Analysis
-
max time kernel
192s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe
Resource
win10v2004-20221111-en
General
-
Target
69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe
-
Size
72KB
-
MD5
02a69279c3800530790e75f0889a2b7b
-
SHA1
b849ae90bb42d1e768a2f9847ff0fc5998d28db6
-
SHA256
69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2
-
SHA512
cf54eeed9a0370dd936a97eb1d779768b4066f3625078c483a604239d8fb79c23f73ec2d4eb3b8a898236d12f6592fbebc4effe683be8668d6c0d75ab10847e4
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2P:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPb
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 3176 backup.exe 2956 backup.exe 2840 backup.exe 3524 backup.exe 872 backup.exe 4820 backup.exe 3592 backup.exe 3560 backup.exe 4012 backup.exe 2104 backup.exe 4396 backup.exe 4152 backup.exe 4320 backup.exe 4904 backup.exe 3708 backup.exe 2060 backup.exe 4480 backup.exe 524 update.exe 4844 backup.exe 4960 System Restore.exe 1876 backup.exe 4008 backup.exe 1220 backup.exe 4708 backup.exe 1912 data.exe 2544 System Restore.exe 2904 backup.exe 3284 backup.exe 1560 update.exe 3152 backup.exe 948 backup.exe 332 backup.exe 3588 backup.exe 2820 backup.exe 2708 backup.exe 3448 backup.exe 4072 backup.exe 1564 backup.exe 3436 backup.exe 3796 backup.exe 4676 backup.exe 4808 backup.exe 1936 backup.exe 216 update.exe 2872 backup.exe 176 backup.exe 2148 backup.exe 4320 backup.exe 4368 backup.exe 1868 backup.exe 3540 backup.exe 4880 backup.exe 4720 backup.exe 1428 backup.exe 3708 backup.exe 3128 backup.exe 2620 System Restore.exe 5024 backup.exe 4288 backup.exe 2184 backup.exe 2884 backup.exe 4456 backup.exe 2580 backup.exe 4848 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe update.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\update.exe backup.exe File opened for modification C:\Program Files\Google\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe update.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe update.exe File opened for modification C:\Program Files\Microsoft Office\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\backup.exe data.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe backup.exe File opened for modification C:\Windows\appcompat\Programs\update.exe backup.exe File opened for modification C:\Windows\apppatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\AppReadiness\backup.exe backup.exe File opened for modification C:\Windows\apppatch\Custom\update.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 3176 backup.exe 2956 backup.exe 2840 backup.exe 3524 backup.exe 872 backup.exe 4820 backup.exe 3592 backup.exe 3560 backup.exe 4012 backup.exe 2104 backup.exe 4396 backup.exe 4152 backup.exe 4320 backup.exe 4904 backup.exe 3708 backup.exe 2060 backup.exe 4480 backup.exe 524 update.exe 4844 backup.exe 4960 System Restore.exe 1876 backup.exe 4008 backup.exe 1220 backup.exe 4708 backup.exe 2904 backup.exe 1912 data.exe 2544 System Restore.exe 3284 backup.exe 3152 backup.exe 1560 update.exe 948 backup.exe 332 backup.exe 3588 backup.exe 3448 backup.exe 2820 backup.exe 4072 backup.exe 1564 backup.exe 3796 backup.exe 3436 backup.exe 4676 backup.exe 2872 backup.exe 216 update.exe 4808 backup.exe 1936 backup.exe 176 backup.exe 2148 backup.exe 4320 backup.exe 4368 backup.exe 1868 backup.exe 3540 backup.exe 4880 backup.exe 4720 backup.exe 3708 backup.exe 2620 System Restore.exe 3128 backup.exe 4288 backup.exe 1428 backup.exe 5024 backup.exe 2884 backup.exe 4456 backup.exe 2184 backup.exe 2580 backup.exe 4848 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 3176 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 81 PID 3204 wrote to memory of 3176 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 81 PID 3204 wrote to memory of 3176 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 81 PID 3204 wrote to memory of 2956 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 82 PID 3204 wrote to memory of 2956 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 82 PID 3204 wrote to memory of 2956 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 82 PID 3204 wrote to memory of 2840 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 83 PID 3204 wrote to memory of 2840 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 83 PID 3204 wrote to memory of 2840 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 83 PID 3176 wrote to memory of 3524 3176 backup.exe 84 PID 3176 wrote to memory of 3524 3176 backup.exe 84 PID 3176 wrote to memory of 3524 3176 backup.exe 84 PID 3204 wrote to memory of 872 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 85 PID 3204 wrote to memory of 872 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 85 PID 3204 wrote to memory of 872 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 85 PID 3524 wrote to memory of 4820 3524 backup.exe 86 PID 3524 wrote to memory of 4820 3524 backup.exe 86 PID 3524 wrote to memory of 4820 3524 backup.exe 86 PID 3204 wrote to memory of 3592 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 87 PID 3204 wrote to memory of 3592 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 87 PID 3204 wrote to memory of 3592 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 87 PID 3524 wrote to memory of 3560 3524 backup.exe 88 PID 3524 wrote to memory of 3560 3524 backup.exe 88 PID 3524 wrote to memory of 3560 3524 backup.exe 88 PID 3204 wrote to memory of 4012 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 89 PID 3204 wrote to memory of 4012 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 89 PID 3204 wrote to memory of 4012 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 89 PID 3524 wrote to memory of 2104 3524 backup.exe 90 PID 3524 wrote to memory of 2104 3524 backup.exe 90 PID 3524 wrote to memory of 2104 3524 backup.exe 90 PID 3204 wrote to memory of 4396 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 91 PID 3204 wrote to memory of 4396 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 91 PID 3204 wrote to memory of 4396 3204 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe 91 PID 2104 wrote to memory of 4152 2104 backup.exe 92 PID 2104 wrote to memory of 4152 2104 backup.exe 92 PID 2104 wrote to memory of 4152 2104 backup.exe 92 PID 4152 wrote to memory of 4320 4152 backup.exe 93 PID 4152 wrote to memory of 4320 4152 backup.exe 93 PID 4152 wrote to memory of 4320 4152 backup.exe 93 PID 2104 wrote to memory of 4904 2104 backup.exe 94 PID 2104 wrote to memory of 4904 2104 backup.exe 94 PID 2104 wrote to memory of 4904 2104 backup.exe 94 PID 4904 wrote to memory of 3708 4904 backup.exe 95 PID 4904 wrote to memory of 3708 4904 backup.exe 95 PID 4904 wrote to memory of 3708 4904 backup.exe 95 PID 4904 wrote to memory of 2060 4904 backup.exe 96 PID 4904 wrote to memory of 2060 4904 backup.exe 96 PID 4904 wrote to memory of 2060 4904 backup.exe 96 PID 2060 wrote to memory of 4480 2060 backup.exe 97 PID 2060 wrote to memory of 4480 2060 backup.exe 97 PID 2060 wrote to memory of 4480 2060 backup.exe 97 PID 2060 wrote to memory of 524 2060 backup.exe 98 PID 2060 wrote to memory of 524 2060 backup.exe 98 PID 2060 wrote to memory of 524 2060 backup.exe 98 PID 3524 wrote to memory of 4844 3524 backup.exe 99 PID 3524 wrote to memory of 4844 3524 backup.exe 99 PID 3524 wrote to memory of 4844 3524 backup.exe 99 PID 2104 wrote to memory of 4960 2104 backup.exe 101 PID 2104 wrote to memory of 4960 2104 backup.exe 101 PID 2104 wrote to memory of 4960 2104 backup.exe 101 PID 4904 wrote to memory of 1876 4904 backup.exe 100 PID 4904 wrote to memory of 1876 4904 backup.exe 100 PID 4904 wrote to memory of 1876 4904 backup.exe 100 PID 2060 wrote to memory of 4008 2060 backup.exe 102 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe"C:\Users\Admin\AppData\Local\Temp\69f981f61be0ff5e1c907316308dc38ed0333cbc95f9a9a346c69620f97a90f2.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\473338337\backup.exeC:\Users\Admin\AppData\Local\Temp\473338337\backup.exe C:\Users\Admin\AppData\Local\Temp\473338337\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4820
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3560
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4320
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2060 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480
-
-
C:\Program Files\Common Files\microsoft shared\ink\update.exe"C:\Program Files\Common Files\microsoft shared\ink\update.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:948
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Disables RegEdit via registry modification
PID:1684
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3972
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- System policy modification
PID:1788
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Disables RegEdit via registry modification
PID:656
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
PID:1840
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
PID:2016
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:60
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵PID:2588
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4008 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\update.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\update.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2872
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:3224
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵PID:3172
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4880 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3472
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:632
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
PID:872
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
PID:1516
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵PID:1284
-
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵PID:220
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Drops file in Program Files directory
PID:3880 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3128
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\data.exe"C:\Program Files\Common Files\microsoft shared\VC\data.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵PID:1736
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
C:\Program Files\Common Files\System\data.exe"C:\Program Files\Common Files\System\data.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:332 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:2708
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3796
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4808
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5024
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:396
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:2200
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3540
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:4980
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- System policy modification
PID:2888
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- System policy modification
PID:1220
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵
- Disables RegEdit via registry modification
PID:1172
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1608
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- System policy modification
PID:2584 -
C:\Program Files\Common Files\System\msadc\de-DE\backup.exe"C:\Program Files\Common Files\System\msadc\de-DE\backup.exe" C:\Program Files\Common Files\System\msadc\de-DE\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3624
-
-
C:\Program Files\Common Files\System\msadc\en-US\backup.exe"C:\Program Files\Common Files\System\msadc\en-US\backup.exe" C:\Program Files\Common Files\System\msadc\en-US\8⤵PID:1304
-
-
C:\Program Files\Common Files\System\msadc\es-ES\backup.exe"C:\Program Files\Common Files\System\msadc\es-ES\backup.exe" C:\Program Files\Common Files\System\msadc\es-ES\8⤵PID:2480
-
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:4712
-
-
-
-
C:\Program Files\Google\System Restore.exe"C:\Program Files\Google\System Restore.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Program Files\Google\Chrome\System Restore.exe"C:\Program Files\Google\Chrome\System Restore.exe" C:\Program Files\Google\Chrome\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2544 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4072 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:176 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3128
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3372
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Disables RegEdit via registry modification
PID:1804
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Disables RegEdit via registry modification
PID:2952
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
PID:5028
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- System policy modification
PID:3612
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Disables RegEdit via registry modification
PID:3708 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:2932 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵PID:5072
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2228
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
PID:1936
-
-
C:\Program Files\Internet Explorer\fr-FR\System Restore.exe"C:\Program Files\Internet Explorer\fr-FR\System Restore.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:2840
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:3928
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
PID:776
-
-
C:\Program Files\Internet Explorer\ja-JP\System Restore.exe"C:\Program Files\Internet Explorer\ja-JP\System Restore.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:3152
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:2344
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:3796
-
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Drops file in Program Files directory
PID:3812 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵PID:2376
-
-
C:\Program Files\Java\jdk1.8.0_66\db\System Restore.exe"C:\Program Files\Java\jdk1.8.0_66\db\System Restore.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- System policy modification
PID:2244 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1796
-
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵PID:4796
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵PID:4284
-
-
-
C:\Program Files\Java\jre1.8.0_66\update.exe"C:\Program Files\Java\jre1.8.0_66\update.exe" C:\Program Files\Java\jre1.8.0_66\6⤵PID:2748
-
-
-
C:\Program Files\Microsoft Office\System Restore.exe"C:\Program Files\Microsoft Office\System Restore.exe" C:\Program Files\Microsoft Office\5⤵PID:4424
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4844 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1220 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3152 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3436 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:216 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3708 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3960
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵PID:4732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Drops file in Program Files directory
PID:2236
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Drops file in Program Files directory
PID:4980 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2768
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\8⤵PID:1708
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\8⤵PID:3080
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1300 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵PID:3888
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵PID:4260
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵
- Modifies visibility of file extensions in Explorer
PID:1764 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3132 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\10⤵
- Disables RegEdit via registry modification
PID:3172
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\10⤵
- Drops file in Program Files directory
PID:3212 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\11⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3956
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\11⤵PID:4228
-
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\7⤵
- Disables RegEdit via registry modification
PID:2096 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\8⤵
- System policy modification
PID:228
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Drops file in Program Files directory
PID:744 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Drops file in Program Files directory
PID:3324
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1568 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- Modifies visibility of file extensions in Explorer
PID:1164
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:4664 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\8⤵
- System policy modification
PID:2356
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\7⤵PID:4676
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\8⤵
- Disables RegEdit via registry modification
PID:4188
-
-
-
-
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵
- System policy modification
PID:4052 -
C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe"C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe" C:\Program Files (x86)\Common Files\Java\Java Update\7⤵
- Modifies visibility of file extensions in Explorer
PID:5052
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3620 -
C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\7⤵PID:3560
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\update.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\update.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:5032 -
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1156
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\ink\en-US\8⤵PID:4076
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:1812
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\7⤵PID:760
-
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:4788
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3204 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:3956
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
PID:2344
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2468
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵
- System policy modification
PID:2516 -
C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe" C:\Program Files (x86)\Google\Update\1.3.36.71\7⤵
- System policy modification
PID:1704
-
-
C:\Program Files (x86)\Google\Update\Download\backup.exe"C:\Program Files (x86)\Google\Update\Download\backup.exe" C:\Program Files (x86)\Google\Update\Download\7⤵PID:4260
-
-
C:\Program Files (x86)\Google\Update\Install\backup.exe"C:\Program Files (x86)\Google\Update\Install\backup.exe" C:\Program Files (x86)\Google\Update\Install\7⤵PID:4360
-
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1524
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2904 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3448 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4676
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4720
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1340
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:2608
-
-
C:\Users\Admin\Music\update.exeC:\Users\Admin\Music\update.exe C:\Users\Admin\Music\6⤵PID:3948
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:4476
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3224
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2788 -
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\7⤵
- Modifies visibility of file extensions in Explorer
PID:1564
-
-
C:\Users\Admin\Pictures\Saved Pictures\backup.exe"C:\Users\Admin\Pictures\Saved Pictures\backup.exe" C:\Users\Admin\Pictures\Saved Pictures\7⤵
- Modifies visibility of file extensions in Explorer
PID:3540
-
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:2376
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4288 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3716
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:1564
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4108
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵PID:3696
-
-
C:\Users\Public\Videos\data.exeC:\Users\Public\Videos\data.exe C:\Users\Public\Videos\6⤵
- Modifies visibility of file extensions in Explorer
PID:2132
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4368 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4608
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Drops file in Windows directory
PID:4516 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Drops file in Windows directory
PID:2748 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4468
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵
- Modifies visibility of file extensions in Explorer
PID:4880
-
-
C:\Windows\appcompat\Programs\update.exeC:\Windows\appcompat\Programs\update.exe C:\Windows\appcompat\Programs\6⤵PID:3984
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:2916 -
C:\Windows\apppatch\AppPatch64\backup.exeC:\Windows\apppatch\AppPatch64\backup.exe C:\Windows\apppatch\AppPatch64\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4304
-
-
-
C:\Windows\AppReadiness\backup.exeC:\Windows\AppReadiness\backup.exe C:\Windows\AppReadiness\5⤵PID:4040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4396
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\1⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2728
-
C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\backup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\backup.exe" C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\1⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD52e0b3c6fc00a23707fed03ccd9f3db75
SHA1acd972bb44d90cfeb5a8442428b27383e3abf897
SHA256775d27c239a15360f10f8bf18e6a959f42fea50d553fa1bd614df29550dd928b
SHA512015578c81503de270af0fa6fd51c11c6a82a9f30a2a4a5a5d50165bbdd7d79248419492535f62caa622f1c3eed7e582c85610df351c860873b20cd9579687541
-
Filesize
72KB
MD52e0b3c6fc00a23707fed03ccd9f3db75
SHA1acd972bb44d90cfeb5a8442428b27383e3abf897
SHA256775d27c239a15360f10f8bf18e6a959f42fea50d553fa1bd614df29550dd928b
SHA512015578c81503de270af0fa6fd51c11c6a82a9f30a2a4a5a5d50165bbdd7d79248419492535f62caa622f1c3eed7e582c85610df351c860873b20cd9579687541
-
Filesize
72KB
MD50c455d4d3ff43f7b06ea86354812af47
SHA18ccdba8351dd5ade4cdeb0ad5fb8c563337a5810
SHA2560cecffd5ac294f73df9259d4c408d57ff03a806871382a1dbe70d9cff339b6a7
SHA51250ebe5fb3db9b640fb97e3e63cda59c80182e6d9535a31f783da28e86d54970ea252770c013a371a7f6fe3f364bb9057628445c6b15b7739dafba887e7ec3998
-
Filesize
72KB
MD50c455d4d3ff43f7b06ea86354812af47
SHA18ccdba8351dd5ade4cdeb0ad5fb8c563337a5810
SHA2560cecffd5ac294f73df9259d4c408d57ff03a806871382a1dbe70d9cff339b6a7
SHA51250ebe5fb3db9b640fb97e3e63cda59c80182e6d9535a31f783da28e86d54970ea252770c013a371a7f6fe3f364bb9057628445c6b15b7739dafba887e7ec3998
-
Filesize
72KB
MD531ddfad4dc0223b0c4ee75048d685643
SHA1ce98d97e2d3b07690821a107cdb5081e2108e7a5
SHA25657285b43120fe411984ecd0ea93c0f6c4c62408fa3a7d336cb2928b78bb783d9
SHA512f39a7b6e85a488315e0a26637563abb52b7db1ad1c0650f912e69f9769e5de088e6b74945b0a6a70f1d948ae0a8eb83958aa3866b43173b71ccb2d1304a875c9
-
Filesize
72KB
MD531ddfad4dc0223b0c4ee75048d685643
SHA1ce98d97e2d3b07690821a107cdb5081e2108e7a5
SHA25657285b43120fe411984ecd0ea93c0f6c4c62408fa3a7d336cb2928b78bb783d9
SHA512f39a7b6e85a488315e0a26637563abb52b7db1ad1c0650f912e69f9769e5de088e6b74945b0a6a70f1d948ae0a8eb83958aa3866b43173b71ccb2d1304a875c9
-
Filesize
72KB
MD55e83da42bb45c8a8daba8b6d89efbc61
SHA11a5f2337ee55c2ca2fe9197ed78b187a38b18b5d
SHA256045cb4ada50770bfdcc6a59bccd8ed04c67c92ecb5c0edcd99c858f4c3536052
SHA5121484d5920510271412237c9b996c6dea8dc19f8f81ac1604015d0fb1abc64fe6cf136ea675d0ecd90ec40ece4419bcb68738d66933cf796bc1075e550b7c1a69
-
Filesize
72KB
MD55e83da42bb45c8a8daba8b6d89efbc61
SHA11a5f2337ee55c2ca2fe9197ed78b187a38b18b5d
SHA256045cb4ada50770bfdcc6a59bccd8ed04c67c92ecb5c0edcd99c858f4c3536052
SHA5121484d5920510271412237c9b996c6dea8dc19f8f81ac1604015d0fb1abc64fe6cf136ea675d0ecd90ec40ece4419bcb68738d66933cf796bc1075e550b7c1a69
-
Filesize
72KB
MD5ee664358cfdfb038e9a7237916431662
SHA1c241348da16ad18752264483f272f887666abebe
SHA256c651c7b616dffa5a413b6f4fddd781cd4308bce46af7bc05b04adba246497598
SHA5120d33d88f70e46fab08dd6c13c8f09133c12fa81f74c5c4d4ffcf257a5639d65741e901ac86bb68f93d6263f7a5d995da2c28c63418bd4b8422ae9d717ec4db92
-
Filesize
72KB
MD5ee664358cfdfb038e9a7237916431662
SHA1c241348da16ad18752264483f272f887666abebe
SHA256c651c7b616dffa5a413b6f4fddd781cd4308bce46af7bc05b04adba246497598
SHA5120d33d88f70e46fab08dd6c13c8f09133c12fa81f74c5c4d4ffcf257a5639d65741e901ac86bb68f93d6263f7a5d995da2c28c63418bd4b8422ae9d717ec4db92
-
Filesize
72KB
MD530e2d322f4db48b8818ed08c2014c392
SHA169c3a7cd5ce5db19eda6bfb8d0cfeaaf847a285f
SHA256ab7335463473fa36a5d539e9b7c81cccfe149b42fdb7e56a36eba7b71c7991a7
SHA5126bd63dafb988b0508dd5d4cc107e043b2117e6c5bfc8426e74d0963fa2e9298468f555f2854d17d1273ea60ed2c2c09aa227629991146983b7663ab8fd8a3faf
-
Filesize
72KB
MD530e2d322f4db48b8818ed08c2014c392
SHA169c3a7cd5ce5db19eda6bfb8d0cfeaaf847a285f
SHA256ab7335463473fa36a5d539e9b7c81cccfe149b42fdb7e56a36eba7b71c7991a7
SHA5126bd63dafb988b0508dd5d4cc107e043b2117e6c5bfc8426e74d0963fa2e9298468f555f2854d17d1273ea60ed2c2c09aa227629991146983b7663ab8fd8a3faf
-
Filesize
72KB
MD56cf0bb93b1fcb890c7b106fba1325bc2
SHA147384e1ab97b19dd62781f5b20e553b9a9828fb9
SHA256ea67e5c8669704dfb114239680adc23c268e654a606c2a32c3bf30ae1aa611c2
SHA5123fc5a42bc9fe7107583a43861a908faa0b71ee339c73415cd725535246a255e3521c7ca8b27b77a42bc88e96da6852d7827527307cff38666c52c30ee41b2237
-
Filesize
72KB
MD56cf0bb93b1fcb890c7b106fba1325bc2
SHA147384e1ab97b19dd62781f5b20e553b9a9828fb9
SHA256ea67e5c8669704dfb114239680adc23c268e654a606c2a32c3bf30ae1aa611c2
SHA5123fc5a42bc9fe7107583a43861a908faa0b71ee339c73415cd725535246a255e3521c7ca8b27b77a42bc88e96da6852d7827527307cff38666c52c30ee41b2237
-
Filesize
72KB
MD5f017fa292f2157b37e8fbda498bb59e1
SHA158409bbd54c11fbadd8ba9aa3b942484bdd74edb
SHA25675da91aa689615204751610d2ea5be242a27b223bf784f47d4b36d03028c1a68
SHA5123fe68859db7c120181c2e21df027e12c37564284da979692bbe6f77224b1aa91c9ad371216c2169de1430b70b5879fe882870a92453eb7f531e91ce354cc12cb
-
Filesize
72KB
MD5f017fa292f2157b37e8fbda498bb59e1
SHA158409bbd54c11fbadd8ba9aa3b942484bdd74edb
SHA25675da91aa689615204751610d2ea5be242a27b223bf784f47d4b36d03028c1a68
SHA5123fe68859db7c120181c2e21df027e12c37564284da979692bbe6f77224b1aa91c9ad371216c2169de1430b70b5879fe882870a92453eb7f531e91ce354cc12cb
-
Filesize
72KB
MD5394d5653c8fd9a27d8ba7041c443a35e
SHA1b7dd0b755a89dd4dd6e576e9da3978e5bfe22326
SHA256ef115aac5cc5cddce19cbce11cf277a0f72c144772d4563c53139975212ed0ba
SHA5124f1e831c7c4010d571948bdcaacbb51b617124e7ad9fe464e6811ea598a4782b760804c05f9220ecfcf829de2be8fec17b780393b53e2bcdca2ec015b9f64f47
-
Filesize
72KB
MD5394d5653c8fd9a27d8ba7041c443a35e
SHA1b7dd0b755a89dd4dd6e576e9da3978e5bfe22326
SHA256ef115aac5cc5cddce19cbce11cf277a0f72c144772d4563c53139975212ed0ba
SHA5124f1e831c7c4010d571948bdcaacbb51b617124e7ad9fe464e6811ea598a4782b760804c05f9220ecfcf829de2be8fec17b780393b53e2bcdca2ec015b9f64f47
-
Filesize
72KB
MD52033e93b2f4f4e82d259147d8ee623ac
SHA1c3bbb69e3086ea40c94b981de805679bdef67460
SHA2562ed5e6b65e19505eba1e11abf6a3d5efb2501cca261e736f32e69acb341c19d5
SHA512937cc4d81781c28c849e88b106a65bd39da59b1e747f51ef56888d72d6bb03f4b7322f5fc1082be657b1bac8b156ffa747de659e01e4fbb7d9d4f70b5868b713
-
Filesize
72KB
MD52033e93b2f4f4e82d259147d8ee623ac
SHA1c3bbb69e3086ea40c94b981de805679bdef67460
SHA2562ed5e6b65e19505eba1e11abf6a3d5efb2501cca261e736f32e69acb341c19d5
SHA512937cc4d81781c28c849e88b106a65bd39da59b1e747f51ef56888d72d6bb03f4b7322f5fc1082be657b1bac8b156ffa747de659e01e4fbb7d9d4f70b5868b713
-
Filesize
72KB
MD59e2e13dbc7c800024b07bd34405dea00
SHA10e212626b211cb402f85ca34b5173415e5473652
SHA256e321515e9395a53ae94d6be038a476e127250335b2e214f3d7b0dcb8490f86e5
SHA5125dce9d9698421014e987a7ba996ff004a168e390854ddddb54637c583f5efaaa6be2d6a0ace2d9eda51444f4a6afeca2406c68c41e7dccb5e9a47e0dfa5b36b0
-
Filesize
72KB
MD59e2e13dbc7c800024b07bd34405dea00
SHA10e212626b211cb402f85ca34b5173415e5473652
SHA256e321515e9395a53ae94d6be038a476e127250335b2e214f3d7b0dcb8490f86e5
SHA5125dce9d9698421014e987a7ba996ff004a168e390854ddddb54637c583f5efaaa6be2d6a0ace2d9eda51444f4a6afeca2406c68c41e7dccb5e9a47e0dfa5b36b0
-
Filesize
72KB
MD563587dd2cab2ee84cdc3d8428fcfc4ee
SHA1c51c1e0251c503a54ad7aa9d920930b0f6ac13d2
SHA25625023b998c67368926324d6b3075032d4da5666f948cb0e01793cb58fdf0e33a
SHA5122042d89ad7cefbf2214bc51522bcb07a7f5ce1f812e936ebe720ac7065b92f65c9521c8aba51485c1bcfdf9500b9d26fa43e3541c8b4b39b6455172b25248f31
-
Filesize
72KB
MD563587dd2cab2ee84cdc3d8428fcfc4ee
SHA1c51c1e0251c503a54ad7aa9d920930b0f6ac13d2
SHA25625023b998c67368926324d6b3075032d4da5666f948cb0e01793cb58fdf0e33a
SHA5122042d89ad7cefbf2214bc51522bcb07a7f5ce1f812e936ebe720ac7065b92f65c9521c8aba51485c1bcfdf9500b9d26fa43e3541c8b4b39b6455172b25248f31
-
Filesize
72KB
MD5620cf902d4174b08672733482382fa46
SHA1c31d06a187efdce9e462c293bdafc8eb607a7148
SHA256acefe1d1d1c55c74a5780632eda99c10f6dbe46a20e485787445985982af49ce
SHA5127fd3e6e431df9d03dd5c7f05cca1ddc916c3e3ed7eae06ddcaa624057fdb8df0959218ba7f5186d09b964bf70bb4614cd8eb135cc48d65769fb692a530aa6fb8
-
Filesize
72KB
MD5620cf902d4174b08672733482382fa46
SHA1c31d06a187efdce9e462c293bdafc8eb607a7148
SHA256acefe1d1d1c55c74a5780632eda99c10f6dbe46a20e485787445985982af49ce
SHA5127fd3e6e431df9d03dd5c7f05cca1ddc916c3e3ed7eae06ddcaa624057fdb8df0959218ba7f5186d09b964bf70bb4614cd8eb135cc48d65769fb692a530aa6fb8
-
Filesize
72KB
MD56e9b1fecf6b8adb4b92e5510951b98dc
SHA195b7a06cbded09a5e7595c3785ce0554edd82399
SHA256262b613981dce52b2d0420729992cba284c6e1f73fc4806926f16e4462585ffe
SHA5126aeda5ebdff5f3de078f5d74b71e5fbbffbeb0d0b79f3ee9bb66cc5ee3fedb592dd85c7523aeb58105971d408252133b73ff2a6b4b88cb29460577e43ae94044
-
Filesize
72KB
MD56e9b1fecf6b8adb4b92e5510951b98dc
SHA195b7a06cbded09a5e7595c3785ce0554edd82399
SHA256262b613981dce52b2d0420729992cba284c6e1f73fc4806926f16e4462585ffe
SHA5126aeda5ebdff5f3de078f5d74b71e5fbbffbeb0d0b79f3ee9bb66cc5ee3fedb592dd85c7523aeb58105971d408252133b73ff2a6b4b88cb29460577e43ae94044
-
Filesize
72KB
MD56cf0bb93b1fcb890c7b106fba1325bc2
SHA147384e1ab97b19dd62781f5b20e553b9a9828fb9
SHA256ea67e5c8669704dfb114239680adc23c268e654a606c2a32c3bf30ae1aa611c2
SHA5123fc5a42bc9fe7107583a43861a908faa0b71ee339c73415cd725535246a255e3521c7ca8b27b77a42bc88e96da6852d7827527307cff38666c52c30ee41b2237
-
Filesize
72KB
MD56cf0bb93b1fcb890c7b106fba1325bc2
SHA147384e1ab97b19dd62781f5b20e553b9a9828fb9
SHA256ea67e5c8669704dfb114239680adc23c268e654a606c2a32c3bf30ae1aa611c2
SHA5123fc5a42bc9fe7107583a43861a908faa0b71ee339c73415cd725535246a255e3521c7ca8b27b77a42bc88e96da6852d7827527307cff38666c52c30ee41b2237
-
Filesize
72KB
MD5f397c67ab1886039205400077461ab26
SHA10c8e98573f7d4df544e832eb969ca0c1be1eb3d7
SHA256f5313d2e8cfc99eccea1aef077500a213e9b81ca59078618b33e32017418cfef
SHA512fd9e23b100163c06965e401b077b996fbcabd434de1f7e7da22bcb13e927803141b6daad7503ba02e702d46e0d14b66dec1d5bfa376b47efc40fbf3c4cf6962a
-
Filesize
72KB
MD5f397c67ab1886039205400077461ab26
SHA10c8e98573f7d4df544e832eb969ca0c1be1eb3d7
SHA256f5313d2e8cfc99eccea1aef077500a213e9b81ca59078618b33e32017418cfef
SHA512fd9e23b100163c06965e401b077b996fbcabd434de1f7e7da22bcb13e927803141b6daad7503ba02e702d46e0d14b66dec1d5bfa376b47efc40fbf3c4cf6962a
-
Filesize
72KB
MD56398f1d9c39470c2d2f49d2b2597634f
SHA1476110d4709027ce1d9861a7c89d2388d9896c24
SHA25647c7c097037cb1cd34b67948c85f38850673c6d224d6006bc07b3226ccf1b731
SHA51287b73514785b2a259d2415a764c9eac50d165edb94fe0b9320e993527c871e0d0e1e2dd3078cc6d1ad6d5b13c787c0a64b1c426940761faafe4817416fe2b441
-
Filesize
72KB
MD56398f1d9c39470c2d2f49d2b2597634f
SHA1476110d4709027ce1d9861a7c89d2388d9896c24
SHA25647c7c097037cb1cd34b67948c85f38850673c6d224d6006bc07b3226ccf1b731
SHA51287b73514785b2a259d2415a764c9eac50d165edb94fe0b9320e993527c871e0d0e1e2dd3078cc6d1ad6d5b13c787c0a64b1c426940761faafe4817416fe2b441
-
Filesize
72KB
MD5536d527a853b17f5056acc9e6139fe80
SHA12faed28e23229fc5c452fc24cbac5c712f9fb4d3
SHA256bf164ef106b0d7b64722d5efb1bb351e241259e7f17a13d3451dd0fbc0a1f128
SHA512086cbd34910f09c5c9c000802ad4115dbcd1cd5a96384c01216dc9326ce5770edb47b8db94dafc810049585fee1aacf7181df6fbc10dc159283167e8bda01f01
-
Filesize
72KB
MD5536d527a853b17f5056acc9e6139fe80
SHA12faed28e23229fc5c452fc24cbac5c712f9fb4d3
SHA256bf164ef106b0d7b64722d5efb1bb351e241259e7f17a13d3451dd0fbc0a1f128
SHA512086cbd34910f09c5c9c000802ad4115dbcd1cd5a96384c01216dc9326ce5770edb47b8db94dafc810049585fee1aacf7181df6fbc10dc159283167e8bda01f01
-
Filesize
72KB
MD5e60f76e48c6d1efb20d5286fc16a7b72
SHA16e2b1efa678bdaeb4b63a2f57a900dd8b2487103
SHA2567d5ea585fff0561b8662a9d425a495ad3f4549247f082db139e56a075d698ca0
SHA5124798acc61b4d39faa720fcdcefc9bf25cf8d44115b886a1bb3129beec543898dd8030be1fea230b25090e921a8c7be2c6508bb676f724a627087d795eda90c52
-
Filesize
72KB
MD5e60f76e48c6d1efb20d5286fc16a7b72
SHA16e2b1efa678bdaeb4b63a2f57a900dd8b2487103
SHA2567d5ea585fff0561b8662a9d425a495ad3f4549247f082db139e56a075d698ca0
SHA5124798acc61b4d39faa720fcdcefc9bf25cf8d44115b886a1bb3129beec543898dd8030be1fea230b25090e921a8c7be2c6508bb676f724a627087d795eda90c52
-
Filesize
72KB
MD5aeb1de955409899257bac1f6cbd6111b
SHA1149a8bec80983f7d94c9605453496af989f9d094
SHA256d95eb4fe2689f4d5c7718562341edb9d4a972bab25118e0a74490649dad2e6ae
SHA512acdc885ccca86a4453c1c132816e46045ad8b4264b1fcc8df3c941dd18e0b837a5b51038522512d35f530f5a348c01463df0181a4772dc8b34c834139bd12129
-
Filesize
72KB
MD5aeb1de955409899257bac1f6cbd6111b
SHA1149a8bec80983f7d94c9605453496af989f9d094
SHA256d95eb4fe2689f4d5c7718562341edb9d4a972bab25118e0a74490649dad2e6ae
SHA512acdc885ccca86a4453c1c132816e46045ad8b4264b1fcc8df3c941dd18e0b837a5b51038522512d35f530f5a348c01463df0181a4772dc8b34c834139bd12129
-
Filesize
72KB
MD55a311f52b1ab72a467fae5d6b86ad6bb
SHA13f9fbe038c0d5a1edc623848e19f51859e360ddf
SHA256262b3cb62d3b6732e45ae0b700050487f11f77d9983d89071a42e542d72a6293
SHA512a3683495d9683b97d8a58f0183edbdd3543b3f59bf080f1e96d22fb3c55dfa43e2f1cc2449cacca04e9d06bc5cb08787ee60f4efeabd051e2386cc6505dc83e9
-
Filesize
72KB
MD55a311f52b1ab72a467fae5d6b86ad6bb
SHA13f9fbe038c0d5a1edc623848e19f51859e360ddf
SHA256262b3cb62d3b6732e45ae0b700050487f11f77d9983d89071a42e542d72a6293
SHA512a3683495d9683b97d8a58f0183edbdd3543b3f59bf080f1e96d22fb3c55dfa43e2f1cc2449cacca04e9d06bc5cb08787ee60f4efeabd051e2386cc6505dc83e9
-
Filesize
72KB
MD52e0b3c6fc00a23707fed03ccd9f3db75
SHA1acd972bb44d90cfeb5a8442428b27383e3abf897
SHA256775d27c239a15360f10f8bf18e6a959f42fea50d553fa1bd614df29550dd928b
SHA512015578c81503de270af0fa6fd51c11c6a82a9f30a2a4a5a5d50165bbdd7d79248419492535f62caa622f1c3eed7e582c85610df351c860873b20cd9579687541
-
Filesize
72KB
MD52e0b3c6fc00a23707fed03ccd9f3db75
SHA1acd972bb44d90cfeb5a8442428b27383e3abf897
SHA256775d27c239a15360f10f8bf18e6a959f42fea50d553fa1bd614df29550dd928b
SHA512015578c81503de270af0fa6fd51c11c6a82a9f30a2a4a5a5d50165bbdd7d79248419492535f62caa622f1c3eed7e582c85610df351c860873b20cd9579687541
-
Filesize
72KB
MD524765b019dc4ddb8cf5aa9b69e74c13d
SHA1b6b31746de7ab0c3200f3557028d9f37cc09e3d6
SHA256c03530701181b3b2c0f898a4899b01d0024265229456ea31724bca0f0314eb7b
SHA512717010458b7dbb0f15377a6d503af53f65d0f7a72a2f1035de430ac3b69efd0ba6cc6024d6fa62b4aa0a8bc3bce1a196c13c2d466dbd574987561b8eabc7e80d
-
Filesize
72KB
MD524765b019dc4ddb8cf5aa9b69e74c13d
SHA1b6b31746de7ab0c3200f3557028d9f37cc09e3d6
SHA256c03530701181b3b2c0f898a4899b01d0024265229456ea31724bca0f0314eb7b
SHA512717010458b7dbb0f15377a6d503af53f65d0f7a72a2f1035de430ac3b69efd0ba6cc6024d6fa62b4aa0a8bc3bce1a196c13c2d466dbd574987561b8eabc7e80d
-
Filesize
72KB
MD520a7d0417785498865e0b3daa024c5e4
SHA19f724e6df58b47a4bc7f48307f1ee2552d52cb20
SHA256b3e73531b7d23a0629339db97bc3f33acca51761e576e57538ae54b9a8d73c01
SHA512da3e5ac47e25285f7f6825b7d231d0f9ef2bf284a5f9372815af997d74a54947e0c7b907e375045a9191f4e370227a1f2f07835303fecdf4f73754fe3ba6f7d5
-
Filesize
72KB
MD520a7d0417785498865e0b3daa024c5e4
SHA19f724e6df58b47a4bc7f48307f1ee2552d52cb20
SHA256b3e73531b7d23a0629339db97bc3f33acca51761e576e57538ae54b9a8d73c01
SHA512da3e5ac47e25285f7f6825b7d231d0f9ef2bf284a5f9372815af997d74a54947e0c7b907e375045a9191f4e370227a1f2f07835303fecdf4f73754fe3ba6f7d5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5df7414fb035e98005307f1d8cd719051
SHA17300ac7ed54784b1cde18b6cee867c674f30a460
SHA25643e8e83a540e672da59a439365f69e6642a014621a532018875c8fc2fd0d138c
SHA51209e8b9de79d2b272e6955e9f74ac7e02376751a675dce31f198dd11c172f8aca8f173250b65e3b0689969368a82b0a3fe50ec37861cddcaf2cf58ecdab15d9c2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5df7414fb035e98005307f1d8cd719051
SHA17300ac7ed54784b1cde18b6cee867c674f30a460
SHA25643e8e83a540e672da59a439365f69e6642a014621a532018875c8fc2fd0d138c
SHA51209e8b9de79d2b272e6955e9f74ac7e02376751a675dce31f198dd11c172f8aca8f173250b65e3b0689969368a82b0a3fe50ec37861cddcaf2cf58ecdab15d9c2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cd0441f4f16e5deb3b3da50d934bcaea
SHA1e1252bc1683387d1a12a2083f8ac23c58038ddd7
SHA256b2aa99b673a32b2a204ad4f05a3dcafbc51aa1d83f258ee46cb9f2343071b5f7
SHA512109742535c6711de876d19122635c61e7cc11a6b886fc756ae2701f54b4ff51873620546b09c0b637845b7921cd6bb1bc0cac0688f180ba952561158d3285ffc
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cd0441f4f16e5deb3b3da50d934bcaea
SHA1e1252bc1683387d1a12a2083f8ac23c58038ddd7
SHA256b2aa99b673a32b2a204ad4f05a3dcafbc51aa1d83f258ee46cb9f2343071b5f7
SHA512109742535c6711de876d19122635c61e7cc11a6b886fc756ae2701f54b4ff51873620546b09c0b637845b7921cd6bb1bc0cac0688f180ba952561158d3285ffc
-
Filesize
72KB
MD524765b019dc4ddb8cf5aa9b69e74c13d
SHA1b6b31746de7ab0c3200f3557028d9f37cc09e3d6
SHA256c03530701181b3b2c0f898a4899b01d0024265229456ea31724bca0f0314eb7b
SHA512717010458b7dbb0f15377a6d503af53f65d0f7a72a2f1035de430ac3b69efd0ba6cc6024d6fa62b4aa0a8bc3bce1a196c13c2d466dbd574987561b8eabc7e80d
-
Filesize
72KB
MD524765b019dc4ddb8cf5aa9b69e74c13d
SHA1b6b31746de7ab0c3200f3557028d9f37cc09e3d6
SHA256c03530701181b3b2c0f898a4899b01d0024265229456ea31724bca0f0314eb7b
SHA512717010458b7dbb0f15377a6d503af53f65d0f7a72a2f1035de430ac3b69efd0ba6cc6024d6fa62b4aa0a8bc3bce1a196c13c2d466dbd574987561b8eabc7e80d
-
Filesize
72KB
MD524765b019dc4ddb8cf5aa9b69e74c13d
SHA1b6b31746de7ab0c3200f3557028d9f37cc09e3d6
SHA256c03530701181b3b2c0f898a4899b01d0024265229456ea31724bca0f0314eb7b
SHA512717010458b7dbb0f15377a6d503af53f65d0f7a72a2f1035de430ac3b69efd0ba6cc6024d6fa62b4aa0a8bc3bce1a196c13c2d466dbd574987561b8eabc7e80d
-
Filesize
72KB
MD524765b019dc4ddb8cf5aa9b69e74c13d
SHA1b6b31746de7ab0c3200f3557028d9f37cc09e3d6
SHA256c03530701181b3b2c0f898a4899b01d0024265229456ea31724bca0f0314eb7b
SHA512717010458b7dbb0f15377a6d503af53f65d0f7a72a2f1035de430ac3b69efd0ba6cc6024d6fa62b4aa0a8bc3bce1a196c13c2d466dbd574987561b8eabc7e80d
-
Filesize
72KB
MD5cd0441f4f16e5deb3b3da50d934bcaea
SHA1e1252bc1683387d1a12a2083f8ac23c58038ddd7
SHA256b2aa99b673a32b2a204ad4f05a3dcafbc51aa1d83f258ee46cb9f2343071b5f7
SHA512109742535c6711de876d19122635c61e7cc11a6b886fc756ae2701f54b4ff51873620546b09c0b637845b7921cd6bb1bc0cac0688f180ba952561158d3285ffc
-
Filesize
72KB
MD5cd0441f4f16e5deb3b3da50d934bcaea
SHA1e1252bc1683387d1a12a2083f8ac23c58038ddd7
SHA256b2aa99b673a32b2a204ad4f05a3dcafbc51aa1d83f258ee46cb9f2343071b5f7
SHA512109742535c6711de876d19122635c61e7cc11a6b886fc756ae2701f54b4ff51873620546b09c0b637845b7921cd6bb1bc0cac0688f180ba952561158d3285ffc
-
Filesize
72KB
MD5fe70fc28bf642c6f5d18fed265658008
SHA157b806738163a608eaa4c6d238fe08512bffd673
SHA25646ebfc7b0ef418d59fc6df9a77d265d0f36e913aecc2a134910a42d74338acc8
SHA51292c6ea49ac4d55013737dfebf08142690f3397639f29080bb1e3544a305986cbdc10bd13f84807435c3fc311f4746f2f43e5d8e0ce0a773ccc40eca884459ad2
-
Filesize
72KB
MD5fe70fc28bf642c6f5d18fed265658008
SHA157b806738163a608eaa4c6d238fe08512bffd673
SHA25646ebfc7b0ef418d59fc6df9a77d265d0f36e913aecc2a134910a42d74338acc8
SHA51292c6ea49ac4d55013737dfebf08142690f3397639f29080bb1e3544a305986cbdc10bd13f84807435c3fc311f4746f2f43e5d8e0ce0a773ccc40eca884459ad2
-
Filesize
72KB
MD5f2b48c22f1b7bd956ee07a23e8c60aac
SHA1cbaf98618068f0cd43588872f4ba43c7e469ceb6
SHA25639519efd302a43e651b7bc3ed78f70c06e77839c74958e17cb0d51d284f1c6c1
SHA512b55294cc95601f7bdde1fd9ed41c49fcf3fe80c2b25f3f27ce8304cb9cdcf659baf770344a53bcca63d8784a8d85f0babedc2ca57667ea65771700bf42190bbf
-
Filesize
72KB
MD5f2b48c22f1b7bd956ee07a23e8c60aac
SHA1cbaf98618068f0cd43588872f4ba43c7e469ceb6
SHA25639519efd302a43e651b7bc3ed78f70c06e77839c74958e17cb0d51d284f1c6c1
SHA512b55294cc95601f7bdde1fd9ed41c49fcf3fe80c2b25f3f27ce8304cb9cdcf659baf770344a53bcca63d8784a8d85f0babedc2ca57667ea65771700bf42190bbf
-
Filesize
72KB
MD501f30515204f43d876902d86ac2c0a90
SHA1d3ca1db189c85c22037e5749e5c70803bc208251
SHA25634ee1ebab414436a5789687116cbee959bfc29b1c5aea6087376b88f967e214e
SHA5128e4726f55b4673521f87dbcb7b5e7b23fadfc86a0afc458b1a2b2fc7ea660fac5b7377f8698adfe7ebb6f667afe807e5f90a7f01511343e139a91110f9e1b2ec
-
Filesize
72KB
MD501f30515204f43d876902d86ac2c0a90
SHA1d3ca1db189c85c22037e5749e5c70803bc208251
SHA25634ee1ebab414436a5789687116cbee959bfc29b1c5aea6087376b88f967e214e
SHA5128e4726f55b4673521f87dbcb7b5e7b23fadfc86a0afc458b1a2b2fc7ea660fac5b7377f8698adfe7ebb6f667afe807e5f90a7f01511343e139a91110f9e1b2ec