3bf891855a7c48b7d133e0
-
SHA1
642d52be061e6bfeade23041b4f96476e7cdf6b9
-
SHA256
b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344
-
SHA512
75250ed770456e40a3262be981a367356c594372866062e734ca04391364c2035232db624caa4e51516e1adc3c6967c987afb323b2373ec1693ea62ff6568447
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2C:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 3572 backup.exe 2628 backup.exe 4556 backup.exe 940 backup.exe 3860 backup.exe 5056 backup.exe 3056 System Restore.exe 5008 backup.exe 2224 update.exe 4984 backup.exe 3604 backup.exe 3368 backup.exe 2536 backup.exe 1948 backup.exe 3788 backup.exe 2708 backup.exe 1340 backup.exe 1380 backup.exe 3552 backup.exe 4008 backup.exe 1608 backup.exe 3752 backup.exe 4208 backup.exe 2608 backup.exe 4416 backup.exe 4500 backup.exe 5024 backup.exe 2132 backup.exe 4796 backup.exe 3812 backup.exe 2808 backup.exe 4700 backup.exe 4780 backup.exe 3424 data.exe 32 backup.exe 1504 backup.exe 3628 backup.exe 1840 backup.exe 4660 backup.exe 4644 backup.exe 3416 backup.exe 3644 backup.exe 2412 backup.exe 688 backup.exe 2520 backup.exe 1060 backup.exe 4812 backup.exe 4344 backup.exe 3368 backup.exe 1856 update.exe 1192 backup.exe 1576 backup.exe 4272 backup.exe 4444 backup.exe 2328 backup.exe 3188 backup.exe 1344 backup.exe 1040 backup.exe 3468 backup.exe 1516 backup.exe 2880 backup.exe 3676 backup.exe 1508 backup.exe 1680 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Policies\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\data.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\update.exe data.exe File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe data.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe update.exe File opened for modification C:\Windows\backup.exe System Restore.exe File opened for modification C:\Windows\addins\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 3572 backup.exe 2628 backup.exe 4556 backup.exe 940 backup.exe 3860 backup.exe 5056 backup.exe 3056 System Restore.exe 5008 backup.exe 2224 update.exe 4984 backup.exe 3604 backup.exe 3368 backup.exe 2536 backup.exe 3788 backup.exe 1948 backup.exe 1340 backup.exe 2708 backup.exe 1380 backup.exe 3552 backup.exe 1608 backup.exe 3752 backup.exe 4208 backup.exe 4008 backup.exe 2608 backup.exe 4416 backup.exe 5024 backup.exe 4500 backup.exe 2132 backup.exe 4796 backup.exe 3812 backup.exe 2808 backup.exe 4700 backup.exe 4780 backup.exe 3424 data.exe 32 backup.exe 1504 backup.exe 1840 backup.exe 3628 backup.exe 4660 backup.exe 4644 backup.exe 3644 backup.exe 3416 backup.exe 2412 backup.exe 688 backup.exe 2520 backup.exe 4812 backup.exe 1060 backup.exe 4344 backup.exe 3368 backup.exe 1856 update.exe 1192 backup.exe 1576 backup.exe 4272 backup.exe 4444 backup.exe 3468 backup.exe 3188 backup.exe 1040 backup.exe 2880 backup.exe 2328 backup.exe 1344 backup.exe 1516 backup.exe 1508 backup.exe 1680 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3572 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 83 PID 1316 wrote to memory of 3572 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 83 PID 1316 wrote to memory of 3572 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 83 PID 1316 wrote to memory of 2628 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 84 PID 1316 wrote to memory of 2628 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 84 PID 1316 wrote to memory of 2628 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 84 PID 1316 wrote to memory of 4556 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 85 PID 1316 wrote to memory of 4556 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 85 PID 1316 wrote to memory of 4556 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 85 PID 1316 wrote to memory of 940 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 86 PID 1316 wrote to memory of 940 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 86 PID 1316 wrote to memory of 940 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 86 PID 1316 wrote to memory of 3860 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 87 PID 1316 wrote to memory of 3860 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 87 PID 1316 wrote to memory of 3860 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 87 PID 1316 wrote to memory of 5056 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 88 PID 1316 wrote to memory of 5056 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 88 PID 1316 wrote to memory of 5056 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 88 PID 3572 wrote to memory of 3056 3572 backup.exe 89 PID 3572 wrote to memory of 3056 3572 backup.exe 89 PID 3572 wrote to memory of 3056 3572 backup.exe 89 PID 1316 wrote to memory of 5008 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 90 PID 1316 wrote to memory of 5008 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 90 PID 1316 wrote to memory of 5008 1316 b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe 90 PID 3056 wrote to memory of 2224 3056 System Restore.exe 91 PID 3056 wrote to memory of 2224 3056 System Restore.exe 91 PID 3056 wrote to memory of 2224 3056 System Restore.exe 91 PID 3056 wrote to memory of 4984 3056 System Restore.exe 92 PID 3056 wrote to memory of 4984 3056 System Restore.exe 92 PID 3056 wrote to memory of 4984 3056 System Restore.exe 92 PID 3056 wrote to memory of 3604 3056 System Restore.exe 93 PID 3056 wrote to memory of 3604 3056 System Restore.exe 93 PID 3056 wrote to memory of 3604 3056 System Restore.exe 93 PID 3604 wrote to memory of 3368 3604 backup.exe 94 PID 3604 wrote to memory of 3368 3604 backup.exe 94 PID 3604 wrote to memory of 3368 3604 backup.exe 94 PID 3368 wrote to memory of 2536 3368 backup.exe 95 PID 3368 wrote to memory of 2536 3368 backup.exe 95 PID 3368 wrote to memory of 2536 3368 backup.exe 95 PID 3604 wrote to memory of 3788 3604 backup.exe 96 PID 3604 wrote to memory of 3788 3604 backup.exe 96 PID 3604 wrote to memory of 3788 3604 backup.exe 96 PID 3056 wrote to memory of 1948 3056 System Restore.exe 97 PID 3056 wrote to memory of 1948 3056 System Restore.exe 97 PID 3056 wrote to memory of 1948 3056 System Restore.exe 97 PID 1948 wrote to memory of 2708 1948 backup.exe 98 PID 1948 wrote to memory of 2708 1948 backup.exe 98 PID 1948 wrote to memory of 2708 1948 backup.exe 98 PID 3788 wrote to memory of 1340 3788 backup.exe 99 PID 3788 wrote to memory of 1340 3788 backup.exe 99 PID 3788 wrote to memory of 1340 3788 backup.exe 99 PID 3604 wrote to memory of 1380 3604 backup.exe 100 PID 3604 wrote to memory of 1380 3604 backup.exe 100 PID 3604 wrote to memory of 1380 3604 backup.exe 100 PID 3056 wrote to memory of 3552 3056 System Restore.exe 101 PID 3056 wrote to memory of 3552 3056 System Restore.exe 101 PID 3056 wrote to memory of 3552 3056 System Restore.exe 101 PID 1948 wrote to memory of 4008 1948 backup.exe 102 PID 1948 wrote to memory of 4008 1948 backup.exe 102 PID 1948 wrote to memory of 4008 1948 backup.exe 102 PID 3788 wrote to memory of 1608 3788 backup.exe 103 PID 3788 wrote to memory of 1608 3788 backup.exe 103 PID 3788 wrote to memory of 1608 3788 backup.exe 103 PID 2708 wrote to memory of 3752 2708 backup.exe 104 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe"C:\Users\Admin\AppData\Local\Temp\b67b040c70d30a72415d550f37f1683e88d6f8994044a98f3fa0b6e1d434c344.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\1587829196\backup.exeC:\Users\Admin\AppData\Local\Temp\1587829196\backup.exe C:\Users\Admin\AppData\Local\Temp\1587829196\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3572 -
C:\System Restore.exe"\System Restore.exe" \3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\odt\update.exeC:\odt\update.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2224
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4984
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3368 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2536
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4500
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4700 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3644
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2520
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\update.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\update.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1856
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3468
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:208
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
PID:2824
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4300
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵PID:3240
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3032 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:2304
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵PID:840
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵PID:424
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵PID:1648
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1344
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Drops file in Program Files directory
PID:3040 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1504 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:2024
-
-
C:\Program Files\Common Files\System\ado\en-US\System Restore.exe"C:\Program Files\Common Files\System\ado\en-US\System Restore.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:964
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:4140
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:752
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2608 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5024 -
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:2220
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Disables RegEdit via registry modification
PID:752
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1944
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2708
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:4016
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:4456 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4228 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1668
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵PID:3964
-
-
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵PID:1136
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:3424
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3752 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4416
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3812 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1680
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1516
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3460
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:2320 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- Disables RegEdit via registry modification
PID:4492
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵PID:3188
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3676 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Disables RegEdit via registry modification
PID:4520 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Disables RegEdit via registry modification
PID:4948
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4380
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵PID:4848
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:5060 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:992
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4008 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4796 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\data.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\data.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4644 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4272 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\8⤵PID:384
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3204 -
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3644 -
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\data.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\data.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3292
-
-
-
-
-
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe"C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe" C:\Program Files (x86)\Common Files\Java\Java Update\7⤵PID:5052
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\6⤵
- Drops file in Program Files directory
- System policy modification
PID:1624 -
C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2256
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:408
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\ink\7⤵PID:3736
-
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:2212
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:836
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2004
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:3044
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1244 -
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵
- System policy modification
PID:4188
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:3216
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe"C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵PID:3108
-
-
-
C:\Program Files (x86)\Microsoft\backup.exe"C:\Program Files (x86)\Microsoft\backup.exe" C:\Program Files (x86)\Microsoft\5⤵PID:3148
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3552 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4208 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3416
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4812
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4444
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
PID:3240
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- System policy modification
PID:2376
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:3632
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:3664
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3148
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2412
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1528
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵PID:764
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Disables RegEdit via registry modification
PID:2280
-
-
C:\Windows\appcompat\data.exeC:\Windows\appcompat\data.exe C:\Windows\appcompat\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:2224 -
C:\Windows\appcompat\appraiser\update.exeC:\Windows\appcompat\appraiser\update.exe C:\Windows\appcompat\appraiser\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:3560 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵PID:4992
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵PID:2280
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵PID:4856
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5008
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\1⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:32
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3188
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:5072
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\2⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4636
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\2⤵PID:3956
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\3⤵PID:4788
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5a46a635e1cc18bd841e52fcb872f2c9f
SHA15afbe97d22b2ae0b1cdcb651d2f470c7c207c2ee
SHA256bc9aa37396a39292134c21609d6391a408bdea14d42158e4962c701443e12ad7
SHA5123c951b06c20025ffae478d380df40cfd6d93d2949bb55099787fa31754a9255859fc56e547f869c850bc514f9c7a72bc170780e312cb7d24c58dc9c329cfce07
-
Filesize
72KB
MD5a46a635e1cc18bd841e52fcb872f2c9f
SHA15afbe97d22b2ae0b1cdcb651d2f470c7c207c2ee
SHA256bc9aa37396a39292134c21609d6391a408bdea14d42158e4962c701443e12ad7
SHA5123c951b06c20025ffae478d380df40cfd6d93d2949bb55099787fa31754a9255859fc56e547f869c850bc514f9c7a72bc170780e312cb7d24c58dc9c329cfce07
-
Filesize
72KB
MD5a64edff24629603cc4c8a803d1f3183b
SHA17007cc69ea0b5e2e957f5b1b575123a1da1166be
SHA256ddaecbe4fae800de177d45e056e6fb2c3426b4a73f9164bdad6057501d161cd8
SHA51227c3d1366ff44f2363dd205ade8e0a61bc1132896d2fe98d2f34dfc024ade88d919ce41e385d4ee5d4b20d3a56624cfdcaee416261af24df29ad935bc614e706
-
Filesize
72KB
MD5a64edff24629603cc4c8a803d1f3183b
SHA17007cc69ea0b5e2e957f5b1b575123a1da1166be
SHA256ddaecbe4fae800de177d45e056e6fb2c3426b4a73f9164bdad6057501d161cd8
SHA51227c3d1366ff44f2363dd205ade8e0a61bc1132896d2fe98d2f34dfc024ade88d919ce41e385d4ee5d4b20d3a56624cfdcaee416261af24df29ad935bc614e706
-
Filesize
72KB
MD58406e2f8dfad3bbf09c72cc6c6633682
SHA129202f029e4b3d9ea632e4e6dc143075bb524b17
SHA256ee01f1f2420436845b247d57359e8199ead818fa474be46d6f36e363b3f20f27
SHA512ff945ace5835fa55399d9974106e19dacee3ff5f31c5ea1d433457a9613cad9b8104e7224b8f859222fa612d2a1f11cc09f39cb07b99c636ff8653db8cd61a8a
-
Filesize
72KB
MD58406e2f8dfad3bbf09c72cc6c6633682
SHA129202f029e4b3d9ea632e4e6dc143075bb524b17
SHA256ee01f1f2420436845b247d57359e8199ead818fa474be46d6f36e363b3f20f27
SHA512ff945ace5835fa55399d9974106e19dacee3ff5f31c5ea1d433457a9613cad9b8104e7224b8f859222fa612d2a1f11cc09f39cb07b99c636ff8653db8cd61a8a
-
Filesize
72KB
MD57380d8dd1f2b68ef8cbb124e23bd55cf
SHA1ff9015229fc1ba3da302b6f0a8d2629f42943041
SHA2565908002cf547246283741db5d52b89736ef9945dbb90fc0b78a14f3c746400b7
SHA512f49fd016d09b6b36327237b790c6567e5f7a1d2e98cc6d5b367a5b1f9afb7cf739f0a977329541966c9e9729765c9432822a4fb31813e69080aa73d3c6b1ccbc
-
Filesize
72KB
MD57380d8dd1f2b68ef8cbb124e23bd55cf
SHA1ff9015229fc1ba3da302b6f0a8d2629f42943041
SHA2565908002cf547246283741db5d52b89736ef9945dbb90fc0b78a14f3c746400b7
SHA512f49fd016d09b6b36327237b790c6567e5f7a1d2e98cc6d5b367a5b1f9afb7cf739f0a977329541966c9e9729765c9432822a4fb31813e69080aa73d3c6b1ccbc
-
Filesize
72KB
MD5bf379f595a6abe0c844ec43fba5c1d16
SHA1b37e3fb68c28f2578d80eb34f83e0951b8848558
SHA256600a2148af7688812655f4e06cdd1e235c75be2be0fddcc0143f6a1849dc88d4
SHA512fa1f51ff57b28af1370993ec35cec9fbf021b9af0918fc6c5e39a5651154ad2e44f842938308c45de20755bf5c4fd9b70a70eb80e469309ea34551f8cf323d54
-
Filesize
72KB
MD5bf379f595a6abe0c844ec43fba5c1d16
SHA1b37e3fb68c28f2578d80eb34f83e0951b8848558
SHA256600a2148af7688812655f4e06cdd1e235c75be2be0fddcc0143f6a1849dc88d4
SHA512fa1f51ff57b28af1370993ec35cec9fbf021b9af0918fc6c5e39a5651154ad2e44f842938308c45de20755bf5c4fd9b70a70eb80e469309ea34551f8cf323d54
-
Filesize
72KB
MD537cacc45a59875b6aeb5da4cec683e57
SHA123d8aa7f47f18f737cbcf19388f592395a7a096b
SHA256efb7a5bc0f5c60bc70a96fd9995d58b34177fe3e6707187b942ff06e6ebfa3e1
SHA5122f231581e98ee8beada26ad20d09d3949bf7156ffa68eeb325506ac28b23a0a1df92b07c0d8574b23425497e3b0c4db8988ded8f02b2f06fec0519926b816db9
-
Filesize
72KB
MD537cacc45a59875b6aeb5da4cec683e57
SHA123d8aa7f47f18f737cbcf19388f592395a7a096b
SHA256efb7a5bc0f5c60bc70a96fd9995d58b34177fe3e6707187b942ff06e6ebfa3e1
SHA5122f231581e98ee8beada26ad20d09d3949bf7156ffa68eeb325506ac28b23a0a1df92b07c0d8574b23425497e3b0c4db8988ded8f02b2f06fec0519926b816db9
-
Filesize
72KB
MD5aae2df3643d1564e4e0c63d9280d30a6
SHA1e445a02d99dd24a02ca70cc43345de654ea82756
SHA256a7115b41056ef50588e05ff959e2626277dcf2cfd578598e9e04bf2cf30cb243
SHA5124117e673bed1ba61bc5922bdb9b919c11d1e4eb3a07d353dd40dfd6b3a7be7cd98bd5eae469dcaa71a81c5d50fa2bc0d78b9819a08f6c4abfe6e0c4e5ac0e0be
-
Filesize
72KB
MD5aae2df3643d1564e4e0c63d9280d30a6
SHA1e445a02d99dd24a02ca70cc43345de654ea82756
SHA256a7115b41056ef50588e05ff959e2626277dcf2cfd578598e9e04bf2cf30cb243
SHA5124117e673bed1ba61bc5922bdb9b919c11d1e4eb3a07d353dd40dfd6b3a7be7cd98bd5eae469dcaa71a81c5d50fa2bc0d78b9819a08f6c4abfe6e0c4e5ac0e0be
-
Filesize
72KB
MD505d46ccd044e431c688fa7efb7a190bf
SHA1a755713a7a95b49d79a7c2e80e331b19b4edd740
SHA256b5d547c16dff5650c5267a028f9ea1aa59a7873ed151e6ea241f737fe1c89a08
SHA5125db236a152455791b6177fcb17251876b655429ef4875e689f8f3c9f5a61be59e681a324e8444b3a2fc2dbb62a55582eb532fbb3a48aab24f0a752c89add22d4
-
Filesize
72KB
MD505d46ccd044e431c688fa7efb7a190bf
SHA1a755713a7a95b49d79a7c2e80e331b19b4edd740
SHA256b5d547c16dff5650c5267a028f9ea1aa59a7873ed151e6ea241f737fe1c89a08
SHA5125db236a152455791b6177fcb17251876b655429ef4875e689f8f3c9f5a61be59e681a324e8444b3a2fc2dbb62a55582eb532fbb3a48aab24f0a752c89add22d4
-
Filesize
72KB
MD52a6b40eff8dec484fd7ef2d1601a5947
SHA1883a1970debfbbe34f8def2312bb34339099c6d2
SHA256a82d27674045c0e9578f4ee50f4b9a1773656312538654058c83beb7d58f02b6
SHA512faf48d83b4d6b495bda6b0c42ec1ec5b9f6579a94b56e6de9b7ead5992023aaa19eb9e15fb7784698e3bd7412db463ac25dbe0b72117dd36011fdbb57c68a94e
-
Filesize
72KB
MD52a6b40eff8dec484fd7ef2d1601a5947
SHA1883a1970debfbbe34f8def2312bb34339099c6d2
SHA256a82d27674045c0e9578f4ee50f4b9a1773656312538654058c83beb7d58f02b6
SHA512faf48d83b4d6b495bda6b0c42ec1ec5b9f6579a94b56e6de9b7ead5992023aaa19eb9e15fb7784698e3bd7412db463ac25dbe0b72117dd36011fdbb57c68a94e
-
Filesize
72KB
MD5b7483b6cb947e6ce5df58e1143838622
SHA1157fcdf562dcfdeb53f0b2c77853b8be5c49b1b5
SHA2561eb1b01032f52bc35ca9e7b129098b2270e70c7e7753f2d53054c27a4d64fc68
SHA512e4a1d4a8a1d80750338e7d9f987245d90dc2ed65b2ccf43973011dd3917027d4723b9070317e338164059f1ff7b0cacdb469fcf7dff9dc9e831e46e3f1c8f186
-
Filesize
72KB
MD5b7483b6cb947e6ce5df58e1143838622
SHA1157fcdf562dcfdeb53f0b2c77853b8be5c49b1b5
SHA2561eb1b01032f52bc35ca9e7b129098b2270e70c7e7753f2d53054c27a4d64fc68
SHA512e4a1d4a8a1d80750338e7d9f987245d90dc2ed65b2ccf43973011dd3917027d4723b9070317e338164059f1ff7b0cacdb469fcf7dff9dc9e831e46e3f1c8f186
-
Filesize
72KB
MD56f5fce995fb20c56ceb59b4c9191e2c0
SHA13b0fdedf5afa8329b3470c37e1f956f2a710a269
SHA2567ea47943c416af40fc62211eebe83c688c78a364988a9bb5c27a4b610bd05032
SHA512edecf4da6ceb86c59ff491748a5a447a0e554e682706f04b695e91cd7a5f3ec6543f1900a356f5dc2d4b45c31694e47926e7f753eb99c897c7e5f29d7446b544
-
Filesize
72KB
MD56f5fce995fb20c56ceb59b4c9191e2c0
SHA13b0fdedf5afa8329b3470c37e1f956f2a710a269
SHA2567ea47943c416af40fc62211eebe83c688c78a364988a9bb5c27a4b610bd05032
SHA512edecf4da6ceb86c59ff491748a5a447a0e554e682706f04b695e91cd7a5f3ec6543f1900a356f5dc2d4b45c31694e47926e7f753eb99c897c7e5f29d7446b544
-
Filesize
72KB
MD50aa2db6679f31cd50c6c99b13781002d
SHA1a48a9ba8bb775c441b13fc68eb4ed01f8fcd4c0a
SHA2568fa18f19e790b1f23c064057e05d7b9488486454f728d0c1ae3fb9756bda7806
SHA51270b96df9c25537abab7ea16ee61334b0b7f45cce2d323f41057534c849695decd6ea1b6d70ff31971dd2633c6d821fdedc2bea4b08cdfd3fe5a1cac9099dc7f0
-
Filesize
72KB
MD50aa2db6679f31cd50c6c99b13781002d
SHA1a48a9ba8bb775c441b13fc68eb4ed01f8fcd4c0a
SHA2568fa18f19e790b1f23c064057e05d7b9488486454f728d0c1ae3fb9756bda7806
SHA51270b96df9c25537abab7ea16ee61334b0b7f45cce2d323f41057534c849695decd6ea1b6d70ff31971dd2633c6d821fdedc2bea4b08cdfd3fe5a1cac9099dc7f0
-
Filesize
72KB
MD53334e1594ee82c7e33700b738d1c8151
SHA1c8689416481afe6ba2c3aaf7085b7f9d0a11b021
SHA2560e968d01e6657b669e51fde7441c20b50910db1566cec2d916454f15a8d594a1
SHA51258732eb9b234912316bbea0024ba944e2d380c16211cc1cc5de825cf3b4172cc1a5c607b88fd4138535cb7addb0a7ec90aa000c2fcaca5f9fc65d052e92639e5
-
Filesize
72KB
MD53334e1594ee82c7e33700b738d1c8151
SHA1c8689416481afe6ba2c3aaf7085b7f9d0a11b021
SHA2560e968d01e6657b669e51fde7441c20b50910db1566cec2d916454f15a8d594a1
SHA51258732eb9b234912316bbea0024ba944e2d380c16211cc1cc5de825cf3b4172cc1a5c607b88fd4138535cb7addb0a7ec90aa000c2fcaca5f9fc65d052e92639e5
-
Filesize
72KB
MD5b944f9dc2cb8ff878c0fc573f21a9e33
SHA1c4d3cd962e4eb7628ab9f188d504de45a6be5603
SHA256de5a664e5228848f5a0f86964cba5cdb03bda9bc96053c24151fc6aeb29ea9b0
SHA51282cdd17c1f2c78f856b5bd5ce87bbba0fbc47c58c0be05b8248af521500e613958f0907b2ac146f72f7831ee7f46cba397a845d997220c0787710bbb5d48289d
-
Filesize
72KB
MD5b944f9dc2cb8ff878c0fc573f21a9e33
SHA1c4d3cd962e4eb7628ab9f188d504de45a6be5603
SHA256de5a664e5228848f5a0f86964cba5cdb03bda9bc96053c24151fc6aeb29ea9b0
SHA51282cdd17c1f2c78f856b5bd5ce87bbba0fbc47c58c0be05b8248af521500e613958f0907b2ac146f72f7831ee7f46cba397a845d997220c0787710bbb5d48289d
-
Filesize
72KB
MD55387bc4ac75a66a13930a09490ed9fc6
SHA1e4d4be5180002a950178ba7bf652b3e32fbb94ec
SHA2567360b466a14bbe01b95e8a0a5d90a34c90141e7cc0badc430f6ea8e9afd06d12
SHA51293567173a4a16d9407c50ebb0d54d7407b6099853bcedf9d9edc337ebd162a97ad88fc072e9891992733b11518574459ca598903176ddc72d4d373b2c266afd8
-
Filesize
72KB
MD55387bc4ac75a66a13930a09490ed9fc6
SHA1e4d4be5180002a950178ba7bf652b3e32fbb94ec
SHA2567360b466a14bbe01b95e8a0a5d90a34c90141e7cc0badc430f6ea8e9afd06d12
SHA51293567173a4a16d9407c50ebb0d54d7407b6099853bcedf9d9edc337ebd162a97ad88fc072e9891992733b11518574459ca598903176ddc72d4d373b2c266afd8
-
Filesize
72KB
MD517494ebfb0597c1591e159992ca2d2dc
SHA1ad2165c4a4e0345a7d6da933b2f0da5fa3d4d58a
SHA256a18ad7bb8a8ccc1ccd0c3496b60166ef914238cad288c0fa327376b199d653dc
SHA512c291c587bed5b38e22e05b88aa27851f562b29517f3400d2e9f577356156c5387aacc8c7322ebd893ef0ca382fb78582b6ddb5168681d67207e8e2571b7cb737
-
Filesize
72KB
MD517494ebfb0597c1591e159992ca2d2dc
SHA1ad2165c4a4e0345a7d6da933b2f0da5fa3d4d58a
SHA256a18ad7bb8a8ccc1ccd0c3496b60166ef914238cad288c0fa327376b199d653dc
SHA512c291c587bed5b38e22e05b88aa27851f562b29517f3400d2e9f577356156c5387aacc8c7322ebd893ef0ca382fb78582b6ddb5168681d67207e8e2571b7cb737
-
Filesize
72KB
MD50f3e69c018d771da338c86eb8158bf8a
SHA158b5bdf00cacedaf0c82963ab80db3b8a5562913
SHA2566cd3df414909312f842182674d030983068dccd305a0e5923ca19b4a7e6281a6
SHA512ea48a947d9d43b7e3f75ee612f35d41e26d700d004b8f9911a10e54b7c0ad045991a332ef08a495fbc22025dfabf7dd16042bc225fd04fb84d8142e91bed30f3
-
Filesize
72KB
MD50f3e69c018d771da338c86eb8158bf8a
SHA158b5bdf00cacedaf0c82963ab80db3b8a5562913
SHA2566cd3df414909312f842182674d030983068dccd305a0e5923ca19b4a7e6281a6
SHA512ea48a947d9d43b7e3f75ee612f35d41e26d700d004b8f9911a10e54b7c0ad045991a332ef08a495fbc22025dfabf7dd16042bc225fd04fb84d8142e91bed30f3
-
Filesize
72KB
MD5be98a3cd4f431a9cf763da9e7d39f6e8
SHA12d27487f0eef8568369fbb537c1f3ff34e897afe
SHA256ad5b86f910ca72eab9868cb516e0126e0a47dfefde61364c0f10d40fbcdc15a4
SHA512f575116edb34ea2890c994fbbf088b5923cae6e710ac283a3573f36a0e3ac68b63d8f930386b65fe4c5f46b7c4e28a18990f3f7400d151ebdca8e5a0332b890e
-
Filesize
72KB
MD5be98a3cd4f431a9cf763da9e7d39f6e8
SHA12d27487f0eef8568369fbb537c1f3ff34e897afe
SHA256ad5b86f910ca72eab9868cb516e0126e0a47dfefde61364c0f10d40fbcdc15a4
SHA512f575116edb34ea2890c994fbbf088b5923cae6e710ac283a3573f36a0e3ac68b63d8f930386b65fe4c5f46b7c4e28a18990f3f7400d151ebdca8e5a0332b890e
-
Filesize
72KB
MD561e44a9895d470ba3f870ae217e692ad
SHA13be113e4211e80e7d0252b2a8667753ea3768988
SHA25618bbb8c4ac2b8e70cfb5f7bac267db55e7632f0fdfd24759e723513f02cb8d50
SHA512695cd3e0271dd84f78239a5f26026a788996a06a6d2ca3f74e8c0cc953e4de3d5ea8593486a1fae0704d27ec436b155640fd235976107fa32d10c8c0ee58319d
-
Filesize
72KB
MD561e44a9895d470ba3f870ae217e692ad
SHA13be113e4211e80e7d0252b2a8667753ea3768988
SHA25618bbb8c4ac2b8e70cfb5f7bac267db55e7632f0fdfd24759e723513f02cb8d50
SHA512695cd3e0271dd84f78239a5f26026a788996a06a6d2ca3f74e8c0cc953e4de3d5ea8593486a1fae0704d27ec436b155640fd235976107fa32d10c8c0ee58319d
-
Filesize
72KB
MD56e191d2c80a402827482bdb98d178672
SHA15e551453aa123dac3eeffc3e9f918956fb463041
SHA25642cc3316261a67eedab7e725952a5bfb62652f6059211a77c8ca2fc0bebc4f68
SHA51246a18b0ebbec2c41c29837c88b485022aa9ea9805ae273b69e7bc27d915e327eabafcdd9afa27d88739d966a3e2f564066fa81a9c1b72f669bbb1922213608bb
-
Filesize
72KB
MD56e191d2c80a402827482bdb98d178672
SHA15e551453aa123dac3eeffc3e9f918956fb463041
SHA25642cc3316261a67eedab7e725952a5bfb62652f6059211a77c8ca2fc0bebc4f68
SHA51246a18b0ebbec2c41c29837c88b485022aa9ea9805ae273b69e7bc27d915e327eabafcdd9afa27d88739d966a3e2f564066fa81a9c1b72f669bbb1922213608bb
-
Filesize
72KB
MD53226f7ffa1d795f97ac9ea5a4cdd9c57
SHA135cea3ab2e1a3d994552dc16adbd13ee594aad56
SHA2565997fd80690f0b2e3269e57897ccb332b0e9b33561b3ad71f442616d1a5b09c2
SHA5124b4240752db1f865c02bbb46960e6eb885756877ac69028027744b364415ff799d979887c38f9e0d315c69dd170a63a5a0d6a7bb4db3c9c1b72e2f78535a6bc5
-
Filesize
72KB
MD53226f7ffa1d795f97ac9ea5a4cdd9c57
SHA135cea3ab2e1a3d994552dc16adbd13ee594aad56
SHA2565997fd80690f0b2e3269e57897ccb332b0e9b33561b3ad71f442616d1a5b09c2
SHA5124b4240752db1f865c02bbb46960e6eb885756877ac69028027744b364415ff799d979887c38f9e0d315c69dd170a63a5a0d6a7bb4db3c9c1b72e2f78535a6bc5
-
Filesize
72KB
MD5d5f3dfcd5ad4d4f20b7f3e56c829dcb9
SHA1829c99e6d02acde8d41d75ad06ae522cfb16e17a
SHA25677ec9888dfaeff6680d90cc79515e2b6a59b4e6e74993c08b4a0953dc8b9b397
SHA512515b913be5839f329c97062a2a8d6956965e3fa2fe83902dfdb8ae2bea122da9eda941f75ef3a12b3c294be11e07f43d764cf656e624a74a46f20019457ee200
-
Filesize
72KB
MD5d5f3dfcd5ad4d4f20b7f3e56c829dcb9
SHA1829c99e6d02acde8d41d75ad06ae522cfb16e17a
SHA25677ec9888dfaeff6680d90cc79515e2b6a59b4e6e74993c08b4a0953dc8b9b397
SHA512515b913be5839f329c97062a2a8d6956965e3fa2fe83902dfdb8ae2bea122da9eda941f75ef3a12b3c294be11e07f43d764cf656e624a74a46f20019457ee200
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5dd855576344fa2889b1cb9c6c78e98ba
SHA1f0a7c8c183818822fa786ace4fd436f1dab386fa
SHA25647de66fea3fc9590b0b3483821c79d6007fce43e6ea4f28a2e9f3fadcbe62486
SHA512801a5a09a211be86309c768ff5a8da103bd4c34d0885157e56c2c8df9744357a04034fa275d6a737c1d54983b792d74efe40e45a6b68f1510fb6b73d014dc5d3
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5dd855576344fa2889b1cb9c6c78e98ba
SHA1f0a7c8c183818822fa786ace4fd436f1dab386fa
SHA25647de66fea3fc9590b0b3483821c79d6007fce43e6ea4f28a2e9f3fadcbe62486
SHA512801a5a09a211be86309c768ff5a8da103bd4c34d0885157e56c2c8df9744357a04034fa275d6a737c1d54983b792d74efe40e45a6b68f1510fb6b73d014dc5d3
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
Filesize
72KB
MD50f21c1f44d694f3d95f7d1338a8b4f5a
SHA1ffaa2db11df486dec33d17b48d210c6e7adbc487
SHA256b1b4e63a04675692d426362d0f433a719f3744a83acd47e5b78c2d9c3c5c4da5
SHA5120d2ec243c99e6bd5fb44f5a955070bb3111b0996804cf21ef47e636784daa4ae843ac49ecc3a3515f91704bb15d026a17d8d0e6783a45c2ad875398087ff9a30
-
Filesize
72KB
MD5dd855576344fa2889b1cb9c6c78e98ba
SHA1f0a7c8c183818822fa786ace4fd436f1dab386fa
SHA25647de66fea3fc9590b0b3483821c79d6007fce43e6ea4f28a2e9f3fadcbe62486
SHA512801a5a09a211be86309c768ff5a8da103bd4c34d0885157e56c2c8df9744357a04034fa275d6a737c1d54983b792d74efe40e45a6b68f1510fb6b73d014dc5d3
-
Filesize
72KB
MD5dd855576344fa2889b1cb9c6c78e98ba
SHA1f0a7c8c183818822fa786ace4fd436f1dab386fa
SHA25647de66fea3fc9590b0b3483821c79d6007fce43e6ea4f28a2e9f3fadcbe62486
SHA512801a5a09a211be86309c768ff5a8da103bd4c34d0885157e56c2c8df9744357a04034fa275d6a737c1d54983b792d74efe40e45a6b68f1510fb6b73d014dc5d3
-
Filesize
72KB
MD52fd9f2c750d16bbeba8b9c019881781a
SHA156c7bb524b5819fb4bd20ea6c4624ff759f5bef6
SHA2563528320d2e4accedb4cf7896681d05e62bd411a8058a2c2e873c559cd1838a13
SHA51222de9b4c5dd66584ef6d8de7810657507d87579003cc184d7ef9649cc94f127b840eae4fd0081aac37c1f2b4082e25b026c8aaa7fb77a0969df207cf9f1b592e
-
Filesize
72KB
MD52fd9f2c750d16bbeba8b9c019881781a
SHA156c7bb524b5819fb4bd20ea6c4624ff759f5bef6
SHA2563528320d2e4accedb4cf7896681d05e62bd411a8058a2c2e873c559cd1838a13
SHA51222de9b4c5dd66584ef6d8de7810657507d87579003cc184d7ef9649cc94f127b840eae4fd0081aac37c1f2b4082e25b026c8aaa7fb77a0969df207cf9f1b592e
-
Filesize
72KB
MD534107b9b586a901c18640390ac31d8bf
SHA131dc34ba51821fe3cb59fa8189cce633c7e4019e
SHA25648ca3073c0d9c8e12e5945a4483b3f6a36a4f82ffb7f3b9acfcaa404e0ec8a30
SHA512c36d9b66c1543a8e07a6b70b9e72374f97a0f6eadb51738d06d612f34befb1d9cc3100968bf801e109c3e1d249d44794392fb4cecef58ead5f84f509b4b1c33d
-
Filesize
72KB
MD534107b9b586a901c18640390ac31d8bf
SHA131dc34ba51821fe3cb59fa8189cce633c7e4019e
SHA25648ca3073c0d9c8e12e5945a4483b3f6a36a4f82ffb7f3b9acfcaa404e0ec8a30
SHA512c36d9b66c1543a8e07a6b70b9e72374f97a0f6eadb51738d06d612f34befb1d9cc3100968bf801e109c3e1d249d44794392fb4cecef58ead5f84f509b4b1c33d
-
Filesize
72KB
MD5a46a635e1cc18bd841e52fcb872f2c9f
SHA15afbe97d22b2ae0b1cdcb651d2f470c7c207c2ee
SHA256bc9aa37396a39292134c21609d6391a408bdea14d42158e4962c701443e12ad7
SHA5123c951b06c20025ffae478d380df40cfd6d93d2949bb55099787fa31754a9255859fc56e547f869c850bc514f9c7a72bc170780e312cb7d24c58dc9c329cfce07
-
Filesize
72KB
MD5a46a635e1cc18bd841e52fcb872f2c9f
SHA15afbe97d22b2ae0b1cdcb651d2f470c7c207c2ee
SHA256bc9aa37396a39292134c21609d6391a408bdea14d42158e4962c701443e12ad7
SHA5123c951b06c20025ffae478d380df40cfd6d93d2949bb55099787fa31754a9255859fc56e547f869c850bc514f9c7a72bc170780e312cb7d24c58dc9c329cfce07