Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
231s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe
Resource
win10v2004-20221111-en
General
-
Target
4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe
-
Size
72KB
-
MD5
06a51512e74adc7072c9176f2d3e85dc
-
SHA1
b23eace43bbab64fbf6f2a417fb6f3fdc7b092b5
-
SHA256
4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003
-
SHA512
c3c7eacd98b4725271c7057bfe9d7acb816bae0ef3c92ecd5da80e0dc03914c8e27a816cde2047fa38414791f064068dcc696e5be189d5e299f2e7b3a83ec582
-
SSDEEP
768:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP9q:ieTce/U/hKYuKP9q
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 176 backup.exe 4208 backup.exe 816 backup.exe 2852 backup.exe 2152 backup.exe 4312 backup.exe 852 backup.exe 2672 backup.exe 3604 backup.exe 1448 backup.exe 4140 backup.exe 2676 backup.exe 2496 backup.exe 2380 backup.exe 540 backup.exe 4732 backup.exe 3536 backup.exe 536 backup.exe 4864 update.exe 2128 backup.exe 3644 backup.exe 1996 backup.exe 4684 backup.exe 4160 backup.exe 4984 backup.exe 1564 backup.exe 2924 backup.exe 2396 backup.exe 3460 backup.exe 3132 backup.exe 4152 backup.exe 4772 backup.exe 4200 backup.exe 3492 backup.exe 3932 backup.exe 932 backup.exe 4252 backup.exe 2788 backup.exe 4348 backup.exe 4388 backup.exe 224 backup.exe 3236 backup.exe 4356 backup.exe 3948 backup.exe 4412 backup.exe 2136 backup.exe 4792 backup.exe 1744 backup.exe 2668 backup.exe 3908 backup.exe 5032 backup.exe 2468 backup.exe 4128 System Restore.exe 3596 backup.exe 3744 backup.exe 4596 backup.exe 4116 backup.exe 400 backup.exe 2420 backup.exe 3892 backup.exe 4336 backup.exe 1960 backup.exe 4208 backup.exe 4220 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\backup.exe backup.exe File opened for modification C:\Program Files (x86)\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\plugin2\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe update.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\apppatch\CustomSDB\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\appcompat\Programs\backup.exe backup.exe File opened for modification C:\Windows\apppatch\de-DE\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe backup.exe File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\apppatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\apppatch\Custom\Custom64\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 176 backup.exe 4208 backup.exe 816 backup.exe 2852 backup.exe 2152 backup.exe 4312 backup.exe 852 backup.exe 2672 backup.exe 3604 backup.exe 1448 backup.exe 4140 backup.exe 2676 backup.exe 2496 backup.exe 2380 backup.exe 540 backup.exe 4732 backup.exe 3536 backup.exe 536 backup.exe 4864 update.exe 2128 backup.exe 3644 backup.exe 1996 backup.exe 4684 backup.exe 4160 backup.exe 2396 backup.exe 4984 backup.exe 3460 backup.exe 1564 backup.exe 2924 backup.exe 3132 backup.exe 4772 backup.exe 4152 backup.exe 3492 backup.exe 4200 backup.exe 3932 backup.exe 932 backup.exe 4348 backup.exe 3236 backup.exe 4252 backup.exe 224 backup.exe 2788 backup.exe 4388 backup.exe 3948 backup.exe 4412 backup.exe 4356 backup.exe 2136 backup.exe 4792 backup.exe 1744 backup.exe 3908 backup.exe 2668 backup.exe 5032 backup.exe 3596 backup.exe 2468 backup.exe 4128 System Restore.exe 3744 backup.exe 4596 backup.exe 400 backup.exe 4116 backup.exe 3892 backup.exe 2420 backup.exe 1960 backup.exe 4748 backup.exe 4208 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 648 wrote to memory of 176 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 83 PID 648 wrote to memory of 176 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 83 PID 648 wrote to memory of 176 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 83 PID 648 wrote to memory of 4208 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 84 PID 648 wrote to memory of 4208 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 84 PID 648 wrote to memory of 4208 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 84 PID 648 wrote to memory of 816 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 85 PID 648 wrote to memory of 816 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 85 PID 648 wrote to memory of 816 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 85 PID 648 wrote to memory of 2852 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 86 PID 648 wrote to memory of 2852 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 86 PID 648 wrote to memory of 2852 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 86 PID 648 wrote to memory of 2152 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 87 PID 648 wrote to memory of 2152 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 87 PID 648 wrote to memory of 2152 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 87 PID 648 wrote to memory of 4312 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 88 PID 648 wrote to memory of 4312 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 88 PID 648 wrote to memory of 4312 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 88 PID 648 wrote to memory of 852 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 89 PID 648 wrote to memory of 852 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 89 PID 648 wrote to memory of 852 648 4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe 89 PID 176 wrote to memory of 2672 176 backup.exe 90 PID 176 wrote to memory of 2672 176 backup.exe 90 PID 176 wrote to memory of 2672 176 backup.exe 90 PID 2672 wrote to memory of 3604 2672 backup.exe 91 PID 2672 wrote to memory of 3604 2672 backup.exe 91 PID 2672 wrote to memory of 3604 2672 backup.exe 91 PID 2672 wrote to memory of 1448 2672 backup.exe 92 PID 2672 wrote to memory of 1448 2672 backup.exe 92 PID 2672 wrote to memory of 1448 2672 backup.exe 92 PID 2672 wrote to memory of 4140 2672 backup.exe 93 PID 2672 wrote to memory of 4140 2672 backup.exe 93 PID 2672 wrote to memory of 4140 2672 backup.exe 93 PID 4140 wrote to memory of 2676 4140 backup.exe 94 PID 4140 wrote to memory of 2676 4140 backup.exe 94 PID 4140 wrote to memory of 2676 4140 backup.exe 94 PID 2676 wrote to memory of 2496 2676 backup.exe 95 PID 2676 wrote to memory of 2496 2676 backup.exe 95 PID 2676 wrote to memory of 2496 2676 backup.exe 95 PID 4140 wrote to memory of 2380 4140 backup.exe 96 PID 4140 wrote to memory of 2380 4140 backup.exe 96 PID 4140 wrote to memory of 2380 4140 backup.exe 96 PID 2380 wrote to memory of 540 2380 backup.exe 97 PID 2380 wrote to memory of 540 2380 backup.exe 97 PID 2380 wrote to memory of 540 2380 backup.exe 97 PID 2380 wrote to memory of 4732 2380 backup.exe 98 PID 2380 wrote to memory of 4732 2380 backup.exe 98 PID 2380 wrote to memory of 4732 2380 backup.exe 98 PID 4732 wrote to memory of 3536 4732 backup.exe 99 PID 4732 wrote to memory of 3536 4732 backup.exe 99 PID 4732 wrote to memory of 3536 4732 backup.exe 99 PID 4732 wrote to memory of 536 4732 backup.exe 100 PID 4732 wrote to memory of 536 4732 backup.exe 100 PID 4732 wrote to memory of 536 4732 backup.exe 100 PID 2672 wrote to memory of 4864 2672 backup.exe 101 PID 2672 wrote to memory of 4864 2672 backup.exe 101 PID 2672 wrote to memory of 4864 2672 backup.exe 101 PID 4140 wrote to memory of 2128 4140 backup.exe 102 PID 4140 wrote to memory of 2128 4140 backup.exe 102 PID 4140 wrote to memory of 2128 4140 backup.exe 102 PID 2380 wrote to memory of 1996 2380 backup.exe 103 PID 2380 wrote to memory of 1996 2380 backup.exe 103 PID 2380 wrote to memory of 1996 2380 backup.exe 103 PID 536 wrote to memory of 3644 536 backup.exe 104 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe"C:\Users\Admin\AppData\Local\Temp\4ab143fc6ee193a0515b3bc2823f7b951ec63e3a52780508290fb7956f63a003.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\95699160\backup.exeC:\Users\Admin\AppData\Local\Temp\95699160\backup.exe C:\Users\Admin\AppData\Local\Temp\95699160\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:176 -
C:\backup.exe\backup.exe \3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2672 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3604
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4140 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4732 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:536 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4160
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4772
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4356
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2420
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵PID:1248
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3684
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵PID:764
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\data.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\data.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵PID:2140
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Disables RegEdit via registry modification
PID:3688
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵PID:3876
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:736
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
PID:2492
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4684 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3492
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4388
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4128
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4208
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:2224
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:1808
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3460 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\System Restore.exe"C:\Program Files\Common Files\microsoft shared\Stationery\System Restore.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵PID:1204
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\update.exe"C:\Program Files\Common Files\microsoft shared\TextConv\update.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:2356 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- Disables RegEdit via registry modification
PID:4056
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Disables RegEdit via registry modification
PID:3424 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵PID:1532
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\data.exe"C:\Program Files\Common Files\microsoft shared\VC\data.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1148
-
-
C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2440 -
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\8⤵PID:432
-
-
-
C:\Program Files\Common Files\microsoft shared\VGX\backup.exe"C:\Program Files\Common Files\microsoft shared\VGX\backup.exe" C:\Program Files\Common Files\microsoft shared\VGX\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:5028
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3236 -
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3744
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:4304
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- System policy modification
PID:4340
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4624
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
PID:2496
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- System policy modification
PID:4208
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Disables RegEdit via registry modification
PID:1804
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1236
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:4256
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Modifies visibility of file extensions in Explorer
PID:1532
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4500
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Disables RegEdit via registry modification
PID:1072
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Modifies visibility of file extensions in Explorer
PID:1528
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4244
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4984 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3908
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Executes dropped EXE
PID:4220
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3644
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- System policy modification
PID:4032
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
PID:3404
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
PID:3392
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:3852
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4152 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4412 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2468
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:400 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵
- Disables RegEdit via registry modification
PID:1896
-
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1700
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:224 -
C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2176 -
C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\9⤵
- System policy modification
PID:880
-
-
-
-
C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\7⤵
- Drops file in Program Files directory
PID:2808
-
-
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4360 -
C:\Program Files\Java\jre1.8.0_66\bin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4156 -
C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe"C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\backup.exe" C:\Program Files\Java\jre1.8.0_66\bin\dtplugin\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4668
-
-
C:\Program Files\Java\jre1.8.0_66\bin\plugin2\update.exe"C:\Program Files\Java\jre1.8.0_66\bin\plugin2\update.exe" C:\Program Files\Java\jre1.8.0_66\bin\plugin2\8⤵
- Modifies visibility of file extensions in Explorer
PID:2480
-
-
C:\Program Files\Java\jre1.8.0_66\bin\server\data.exe"C:\Program Files\Java\jre1.8.0_66\bin\server\data.exe" C:\Program Files\Java\jre1.8.0_66\bin\server\8⤵PID:2644
-
-
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Drops file in Program Files directory
- System policy modification
PID:4252 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵PID:2548
-
-
C:\Program Files\Microsoft Office\root\backup.exe"C:\Program Files\Microsoft Office\root\backup.exe" C:\Program Files\Microsoft Office\root\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3868
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4132
-
-
-
-
C:\Program Files (x86)\update.exe"C:\Program Files (x86)\update.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4864 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3132 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:932 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4336 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Disables RegEdit via registry modification
PID:3620
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2852 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:404
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵PID:4664
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵PID:1004
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
PID:3232 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵PID:3596
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2668 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\9⤵PID:4128
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3280 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Drops file in Program Files directory
PID:5100 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:4592
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵PID:4468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1316 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\9⤵PID:4120
-
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- System policy modification
PID:4588 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Drops file in Program Files directory
- System policy modification
PID:4996 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Disables RegEdit via registry modification
PID:3420
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Drops file in Program Files directory
PID:4872 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- Disables RegEdit via registry modification
PID:4400
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4604
-
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:396 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
PID:1436
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
PID:1308
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:3564
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:5004
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:4708
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3932 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5032
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3892
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:4760
-
-
C:\Users\Admin\Downloads\System Restore.exe"C:\Users\Admin\Downloads\System Restore.exe" C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4552
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:308
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4652
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:4604
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2136 -
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\7⤵PID:224
-
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2924
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- System policy modification
PID:4768 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- System policy modification
PID:2316
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1740
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
PID:5112
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- System policy modification
PID:2936
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵
- System policy modification
PID:888
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4200 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:224
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3596 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵PID:4996
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵
- System policy modification
PID:2560
-
-
C:\Windows\appcompat\Programs\backup.exeC:\Windows\appcompat\Programs\backup.exe C:\Windows\appcompat\Programs\6⤵PID:2372
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵
- Drops file in Windows directory
- System policy modification
PID:376 -
C:\Windows\apppatch\AppPatch64\backup.exeC:\Windows\apppatch\AppPatch64\backup.exe C:\Windows\apppatch\AppPatch64\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2072
-
-
C:\Windows\apppatch\Custom\backup.exeC:\Windows\apppatch\Custom\backup.exe C:\Windows\apppatch\Custom\6⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:3604 -
C:\Windows\apppatch\Custom\Custom64\backup.exeC:\Windows\apppatch\Custom\Custom64\backup.exe C:\Windows\apppatch\Custom\Custom64\7⤵
- Modifies visibility of file extensions in Explorer
PID:1196
-
-
-
C:\Windows\apppatch\CustomSDB\backup.exeC:\Windows\apppatch\CustomSDB\backup.exe C:\Windows\apppatch\CustomSDB\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2968
-
-
C:\Windows\apppatch\de-DE\backup.exeC:\Windows\apppatch\de-DE\backup.exe C:\Windows\apppatch\de-DE\6⤵PID:1664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852
-
-
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4792
-
C:\Program Files\Java\jdk1.8.0_66\jre\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\bin\1⤵
- System policy modification
PID:2020 -
C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\2⤵PID:1056
-
-
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\1⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2140
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\1⤵PID:4452
-
C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\1⤵PID:1892
-
C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe" C:\Program Files (x86)\Google\Update\1.3.36.71\1⤵PID:4688
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\1⤵
- Drops file in Program Files directory
PID:5024
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD591f16b0ed8c170df74e1cd40966c7c80
SHA10db4ea93acefcc3ae817d2a8904bdcf0e83041cb
SHA25693bc045388092cbba47ddcb58e70167a03afb91c91a5c83f3e60c90895253869
SHA512c54683be4643d0142c0a9bbb27ec2887d5dda5cde9154a798b0b75174edcd4648b8683c93521536481f1af359c88758cfc537147560d1fd21f257ceef89ad26a
-
Filesize
72KB
MD591f16b0ed8c170df74e1cd40966c7c80
SHA10db4ea93acefcc3ae817d2a8904bdcf0e83041cb
SHA25693bc045388092cbba47ddcb58e70167a03afb91c91a5c83f3e60c90895253869
SHA512c54683be4643d0142c0a9bbb27ec2887d5dda5cde9154a798b0b75174edcd4648b8683c93521536481f1af359c88758cfc537147560d1fd21f257ceef89ad26a
-
Filesize
72KB
MD585c64e329e7f12abe91c59a80dd0c410
SHA145f5b55305874f1e2bcdaf372e24ef7c699c762f
SHA2560a1d2a840a6233fa34d611c69bcdf4e65e31ac837e0604737206189c6550940c
SHA512f355ba2ead73e350ae0663176e01b44d0b702507a809eb73e6b61f23a72152b716f9e4070d757d5fa69bfb952496c13ba813f0036107fae831dc299fd37b4a66
-
Filesize
72KB
MD585c64e329e7f12abe91c59a80dd0c410
SHA145f5b55305874f1e2bcdaf372e24ef7c699c762f
SHA2560a1d2a840a6233fa34d611c69bcdf4e65e31ac837e0604737206189c6550940c
SHA512f355ba2ead73e350ae0663176e01b44d0b702507a809eb73e6b61f23a72152b716f9e4070d757d5fa69bfb952496c13ba813f0036107fae831dc299fd37b4a66
-
Filesize
72KB
MD55c1aa2c0e1ec6b630344a8b5c4521fc7
SHA1c3b101c9ab91c424ec89fd540bc65b1aa907abf5
SHA2568ce2c5281aa0856f84da53dc61604d3ff5bbf12d2b5fc647d9780171ac36b5e8
SHA51234f07958ac65068ae95dbd956af5e39e9b20d83de9208b0fcff671cc915b3feec8560e36785353432eebce9a983bf20da0bcf9d3a9f324b5d6e4f2525100ff61
-
Filesize
72KB
MD55c1aa2c0e1ec6b630344a8b5c4521fc7
SHA1c3b101c9ab91c424ec89fd540bc65b1aa907abf5
SHA2568ce2c5281aa0856f84da53dc61604d3ff5bbf12d2b5fc647d9780171ac36b5e8
SHA51234f07958ac65068ae95dbd956af5e39e9b20d83de9208b0fcff671cc915b3feec8560e36785353432eebce9a983bf20da0bcf9d3a9f324b5d6e4f2525100ff61
-
Filesize
72KB
MD59a52d29bd5c5cd87d584f30e357f727a
SHA180f698a7c760325ee63b5ba0ed7aa72563b89d52
SHA256001be9014e2c26745ca705e53bf4b91b4de7635a4e988fea5b01b3b335e8ee81
SHA512d868921e1e9ff96692b3aa70dbd30d79818da1ed54f4a0791bad9c646e36e25e204b95e1dd3264f32d2c33a34798de6282cc5fb9edf6307092449344f2cd17e4
-
Filesize
72KB
MD59a52d29bd5c5cd87d584f30e357f727a
SHA180f698a7c760325ee63b5ba0ed7aa72563b89d52
SHA256001be9014e2c26745ca705e53bf4b91b4de7635a4e988fea5b01b3b335e8ee81
SHA512d868921e1e9ff96692b3aa70dbd30d79818da1ed54f4a0791bad9c646e36e25e204b95e1dd3264f32d2c33a34798de6282cc5fb9edf6307092449344f2cd17e4
-
Filesize
72KB
MD5ee71f7189a42278bd349f10ef3434bca
SHA195f5a474526a78bd9fbadc9d3f13c059ce05681f
SHA25663a0bc2bbe07882531086f19e8b11868044f6b8c87afc918b01f52dc108c34c8
SHA5126cc965dd2ca0740b7baec0add6c2bebf50184d73b3e6dcd7e5a766444ababdd1b78ff16fb19c854b2c25b873f0f530140be53b7c6e0dd86e802d696e40fe8b22
-
Filesize
72KB
MD5ee71f7189a42278bd349f10ef3434bca
SHA195f5a474526a78bd9fbadc9d3f13c059ce05681f
SHA25663a0bc2bbe07882531086f19e8b11868044f6b8c87afc918b01f52dc108c34c8
SHA5126cc965dd2ca0740b7baec0add6c2bebf50184d73b3e6dcd7e5a766444ababdd1b78ff16fb19c854b2c25b873f0f530140be53b7c6e0dd86e802d696e40fe8b22
-
Filesize
72KB
MD59a52d29bd5c5cd87d584f30e357f727a
SHA180f698a7c760325ee63b5ba0ed7aa72563b89d52
SHA256001be9014e2c26745ca705e53bf4b91b4de7635a4e988fea5b01b3b335e8ee81
SHA512d868921e1e9ff96692b3aa70dbd30d79818da1ed54f4a0791bad9c646e36e25e204b95e1dd3264f32d2c33a34798de6282cc5fb9edf6307092449344f2cd17e4
-
Filesize
72KB
MD59a52d29bd5c5cd87d584f30e357f727a
SHA180f698a7c760325ee63b5ba0ed7aa72563b89d52
SHA256001be9014e2c26745ca705e53bf4b91b4de7635a4e988fea5b01b3b335e8ee81
SHA512d868921e1e9ff96692b3aa70dbd30d79818da1ed54f4a0791bad9c646e36e25e204b95e1dd3264f32d2c33a34798de6282cc5fb9edf6307092449344f2cd17e4
-
Filesize
72KB
MD55af0aa042a95875a0b241870f0eed04b
SHA1a1bf2cd56dca7961910762552a3ea3ac68228fab
SHA25656105a619abfe3c5413ab079d7a97003c885a85d9b8c5c991aed8121ea68759e
SHA512ce64db13a1ea47b2416df7cd27b4e9da8d86f6b44d949aad6f2cb8ca7af63e37ed0ec4c3a9124bd71c23183716568f92d897431d843ed12be0d58dec43fc6e55
-
Filesize
72KB
MD55af0aa042a95875a0b241870f0eed04b
SHA1a1bf2cd56dca7961910762552a3ea3ac68228fab
SHA25656105a619abfe3c5413ab079d7a97003c885a85d9b8c5c991aed8121ea68759e
SHA512ce64db13a1ea47b2416df7cd27b4e9da8d86f6b44d949aad6f2cb8ca7af63e37ed0ec4c3a9124bd71c23183716568f92d897431d843ed12be0d58dec43fc6e55
-
Filesize
72KB
MD5a71699b645fd0a8785ae451613cc8613
SHA1bde39f72efd889d8ab3c2a859dcf46c358c4704d
SHA2561546bfed91635c23b66c4a35ff53df6d88cbb317addc00480f93f9141030f618
SHA5125556178954636d9e2c6e31c65ac4a5ef1103bd6257cb7989896da8882add1234c51e1cba464ade946cfe271330ad96971e1baebfd36aae25d80392857ae81f52
-
Filesize
72KB
MD5a71699b645fd0a8785ae451613cc8613
SHA1bde39f72efd889d8ab3c2a859dcf46c358c4704d
SHA2561546bfed91635c23b66c4a35ff53df6d88cbb317addc00480f93f9141030f618
SHA5125556178954636d9e2c6e31c65ac4a5ef1103bd6257cb7989896da8882add1234c51e1cba464ade946cfe271330ad96971e1baebfd36aae25d80392857ae81f52
-
Filesize
72KB
MD5ee71f7189a42278bd349f10ef3434bca
SHA195f5a474526a78bd9fbadc9d3f13c059ce05681f
SHA25663a0bc2bbe07882531086f19e8b11868044f6b8c87afc918b01f52dc108c34c8
SHA5126cc965dd2ca0740b7baec0add6c2bebf50184d73b3e6dcd7e5a766444ababdd1b78ff16fb19c854b2c25b873f0f530140be53b7c6e0dd86e802d696e40fe8b22
-
Filesize
72KB
MD5ee71f7189a42278bd349f10ef3434bca
SHA195f5a474526a78bd9fbadc9d3f13c059ce05681f
SHA25663a0bc2bbe07882531086f19e8b11868044f6b8c87afc918b01f52dc108c34c8
SHA5126cc965dd2ca0740b7baec0add6c2bebf50184d73b3e6dcd7e5a766444ababdd1b78ff16fb19c854b2c25b873f0f530140be53b7c6e0dd86e802d696e40fe8b22
-
Filesize
72KB
MD587e5093e0adb95bf3107deb19ef8c737
SHA16d128f9ba051bfe47c7ec2d1cc2f707f65343e4d
SHA2563bc9ffd76ee7e3511a9387421a9d3d3b700a6a7a5b8cf2fd9390c0059fcd9e97
SHA512ee0fcb5af761b8491b3c0da12f921b20d8b11a8c9bbf447e4ce61d7538aca80697280c66af1873968c7bafaf9cb934587090ff070018574675313dcd48bc7d0f
-
Filesize
72KB
MD587e5093e0adb95bf3107deb19ef8c737
SHA16d128f9ba051bfe47c7ec2d1cc2f707f65343e4d
SHA2563bc9ffd76ee7e3511a9387421a9d3d3b700a6a7a5b8cf2fd9390c0059fcd9e97
SHA512ee0fcb5af761b8491b3c0da12f921b20d8b11a8c9bbf447e4ce61d7538aca80697280c66af1873968c7bafaf9cb934587090ff070018574675313dcd48bc7d0f
-
Filesize
72KB
MD52be426c67b4c6f3f80bfe387392b07b5
SHA19555eebe5da3e4103b7dd82fc227abb886d8b21b
SHA2568cf8f528766349972f8964baf032b54f485a81cfac0d7042946ae9ef763252d0
SHA512b51e5f67639a38b25f38a671fc76ac577d5920972337e4be26c5b651b7d816a111722ecddf49186093ae90d59aec3b0467cb6ff642627619cf78cd5b5c74cb1b
-
Filesize
72KB
MD52be426c67b4c6f3f80bfe387392b07b5
SHA19555eebe5da3e4103b7dd82fc227abb886d8b21b
SHA2568cf8f528766349972f8964baf032b54f485a81cfac0d7042946ae9ef763252d0
SHA512b51e5f67639a38b25f38a671fc76ac577d5920972337e4be26c5b651b7d816a111722ecddf49186093ae90d59aec3b0467cb6ff642627619cf78cd5b5c74cb1b
-
Filesize
72KB
MD53b1c4a881ee991ba34662475ba5e554c
SHA12a6644ce1ac0aceddd89feccd158b0123239d740
SHA256232fdb909532b8958ae1046ea6a6500c7d8fe267b23454842f0ddfa67f5495a5
SHA512ccdc38a835e62990c6e184393b78b23e00e122383af9dd6acf4470b0e956545b5d391ad42cccbf4ac6366589555d9f826ec71702c76da7267ab0c5ff744617bb
-
Filesize
72KB
MD53b1c4a881ee991ba34662475ba5e554c
SHA12a6644ce1ac0aceddd89feccd158b0123239d740
SHA256232fdb909532b8958ae1046ea6a6500c7d8fe267b23454842f0ddfa67f5495a5
SHA512ccdc38a835e62990c6e184393b78b23e00e122383af9dd6acf4470b0e956545b5d391ad42cccbf4ac6366589555d9f826ec71702c76da7267ab0c5ff744617bb
-
Filesize
72KB
MD56fbb3b467d238dbc7be29c8d7eae0674
SHA1f01868ad63355910e0c016d8be04a9a53f8645e8
SHA256aad5d0b65bdd36360a8d9df710f6210c42406925a7d388f9987a490bdaa78486
SHA512fbc989559b53548c9d4174cc21af10d968a5f0c10a0d5c924bc731578fc90e3c34895aab2b6aafc6f9f8b18da6f4234a581a4910348cc99843ab7c05da2b9aea
-
Filesize
72KB
MD56fbb3b467d238dbc7be29c8d7eae0674
SHA1f01868ad63355910e0c016d8be04a9a53f8645e8
SHA256aad5d0b65bdd36360a8d9df710f6210c42406925a7d388f9987a490bdaa78486
SHA512fbc989559b53548c9d4174cc21af10d968a5f0c10a0d5c924bc731578fc90e3c34895aab2b6aafc6f9f8b18da6f4234a581a4910348cc99843ab7c05da2b9aea
-
Filesize
72KB
MD5e358885b4b52b052f4aa22a67e816929
SHA1b8e457e3f19cbceb71e6de9e6bf183bcf9137f47
SHA256f65f3406f533650407ab614bc0b43e2cb9df20bd0929e2f0f1f784e14ab90971
SHA5128d60ce254167ccd8e1050572940e06c82356f436002efb674f18eeaa762881acdab565e1f938ab899b451c6e518138833e7d7534fbcf850bd17a5e3b902d962c
-
Filesize
72KB
MD5e358885b4b52b052f4aa22a67e816929
SHA1b8e457e3f19cbceb71e6de9e6bf183bcf9137f47
SHA256f65f3406f533650407ab614bc0b43e2cb9df20bd0929e2f0f1f784e14ab90971
SHA5128d60ce254167ccd8e1050572940e06c82356f436002efb674f18eeaa762881acdab565e1f938ab899b451c6e518138833e7d7534fbcf850bd17a5e3b902d962c
-
Filesize
72KB
MD587e5093e0adb95bf3107deb19ef8c737
SHA16d128f9ba051bfe47c7ec2d1cc2f707f65343e4d
SHA2563bc9ffd76ee7e3511a9387421a9d3d3b700a6a7a5b8cf2fd9390c0059fcd9e97
SHA512ee0fcb5af761b8491b3c0da12f921b20d8b11a8c9bbf447e4ce61d7538aca80697280c66af1873968c7bafaf9cb934587090ff070018574675313dcd48bc7d0f
-
Filesize
72KB
MD587e5093e0adb95bf3107deb19ef8c737
SHA16d128f9ba051bfe47c7ec2d1cc2f707f65343e4d
SHA2563bc9ffd76ee7e3511a9387421a9d3d3b700a6a7a5b8cf2fd9390c0059fcd9e97
SHA512ee0fcb5af761b8491b3c0da12f921b20d8b11a8c9bbf447e4ce61d7538aca80697280c66af1873968c7bafaf9cb934587090ff070018574675313dcd48bc7d0f
-
Filesize
72KB
MD5c668262212153e78a869327c7c38ff54
SHA16b6ea1b1a2193bd5e7466fdf33ff17ce0fd2c33c
SHA256a0ded8ea2a428817780243094b84f2f5ffaa809cf9a6dbe26f85a1afdcb59519
SHA512a121502f2d637831ad870e7301bf72513f8217da56a9371737a2e04d72f08ade49c2678311c17b9f1a2be0d7671216420ac6696cf221524de80b36826963154f
-
Filesize
72KB
MD5c668262212153e78a869327c7c38ff54
SHA16b6ea1b1a2193bd5e7466fdf33ff17ce0fd2c33c
SHA256a0ded8ea2a428817780243094b84f2f5ffaa809cf9a6dbe26f85a1afdcb59519
SHA512a121502f2d637831ad870e7301bf72513f8217da56a9371737a2e04d72f08ade49c2678311c17b9f1a2be0d7671216420ac6696cf221524de80b36826963154f
-
Filesize
72KB
MD55866b9fc8b912e71da43754a74ec8719
SHA1221090ce610be5ecc475c6044c00b61d27a5f436
SHA256733751193f9b185b023b2a6fad88ca73808103906d074c71969dcc4dfe70b213
SHA5129a28f1fb41f93b43dd3b2fff85f5ca6ae6cc13f64e439e52170aca711ecab2450c2b1e4f7066ad86db48bd4d691c9e06f613c4ecbf69937b5d01a295d94d2d52
-
Filesize
72KB
MD55866b9fc8b912e71da43754a74ec8719
SHA1221090ce610be5ecc475c6044c00b61d27a5f436
SHA256733751193f9b185b023b2a6fad88ca73808103906d074c71969dcc4dfe70b213
SHA5129a28f1fb41f93b43dd3b2fff85f5ca6ae6cc13f64e439e52170aca711ecab2450c2b1e4f7066ad86db48bd4d691c9e06f613c4ecbf69937b5d01a295d94d2d52
-
Filesize
72KB
MD56215996ef5128abc47b840a156bbede4
SHA1003e026c18409844e1e1b7d50939fc046fe7ddf6
SHA2560c5d7345a48eac25049c70152ef5d48923da8d48e9ca5aa470a1b2ddebe7e0c2
SHA5121d50d7a750e1fb829b1ae5f1f417e6e82448c661ab206400655ac3b28c3b7da11561b7bd087c9e8c6830158120dffc277b2b88444d1217b1de5f26a45abfa695
-
Filesize
72KB
MD56215996ef5128abc47b840a156bbede4
SHA1003e026c18409844e1e1b7d50939fc046fe7ddf6
SHA2560c5d7345a48eac25049c70152ef5d48923da8d48e9ca5aa470a1b2ddebe7e0c2
SHA5121d50d7a750e1fb829b1ae5f1f417e6e82448c661ab206400655ac3b28c3b7da11561b7bd087c9e8c6830158120dffc277b2b88444d1217b1de5f26a45abfa695
-
Filesize
72KB
MD5aa0abddd3f3ca1ed0fc002a5e2fde8ae
SHA1e1756b527d025a19718e1727be94f86e614e08bb
SHA256df7e64487e0fc21518540579d9e0b7b30e6a1ffae09008c0b534ba8392138a89
SHA512e06f166ac14dec9abc9ff58798396e3c10a3e2ce0990049da144fc39a1cfa814bb1f423f263c2b5d0be71c17d8f24868d135cd09185f7f45849b6a884dd0f580
-
Filesize
72KB
MD5aa0abddd3f3ca1ed0fc002a5e2fde8ae
SHA1e1756b527d025a19718e1727be94f86e614e08bb
SHA256df7e64487e0fc21518540579d9e0b7b30e6a1ffae09008c0b534ba8392138a89
SHA512e06f166ac14dec9abc9ff58798396e3c10a3e2ce0990049da144fc39a1cfa814bb1f423f263c2b5d0be71c17d8f24868d135cd09185f7f45849b6a884dd0f580
-
Filesize
72KB
MD5c2b80d38b1c51012f20c268c972e0613
SHA1f798ecef84954ba6eb786193baf7aee728bd5830
SHA2560599e42ffe7fde0bc9f6352406f48809d30aa23f1cc5105df84fb2a628c68456
SHA512c45a3b9c27948b992c7f9a0410c8cd3f92ad1f082d19cbf3f000f5e8fb39dc2eceb2b36c060ca0d059572e7a78e74aa47a247fd1183ac942310f884fd056a26e
-
Filesize
72KB
MD5c2b80d38b1c51012f20c268c972e0613
SHA1f798ecef84954ba6eb786193baf7aee728bd5830
SHA2560599e42ffe7fde0bc9f6352406f48809d30aa23f1cc5105df84fb2a628c68456
SHA512c45a3b9c27948b992c7f9a0410c8cd3f92ad1f082d19cbf3f000f5e8fb39dc2eceb2b36c060ca0d059572e7a78e74aa47a247fd1183ac942310f884fd056a26e
-
Filesize
72KB
MD5d021957289863af2b9ff02233889cf63
SHA1001779d3e7a9616c7ec9269a7a1d1e4d45e98e35
SHA256ec364b9f2dcd3ca9058baed140bf5e14fed6a71dc0d4b50cebdd1523b3aeb73c
SHA51253574b50064f2f8387fd2c8515797c0271748275e2a0637014992a6dff70fc84eab0647f8ee16b6de8d46033e9fee41b69a88047ab9f7680cb423ae4b0f0aa75
-
Filesize
72KB
MD5d021957289863af2b9ff02233889cf63
SHA1001779d3e7a9616c7ec9269a7a1d1e4d45e98e35
SHA256ec364b9f2dcd3ca9058baed140bf5e14fed6a71dc0d4b50cebdd1523b3aeb73c
SHA51253574b50064f2f8387fd2c8515797c0271748275e2a0637014992a6dff70fc84eab0647f8ee16b6de8d46033e9fee41b69a88047ab9f7680cb423ae4b0f0aa75
-
Filesize
72KB
MD591f16b0ed8c170df74e1cd40966c7c80
SHA10db4ea93acefcc3ae817d2a8904bdcf0e83041cb
SHA25693bc045388092cbba47ddcb58e70167a03afb91c91a5c83f3e60c90895253869
SHA512c54683be4643d0142c0a9bbb27ec2887d5dda5cde9154a798b0b75174edcd4648b8683c93521536481f1af359c88758cfc537147560d1fd21f257ceef89ad26a
-
Filesize
72KB
MD591f16b0ed8c170df74e1cd40966c7c80
SHA10db4ea93acefcc3ae817d2a8904bdcf0e83041cb
SHA25693bc045388092cbba47ddcb58e70167a03afb91c91a5c83f3e60c90895253869
SHA512c54683be4643d0142c0a9bbb27ec2887d5dda5cde9154a798b0b75174edcd4648b8683c93521536481f1af359c88758cfc537147560d1fd21f257ceef89ad26a
-
Filesize
72KB
MD54a22b80bcf44d9e9d1aad77ba168abda
SHA13ff2b3186c01cb00ae52c9bc1ede38b47afbee39
SHA2562b8e7581ba98ee691c4e5c7c1413953f63fbac950bb55c56394d254299de6bb6
SHA512a246f47e2e333fb25e4086fb3eb80030c52c97a316af67d16b50fc74b9a9a0f217e7abef35427b240f5fba05ad03b0ec0afda4920f548a7197ca80600a100957
-
Filesize
72KB
MD54a22b80bcf44d9e9d1aad77ba168abda
SHA13ff2b3186c01cb00ae52c9bc1ede38b47afbee39
SHA2562b8e7581ba98ee691c4e5c7c1413953f63fbac950bb55c56394d254299de6bb6
SHA512a246f47e2e333fb25e4086fb3eb80030c52c97a316af67d16b50fc74b9a9a0f217e7abef35427b240f5fba05ad03b0ec0afda4920f548a7197ca80600a100957
-
Filesize
72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
Filesize
72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
Filesize
72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
Filesize
72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
Filesize
72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
Filesize
72KB
MD5d97b168edb3431b6c46f5bf7381fe63c
SHA15c482700aed59d49b1d5376a00dcf7d96439785d
SHA2565e9277371bb8ea4a657f725ab5122507ad82e0e3b759287e8a06342ccbffa595
SHA5126dde5bb3913d94ed73b552182da3779f05604e4b48181fda36f8925fff6df5281af39ef565e080ad124a6ead9bce5316b6f22df03eb88d47b748fa2ad538c64d
-
Filesize
72KB
MD581e8ba7368d775b07c5ddf1edd06ab7d
SHA114eafc792cfcaa3d69db40f8cc469cdb97b66455
SHA256f3a46f0720ee0cb4ec5e2d3c9759a9533d0a94b7f8a257b60eb1e02c88710f0b
SHA5122e71e89899d3af2341a91e2605aa896d1e1c95b17a19ed5eae4f5d2b908081ac3eac49eadb3733a1b706384d9d09145a84ae035b90b07c00cceb1b999ebca286
-
Filesize
72KB
MD581e8ba7368d775b07c5ddf1edd06ab7d
SHA114eafc792cfcaa3d69db40f8cc469cdb97b66455
SHA256f3a46f0720ee0cb4ec5e2d3c9759a9533d0a94b7f8a257b60eb1e02c88710f0b
SHA5122e71e89899d3af2341a91e2605aa896d1e1c95b17a19ed5eae4f5d2b908081ac3eac49eadb3733a1b706384d9d09145a84ae035b90b07c00cceb1b999ebca286
-
Filesize
72KB
MD5a7806f1da027b75ee07f1e04f7491806
SHA10e1f3470509525fea6ba801840d6f9cb350bc2f4
SHA25601b71970c12e9e27690aab93b5faa5b71b884bb0a57308fcb1c2a9305e75fe11
SHA5121cff0740e759fd603347e517ea7f2c152a4ab2d59540a1393aabf83c7a48e0804bedd4478eb943bd219ea3503a821fa3f7982d70f6d1ab34aa590b13247bcad3
-
Filesize
72KB
MD5a7806f1da027b75ee07f1e04f7491806
SHA10e1f3470509525fea6ba801840d6f9cb350bc2f4
SHA25601b71970c12e9e27690aab93b5faa5b71b884bb0a57308fcb1c2a9305e75fe11
SHA5121cff0740e759fd603347e517ea7f2c152a4ab2d59540a1393aabf83c7a48e0804bedd4478eb943bd219ea3503a821fa3f7982d70f6d1ab34aa590b13247bcad3
-
Filesize
72KB
MD52e880f853e6475a2cceafc4a8478b823
SHA19e59eac8e5f552d0fcd12bdc8f2224b68d718faf
SHA2563465ac1e8e916cf334cc138cef36b83ff83e8fb07b6edce9c99539b8c6ca848d
SHA5127fb0d3ab465c18a81d172eb737881070d1f20336a5aff5f258aea93cd3b08dbc3be798297ea6b5973e8f268157cca1f6cfc854c4c7fe1f4e7d54c7e770431e0d
-
Filesize
72KB
MD52e880f853e6475a2cceafc4a8478b823
SHA19e59eac8e5f552d0fcd12bdc8f2224b68d718faf
SHA2563465ac1e8e916cf334cc138cef36b83ff83e8fb07b6edce9c99539b8c6ca848d
SHA5127fb0d3ab465c18a81d172eb737881070d1f20336a5aff5f258aea93cd3b08dbc3be798297ea6b5973e8f268157cca1f6cfc854c4c7fe1f4e7d54c7e770431e0d
-
Filesize
72KB
MD541a6b9a281e0d4f85b968655e63d210b
SHA14373279de144cc8d50a1a2cb393ecf9afaa85fda
SHA2564cc83ffe9cb37060b3a3a839b8b324bbcc21452d7b64a18f0b745a9e42d2085c
SHA5123b6f6512835d7a75b39d1cb598048c98d259dfc2a10454856a78e0a4deb207ae9bc2d46d64e52b47b433ad4e5083af736239d9e9413f1afd537bd46d11ef2f81
-
Filesize
72KB
MD541a6b9a281e0d4f85b968655e63d210b
SHA14373279de144cc8d50a1a2cb393ecf9afaa85fda
SHA2564cc83ffe9cb37060b3a3a839b8b324bbcc21452d7b64a18f0b745a9e42d2085c
SHA5123b6f6512835d7a75b39d1cb598048c98d259dfc2a10454856a78e0a4deb207ae9bc2d46d64e52b47b433ad4e5083af736239d9e9413f1afd537bd46d11ef2f81