Analysis
-
max time kernel
172s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 17:45
Static task
static1
Behavioral task
behavioral1
Sample
526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe
Resource
win10v2004-20220812-en
General
-
Target
526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe
-
Size
72KB
-
MD5
0e545a36e318b4ae0e3b1e1369c3175c
-
SHA1
bc72dd4cd79368e8767af46ff492a382500a66fa
-
SHA256
526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b
-
SHA512
c4d05e49ceb74e98413970397723405aa2106cfae7f8d2d5bda92c871b6f9e20357e5f5caff99372b87caf834d48279b5e83bc5e233a63ac5ab29fc8959001be
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2X:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe -
Executes dropped EXE 64 IoCs
pid Process 4800 update.exe 4856 backup.exe 4824 backup.exe 1936 backup.exe 2004 backup.exe 4596 backup.exe 2348 backup.exe 3344 backup.exe 4116 backup.exe 3892 backup.exe 4032 update.exe 576 backup.exe 3880 backup.exe 5084 backup.exe 5072 backup.exe 3952 backup.exe 1476 backup.exe 3028 backup.exe 620 update.exe 4288 backup.exe 4252 backup.exe 3236 backup.exe 1064 backup.exe 612 backup.exe 2568 backup.exe 444 backup.exe 2040 backup.exe 1336 update.exe 780 backup.exe 4316 backup.exe 1792 backup.exe 4320 backup.exe 2352 update.exe 360 System Restore.exe 3632 backup.exe 1324 backup.exe 4476 backup.exe 4912 backup.exe 4076 backup.exe 3708 System Restore.exe 4776 backup.exe 3480 backup.exe 3956 backup.exe 4164 backup.exe 3888 backup.exe 1312 backup.exe 1072 backup.exe 732 backup.exe 1652 data.exe 2536 backup.exe 2192 backup.exe 1556 backup.exe 4772 backup.exe 4820 System Restore.exe 4992 backup.exe 4976 backup.exe 3816 backup.exe 4360 System Restore.exe 2316 backup.exe 4364 backup.exe 3168 backup.exe 4036 backup.exe 1232 backup.exe 3720 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe update.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\update.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 4800 update.exe 4856 backup.exe 4824 backup.exe 1936 backup.exe 2004 backup.exe 4596 backup.exe 2348 backup.exe 3344 backup.exe 4116 backup.exe 3892 backup.exe 4032 update.exe 576 backup.exe 3880 backup.exe 5084 backup.exe 5072 backup.exe 3952 backup.exe 1476 backup.exe 3028 backup.exe 620 update.exe 4288 backup.exe 4252 backup.exe 3236 backup.exe 1064 backup.exe 612 backup.exe 2568 backup.exe 444 backup.exe 2040 backup.exe 1336 update.exe 780 backup.exe 1792 backup.exe 4316 backup.exe 4320 backup.exe 360 System Restore.exe 2352 update.exe 3632 backup.exe 4476 backup.exe 1324 backup.exe 4076 backup.exe 4912 backup.exe 3708 System Restore.exe 4776 backup.exe 3956 backup.exe 3480 backup.exe 4164 backup.exe 3888 backup.exe 1312 backup.exe 1072 backup.exe 1652 data.exe 732 backup.exe 2536 backup.exe 2192 backup.exe 1556 backup.exe 4772 backup.exe 4820 System Restore.exe 4992 backup.exe 4976 backup.exe 3816 backup.exe 4360 System Restore.exe 2316 backup.exe 4364 backup.exe 3168 backup.exe 4036 backup.exe 3892 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 4800 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 80 PID 2428 wrote to memory of 4800 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 80 PID 2428 wrote to memory of 4800 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 80 PID 2428 wrote to memory of 4856 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 81 PID 2428 wrote to memory of 4856 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 81 PID 2428 wrote to memory of 4856 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 81 PID 4800 wrote to memory of 4824 4800 update.exe 82 PID 4800 wrote to memory of 4824 4800 update.exe 82 PID 4800 wrote to memory of 4824 4800 update.exe 82 PID 2428 wrote to memory of 1936 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 83 PID 2428 wrote to memory of 1936 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 83 PID 2428 wrote to memory of 1936 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 83 PID 4824 wrote to memory of 2004 4824 backup.exe 84 PID 4824 wrote to memory of 2004 4824 backup.exe 84 PID 4824 wrote to memory of 2004 4824 backup.exe 84 PID 2428 wrote to memory of 4596 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 85 PID 2428 wrote to memory of 4596 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 85 PID 2428 wrote to memory of 4596 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 85 PID 2428 wrote to memory of 2348 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 86 PID 2428 wrote to memory of 2348 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 86 PID 2428 wrote to memory of 2348 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 86 PID 4824 wrote to memory of 3344 4824 backup.exe 87 PID 4824 wrote to memory of 3344 4824 backup.exe 87 PID 4824 wrote to memory of 3344 4824 backup.exe 87 PID 2428 wrote to memory of 4116 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 88 PID 2428 wrote to memory of 4116 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 88 PID 2428 wrote to memory of 4116 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 88 PID 4824 wrote to memory of 4032 4824 backup.exe 89 PID 4824 wrote to memory of 4032 4824 backup.exe 89 PID 4824 wrote to memory of 4032 4824 backup.exe 89 PID 2428 wrote to memory of 3892 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 90 PID 2428 wrote to memory of 3892 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 90 PID 2428 wrote to memory of 3892 2428 526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe 90 PID 4032 wrote to memory of 576 4032 update.exe 91 PID 4032 wrote to memory of 576 4032 update.exe 91 PID 4032 wrote to memory of 576 4032 update.exe 91 PID 576 wrote to memory of 3880 576 backup.exe 92 PID 576 wrote to memory of 3880 576 backup.exe 92 PID 576 wrote to memory of 3880 576 backup.exe 92 PID 4032 wrote to memory of 5084 4032 update.exe 93 PID 4032 wrote to memory of 5084 4032 update.exe 93 PID 4032 wrote to memory of 5084 4032 update.exe 93 PID 5084 wrote to memory of 5072 5084 backup.exe 94 PID 5084 wrote to memory of 5072 5084 backup.exe 94 PID 5084 wrote to memory of 5072 5084 backup.exe 94 PID 5084 wrote to memory of 3952 5084 backup.exe 95 PID 5084 wrote to memory of 3952 5084 backup.exe 95 PID 5084 wrote to memory of 3952 5084 backup.exe 95 PID 3952 wrote to memory of 1476 3952 backup.exe 96 PID 3952 wrote to memory of 1476 3952 backup.exe 96 PID 3952 wrote to memory of 1476 3952 backup.exe 96 PID 3952 wrote to memory of 3028 3952 backup.exe 97 PID 3952 wrote to memory of 3028 3952 backup.exe 97 PID 3952 wrote to memory of 3028 3952 backup.exe 97 PID 3028 wrote to memory of 620 3028 backup.exe 98 PID 3028 wrote to memory of 620 3028 backup.exe 98 PID 3028 wrote to memory of 620 3028 backup.exe 98 PID 3028 wrote to memory of 4288 3028 backup.exe 99 PID 3028 wrote to memory of 4288 3028 backup.exe 99 PID 3028 wrote to memory of 4288 3028 backup.exe 99 PID 3028 wrote to memory of 4252 3028 backup.exe 100 PID 3028 wrote to memory of 4252 3028 backup.exe 100 PID 3028 wrote to memory of 4252 3028 backup.exe 100 PID 3028 wrote to memory of 3236 3028 backup.exe 101 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe"C:\Users\Admin\AppData\Local\Temp\526d5c97dc0a09ccc32bce806b2a17d998ac70e1ae4edc12e59dfbea6a76ca0b.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\1904924982\update.exeC:\Users\Admin\AppData\Local\Temp\1904924982\update.exe C:\Users\Admin\AppData\Local\Temp\1904924982\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4824 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3344
-
-
C:\Program Files\update.exe"C:\Program Files\update.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3880
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5072
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3952 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3028 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\update.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\update.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:620
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4288
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3236
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:612
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2568
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:444
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\update.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\update.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:780
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3632
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\data.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\data.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4992
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:3720
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵PID:1076
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\data.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\data.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵
- System policy modification
PID:4276
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\9⤵
- Disables RegEdit via registry modification
PID:4080
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\9⤵
- System policy modification
PID:3808
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
PID:3140
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\9⤵PID:4868
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
PID:2168
-
-
-
C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\he-IL\8⤵PID:2368
-
-
C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1016
-
-
C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hu-HU\8⤵
- Disables RegEdit via registry modification
PID:4020
-
-
C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\8⤵
- System policy modification
PID:1432
-
-
C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\it-IT\8⤵
- System policy modification
PID:2540
-
-
C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ja-JP\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4504
-
-
C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ko-KR\8⤵
- Disables RegEdit via registry modification
PID:4076
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\update.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\update.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4912
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4164
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\System Restore.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\System Restore.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4360
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Executes dropped EXE
- System policy modification
PID:1232
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\System Restore.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\System Restore.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵PID:4840
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- System policy modification
PID:1856
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\data.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\data.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
PID:1848
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3288
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Disables RegEdit via registry modification
PID:5076
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
PID:4992 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- System policy modification
PID:1132
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3984 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵PID:3320
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4776 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:732
-
-
C:\Program Files\Common Files\System\ado\en-US\System Restore.exe"C:\Program Files\Common Files\System\ado\en-US\System Restore.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4820
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4364
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:3892
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3412
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3904
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:944
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
PID:1264
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
PID:1160
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- System policy modification
PID:2488
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Disables RegEdit via registry modification
PID:5068
-
-
C:\Program Files\Common Files\System\ja-JP\System Restore.exe"C:\Program Files\Common Files\System\ja-JP\System Restore.exe" C:\Program Files\Common Files\System\ja-JP\7⤵
- Disables RegEdit via registry modification
PID:3756
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2656
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1324 -
C:\Program Files\Google\Chrome\Application\System Restore.exe"C:\Program Files\Google\Chrome\Application\System Restore.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3708 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3888 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4772
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3816
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4036
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
PID:4272
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
PID:3756
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2340
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1860 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- Drops file in Program Files directory
PID:2204 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵
- System policy modification
PID:3576
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:2040
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:524 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2976
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4632
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4748
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:3396
-
-
C:\Program Files\Internet Explorer\images\data.exe"C:\Program Files\Internet Explorer\images\data.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
PID:4896
-
-
C:\Program Files\Internet Explorer\it-IT\update.exe"C:\Program Files\Internet Explorer\it-IT\update.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:4664
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:864
-
-
-
-
C:\Program Files (x86)\System Restore.exe"C:\Program Files (x86)\System Restore.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:360 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3956 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1072
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2192 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4976 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3168
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:5088 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- System policy modification
PID:3800
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Modifies visibility of file extensions in Explorer
PID:4252
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
PID:64
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
PID:2436 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵PID:4684
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Drops file in Program Files directory
PID:2288 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\9⤵
- System policy modification
PID:5112
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
PID:2688
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\8⤵PID:3164
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:796 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3340 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:4964
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2160
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:216 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1136 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\10⤵
- Modifies visibility of file extensions in Explorer
PID:1644
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:444
-
-
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1220
-
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:788 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:4028
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- System policy modification
PID:3248 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵PID:3440
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- System policy modification
PID:3660 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3296
-
-
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:4908
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2392 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4912
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:1120
-
-
C:\Users\Admin\Desktop\System Restore.exe"C:\Users\Admin\Desktop\System Restore.exe" C:\Users\Admin\Desktop\6⤵PID:1976
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
PID:4248
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:520
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:4776
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:2568
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58c39ec30544dbaecfbdf57c4cd30eb56
SHA10cbc1a1f2ff5a2c28afdac2649c28e4549b46529
SHA2567dcebfbf8cd62e0dc93e779cc89fec676d75e30a0b5710bbebbf47b9807f76de
SHA512b1546c071bad586461c2a7ba0f8e06d321422f401757846af5c3ffa055acc517a3e63003bbe2783ed619016a177de5fdd5f3530b14a733f109578d58d7f658cb
-
Filesize
72KB
MD58c39ec30544dbaecfbdf57c4cd30eb56
SHA10cbc1a1f2ff5a2c28afdac2649c28e4549b46529
SHA2567dcebfbf8cd62e0dc93e779cc89fec676d75e30a0b5710bbebbf47b9807f76de
SHA512b1546c071bad586461c2a7ba0f8e06d321422f401757846af5c3ffa055acc517a3e63003bbe2783ed619016a177de5fdd5f3530b14a733f109578d58d7f658cb
-
Filesize
72KB
MD55677459310084aff078164db410917b7
SHA1157274465636759f48320e2674d7dbe4a43b7879
SHA2561b12677e17bc1a80ddec9be7d6717b19be63d4657187ced01103922de6860911
SHA5125f5bb0082733ff994a5c7fe1b1d91d078191d23d04a299e823946cc5890c455c70c9496bfd851fa5f3f9df1e90a2c8f695349a4f5d9e18b97d21663391b7abe6
-
Filesize
72KB
MD55677459310084aff078164db410917b7
SHA1157274465636759f48320e2674d7dbe4a43b7879
SHA2561b12677e17bc1a80ddec9be7d6717b19be63d4657187ced01103922de6860911
SHA5125f5bb0082733ff994a5c7fe1b1d91d078191d23d04a299e823946cc5890c455c70c9496bfd851fa5f3f9df1e90a2c8f695349a4f5d9e18b97d21663391b7abe6
-
Filesize
72KB
MD546da5fbf8549a9b5e8b93c35297d728b
SHA1fb425412ac0c8ede2569ed000489d33e3b5c8c8d
SHA2566ec2be27512673aeb7f6c85591458444047028337ebbe7ce79313d974bc2e3e4
SHA512a3aab8daacc3c1268d3487c473f1637b55c320edfc394ce9acbfaf348d3b0a06b71ae65556ef1aaabe4905f1413fe739c2233a80494914465690f5283af75625
-
Filesize
72KB
MD546da5fbf8549a9b5e8b93c35297d728b
SHA1fb425412ac0c8ede2569ed000489d33e3b5c8c8d
SHA2566ec2be27512673aeb7f6c85591458444047028337ebbe7ce79313d974bc2e3e4
SHA512a3aab8daacc3c1268d3487c473f1637b55c320edfc394ce9acbfaf348d3b0a06b71ae65556ef1aaabe4905f1413fe739c2233a80494914465690f5283af75625
-
Filesize
72KB
MD5f2e8cc190ac396642a56bcb9489bb483
SHA137961f0d31cb5f5ab822edc6532ead46ef01722b
SHA2563cb9fbc5bc3d407cddc38ff20c17ca000851d850a7eedf9a87cfbb60ecb70a19
SHA51284e1b2bb324bdde6b6a4c11d946978b35e89f76c61e327ded48c99841b8bc002320f8f0a74c269c9a07d36b100626bd6d561df5e646375abb0df382907d410b7
-
Filesize
72KB
MD5f2e8cc190ac396642a56bcb9489bb483
SHA137961f0d31cb5f5ab822edc6532ead46ef01722b
SHA2563cb9fbc5bc3d407cddc38ff20c17ca000851d850a7eedf9a87cfbb60ecb70a19
SHA51284e1b2bb324bdde6b6a4c11d946978b35e89f76c61e327ded48c99841b8bc002320f8f0a74c269c9a07d36b100626bd6d561df5e646375abb0df382907d410b7
-
Filesize
72KB
MD5c07be5e120228eebca260f81f289da12
SHA1b2430f335da1e70577d8dfea8c02baf251d1af79
SHA256b78769cce6c44ec1712002a839a51f8754ad7baf8471a09f3debcd9a2c184ca1
SHA512126baa27c4eb4def40794f2464a99b935786d250921c94165070658bc7811d41156e3154bad3361fe050d0fa635244ec4739f8b96c5c854c32da977246715dc1
-
Filesize
72KB
MD5c07be5e120228eebca260f81f289da12
SHA1b2430f335da1e70577d8dfea8c02baf251d1af79
SHA256b78769cce6c44ec1712002a839a51f8754ad7baf8471a09f3debcd9a2c184ca1
SHA512126baa27c4eb4def40794f2464a99b935786d250921c94165070658bc7811d41156e3154bad3361fe050d0fa635244ec4739f8b96c5c854c32da977246715dc1
-
Filesize
72KB
MD5eb2c9d86f5c7e1f74baed71dc6cd5590
SHA184cb09af68d3d9c46dc44f49d25ca6903623a47c
SHA2562800506dd57fcd01a5361838360948018b29247d0777930aa5f9dc7b90273e96
SHA5129bbcc3630f50039b939dfbfcade803a1e1268d1d89333491971eb6cfca3918e0bca97f755076392e97690ac70199495e6564cb60f42ff3ddec35dc022a489fb5
-
Filesize
72KB
MD5eb2c9d86f5c7e1f74baed71dc6cd5590
SHA184cb09af68d3d9c46dc44f49d25ca6903623a47c
SHA2562800506dd57fcd01a5361838360948018b29247d0777930aa5f9dc7b90273e96
SHA5129bbcc3630f50039b939dfbfcade803a1e1268d1d89333491971eb6cfca3918e0bca97f755076392e97690ac70199495e6564cb60f42ff3ddec35dc022a489fb5
-
Filesize
72KB
MD596ce47ec224910e74399b4b8b474c764
SHA14b3324ced46b556e30adb3a44fa4d524582d6a50
SHA2561110c9d28e24e423c32f6ce07dc6092d0fa1a7c85b7f1f1031199505de117525
SHA51261fce2259aaefeb9220866ba5e7a6a000500d0bf0c909757e2e8284c530a2ef50b11037554fd7963cfa8302c058653d7827be00bad44a222292c1574ca40a0b6
-
Filesize
72KB
MD596ce47ec224910e74399b4b8b474c764
SHA14b3324ced46b556e30adb3a44fa4d524582d6a50
SHA2561110c9d28e24e423c32f6ce07dc6092d0fa1a7c85b7f1f1031199505de117525
SHA51261fce2259aaefeb9220866ba5e7a6a000500d0bf0c909757e2e8284c530a2ef50b11037554fd7963cfa8302c058653d7827be00bad44a222292c1574ca40a0b6
-
Filesize
72KB
MD5f2e8cc190ac396642a56bcb9489bb483
SHA137961f0d31cb5f5ab822edc6532ead46ef01722b
SHA2563cb9fbc5bc3d407cddc38ff20c17ca000851d850a7eedf9a87cfbb60ecb70a19
SHA51284e1b2bb324bdde6b6a4c11d946978b35e89f76c61e327ded48c99841b8bc002320f8f0a74c269c9a07d36b100626bd6d561df5e646375abb0df382907d410b7
-
Filesize
72KB
MD5f2e8cc190ac396642a56bcb9489bb483
SHA137961f0d31cb5f5ab822edc6532ead46ef01722b
SHA2563cb9fbc5bc3d407cddc38ff20c17ca000851d850a7eedf9a87cfbb60ecb70a19
SHA51284e1b2bb324bdde6b6a4c11d946978b35e89f76c61e327ded48c99841b8bc002320f8f0a74c269c9a07d36b100626bd6d561df5e646375abb0df382907d410b7
-
Filesize
72KB
MD5fe6a11a91d7aaed89726849bee740c46
SHA1cb1f6f59ae5a7a7e1ce3972d50f550cdb3218e80
SHA2563cf0608b0d2cceffbdde37e70aaf2e06bd0983e5ae82a07cbec13e2e89e6614c
SHA512bc87100207ac6423fff2b03ba36d6de5fbec15229b0096dc8d1549bd33d2d36c256f853f21d46f32f8bb4718e6f8c95bb2b15a3ad81efd9e781efdb32565a99c
-
Filesize
72KB
MD5fe6a11a91d7aaed89726849bee740c46
SHA1cb1f6f59ae5a7a7e1ce3972d50f550cdb3218e80
SHA2563cf0608b0d2cceffbdde37e70aaf2e06bd0983e5ae82a07cbec13e2e89e6614c
SHA512bc87100207ac6423fff2b03ba36d6de5fbec15229b0096dc8d1549bd33d2d36c256f853f21d46f32f8bb4718e6f8c95bb2b15a3ad81efd9e781efdb32565a99c
-
Filesize
72KB
MD55d785ac059d25115c90e852df6065122
SHA135f462c24fc1c2178e9fcf608aa2b5256759bb9a
SHA25689aa16b2489138ff0c2d8e63c656dd9a5e893c2e0e788cd1cff2738720ce8a6e
SHA512b6559475c99f98c0d6f36e3a06f8169e19815926498583e48b4935a9a11cc00b55b1adbef9a68aaa8865390d6d7c32fd48b24a9462be7f6ac7c6a3dbb4d75d2c
-
Filesize
72KB
MD55d785ac059d25115c90e852df6065122
SHA135f462c24fc1c2178e9fcf608aa2b5256759bb9a
SHA25689aa16b2489138ff0c2d8e63c656dd9a5e893c2e0e788cd1cff2738720ce8a6e
SHA512b6559475c99f98c0d6f36e3a06f8169e19815926498583e48b4935a9a11cc00b55b1adbef9a68aaa8865390d6d7c32fd48b24a9462be7f6ac7c6a3dbb4d75d2c
-
Filesize
72KB
MD5fe6a11a91d7aaed89726849bee740c46
SHA1cb1f6f59ae5a7a7e1ce3972d50f550cdb3218e80
SHA2563cf0608b0d2cceffbdde37e70aaf2e06bd0983e5ae82a07cbec13e2e89e6614c
SHA512bc87100207ac6423fff2b03ba36d6de5fbec15229b0096dc8d1549bd33d2d36c256f853f21d46f32f8bb4718e6f8c95bb2b15a3ad81efd9e781efdb32565a99c
-
Filesize
72KB
MD5fe6a11a91d7aaed89726849bee740c46
SHA1cb1f6f59ae5a7a7e1ce3972d50f550cdb3218e80
SHA2563cf0608b0d2cceffbdde37e70aaf2e06bd0983e5ae82a07cbec13e2e89e6614c
SHA512bc87100207ac6423fff2b03ba36d6de5fbec15229b0096dc8d1549bd33d2d36c256f853f21d46f32f8bb4718e6f8c95bb2b15a3ad81efd9e781efdb32565a99c
-
Filesize
72KB
MD5ed7765136e3d17a05e38b013f6a1b321
SHA151e3b3ce443b823ea196c102d9052bc02093d1ea
SHA25696b8dde038593fd6ab2656841185d1369e579ccc4235c76dcdb5cff191294c45
SHA512e87cf74d1a6745931154607704c53300dde386037baef86affc37187a29fe7ddb26347dab0643d75dc27512387abf5b2dd2ff20742ea16ebea322cc121edd757
-
Filesize
72KB
MD5ed7765136e3d17a05e38b013f6a1b321
SHA151e3b3ce443b823ea196c102d9052bc02093d1ea
SHA25696b8dde038593fd6ab2656841185d1369e579ccc4235c76dcdb5cff191294c45
SHA512e87cf74d1a6745931154607704c53300dde386037baef86affc37187a29fe7ddb26347dab0643d75dc27512387abf5b2dd2ff20742ea16ebea322cc121edd757
-
Filesize
72KB
MD5ed7765136e3d17a05e38b013f6a1b321
SHA151e3b3ce443b823ea196c102d9052bc02093d1ea
SHA25696b8dde038593fd6ab2656841185d1369e579ccc4235c76dcdb5cff191294c45
SHA512e87cf74d1a6745931154607704c53300dde386037baef86affc37187a29fe7ddb26347dab0643d75dc27512387abf5b2dd2ff20742ea16ebea322cc121edd757
-
Filesize
72KB
MD5ed7765136e3d17a05e38b013f6a1b321
SHA151e3b3ce443b823ea196c102d9052bc02093d1ea
SHA25696b8dde038593fd6ab2656841185d1369e579ccc4235c76dcdb5cff191294c45
SHA512e87cf74d1a6745931154607704c53300dde386037baef86affc37187a29fe7ddb26347dab0643d75dc27512387abf5b2dd2ff20742ea16ebea322cc121edd757
-
Filesize
72KB
MD5279eb090da0a891a0bae0d6ceb8726a7
SHA1d18280411581ddb39fb26f7e6efbcb75968ab34c
SHA25640c8b2543dc3d63fd16ecfefb8c6795d01d1220daf8c1f36c6266abb4881e9d0
SHA51206be6597751c4a8a61821c740cf6446d5c8718ad325ce722c911b36445fd20d529d76c8ce086009dd992b638b3343c4ec87b05d6a840c45de5920dbcc672196d
-
Filesize
72KB
MD5279eb090da0a891a0bae0d6ceb8726a7
SHA1d18280411581ddb39fb26f7e6efbcb75968ab34c
SHA25640c8b2543dc3d63fd16ecfefb8c6795d01d1220daf8c1f36c6266abb4881e9d0
SHA51206be6597751c4a8a61821c740cf6446d5c8718ad325ce722c911b36445fd20d529d76c8ce086009dd992b638b3343c4ec87b05d6a840c45de5920dbcc672196d
-
Filesize
72KB
MD5279eb090da0a891a0bae0d6ceb8726a7
SHA1d18280411581ddb39fb26f7e6efbcb75968ab34c
SHA25640c8b2543dc3d63fd16ecfefb8c6795d01d1220daf8c1f36c6266abb4881e9d0
SHA51206be6597751c4a8a61821c740cf6446d5c8718ad325ce722c911b36445fd20d529d76c8ce086009dd992b638b3343c4ec87b05d6a840c45de5920dbcc672196d
-
Filesize
72KB
MD5279eb090da0a891a0bae0d6ceb8726a7
SHA1d18280411581ddb39fb26f7e6efbcb75968ab34c
SHA25640c8b2543dc3d63fd16ecfefb8c6795d01d1220daf8c1f36c6266abb4881e9d0
SHA51206be6597751c4a8a61821c740cf6446d5c8718ad325ce722c911b36445fd20d529d76c8ce086009dd992b638b3343c4ec87b05d6a840c45de5920dbcc672196d
-
Filesize
72KB
MD5279eb090da0a891a0bae0d6ceb8726a7
SHA1d18280411581ddb39fb26f7e6efbcb75968ab34c
SHA25640c8b2543dc3d63fd16ecfefb8c6795d01d1220daf8c1f36c6266abb4881e9d0
SHA51206be6597751c4a8a61821c740cf6446d5c8718ad325ce722c911b36445fd20d529d76c8ce086009dd992b638b3343c4ec87b05d6a840c45de5920dbcc672196d
-
Filesize
72KB
MD5279eb090da0a891a0bae0d6ceb8726a7
SHA1d18280411581ddb39fb26f7e6efbcb75968ab34c
SHA25640c8b2543dc3d63fd16ecfefb8c6795d01d1220daf8c1f36c6266abb4881e9d0
SHA51206be6597751c4a8a61821c740cf6446d5c8718ad325ce722c911b36445fd20d529d76c8ce086009dd992b638b3343c4ec87b05d6a840c45de5920dbcc672196d
-
Filesize
72KB
MD56533d7afaa5cf66cef06f17e1b4e6428
SHA118b158bf24b791ca4ca450e7ca83124d0362f64c
SHA256b22700ff51c40692b7a3cc818fc0d12b3e25ec0673a59596fa484540c0d12c6f
SHA512d170cef7058cc1b63039f3902089e9d97614528792d1cfc427be883080f3ef0156e024d7343025777a19124e66a31faeda7f19ef49d96a7b02ec22cf6b499c22
-
Filesize
72KB
MD56533d7afaa5cf66cef06f17e1b4e6428
SHA118b158bf24b791ca4ca450e7ca83124d0362f64c
SHA256b22700ff51c40692b7a3cc818fc0d12b3e25ec0673a59596fa484540c0d12c6f
SHA512d170cef7058cc1b63039f3902089e9d97614528792d1cfc427be883080f3ef0156e024d7343025777a19124e66a31faeda7f19ef49d96a7b02ec22cf6b499c22
-
Filesize
72KB
MD56533d7afaa5cf66cef06f17e1b4e6428
SHA118b158bf24b791ca4ca450e7ca83124d0362f64c
SHA256b22700ff51c40692b7a3cc818fc0d12b3e25ec0673a59596fa484540c0d12c6f
SHA512d170cef7058cc1b63039f3902089e9d97614528792d1cfc427be883080f3ef0156e024d7343025777a19124e66a31faeda7f19ef49d96a7b02ec22cf6b499c22
-
Filesize
72KB
MD56533d7afaa5cf66cef06f17e1b4e6428
SHA118b158bf24b791ca4ca450e7ca83124d0362f64c
SHA256b22700ff51c40692b7a3cc818fc0d12b3e25ec0673a59596fa484540c0d12c6f
SHA512d170cef7058cc1b63039f3902089e9d97614528792d1cfc427be883080f3ef0156e024d7343025777a19124e66a31faeda7f19ef49d96a7b02ec22cf6b499c22
-
Filesize
72KB
MD56533d7afaa5cf66cef06f17e1b4e6428
SHA118b158bf24b791ca4ca450e7ca83124d0362f64c
SHA256b22700ff51c40692b7a3cc818fc0d12b3e25ec0673a59596fa484540c0d12c6f
SHA512d170cef7058cc1b63039f3902089e9d97614528792d1cfc427be883080f3ef0156e024d7343025777a19124e66a31faeda7f19ef49d96a7b02ec22cf6b499c22
-
Filesize
72KB
MD56533d7afaa5cf66cef06f17e1b4e6428
SHA118b158bf24b791ca4ca450e7ca83124d0362f64c
SHA256b22700ff51c40692b7a3cc818fc0d12b3e25ec0673a59596fa484540c0d12c6f
SHA512d170cef7058cc1b63039f3902089e9d97614528792d1cfc427be883080f3ef0156e024d7343025777a19124e66a31faeda7f19ef49d96a7b02ec22cf6b499c22
-
Filesize
72KB
MD5251345560ddae07761d0f913431adf61
SHA16d9d39d44d92632ac298052eaad92fd3f4326e37
SHA25610910fc819d7abe8d616fef724dc9f8f79247ec47e9b99766569abacad4502c2
SHA51229561dea9c6ca0e28b890a6e4dae2f8defaffa6e180c7952d63c5e35db63e29f7bd56f34812d2bd324866603f75c2b77f5c098ea77a755dcd60575f67c9c499b
-
Filesize
72KB
MD5251345560ddae07761d0f913431adf61
SHA16d9d39d44d92632ac298052eaad92fd3f4326e37
SHA25610910fc819d7abe8d616fef724dc9f8f79247ec47e9b99766569abacad4502c2
SHA51229561dea9c6ca0e28b890a6e4dae2f8defaffa6e180c7952d63c5e35db63e29f7bd56f34812d2bd324866603f75c2b77f5c098ea77a755dcd60575f67c9c499b
-
Filesize
72KB
MD53e1286b985763e9386c9efc390b81c02
SHA177dcc6983e886092e9cd70c4b3a8c397b54ed1ca
SHA2567e0defd9bb9ffd0c3b1727b73ad2107f3c85c56ec7a894bcc70619ae32b381c4
SHA512983928c6a25b0b3c7cc0b88c2f5578de77a94e6bc10c3b4ab76a3da337ba1162a4bfe2930af5ec5db9d6c133efe4b44c2db920346a55e46e84876ee16d2922af
-
Filesize
72KB
MD53e1286b985763e9386c9efc390b81c02
SHA177dcc6983e886092e9cd70c4b3a8c397b54ed1ca
SHA2567e0defd9bb9ffd0c3b1727b73ad2107f3c85c56ec7a894bcc70619ae32b381c4
SHA512983928c6a25b0b3c7cc0b88c2f5578de77a94e6bc10c3b4ab76a3da337ba1162a4bfe2930af5ec5db9d6c133efe4b44c2db920346a55e46e84876ee16d2922af
-
Filesize
72KB
MD56afd0cda8befa37b74aa04a3200940d9
SHA100c42b41ce364a3aee864e748d8880f49ab5a1a7
SHA256ced49f81f298b45151a7e88a521abc3cfc1353e5a2f67bb9b6713f4d2f37e975
SHA5124521dc5d12ef5d6311ffad99ecf3ead742c229c64ed93476a58e1b9a25512676c251b7e6326a826d0dde39cadd1cebf1f225ea0e6dcb78e65249238882649eca
-
Filesize
72KB
MD56afd0cda8befa37b74aa04a3200940d9
SHA100c42b41ce364a3aee864e748d8880f49ab5a1a7
SHA256ced49f81f298b45151a7e88a521abc3cfc1353e5a2f67bb9b6713f4d2f37e975
SHA5124521dc5d12ef5d6311ffad99ecf3ead742c229c64ed93476a58e1b9a25512676c251b7e6326a826d0dde39cadd1cebf1f225ea0e6dcb78e65249238882649eca
-
Filesize
72KB
MD5237675e0718674b52c7b37b0c5a96c15
SHA179de3c46595cc6fbb5887b25a6d1f1cb6f8dd844
SHA256e25f1db43e0e6b8617914a1cfa3164f4ea58b1fc94b078726dcf751f0be82dea
SHA51236e65d5e739a38f627c21b749bb9c37c550b1ce19a764282cf4134afb3fec52d4b903d03ce17554c6363d3b32be9c173be69498c2beb72c886a99e33cb4d0e81
-
Filesize
72KB
MD5237675e0718674b52c7b37b0c5a96c15
SHA179de3c46595cc6fbb5887b25a6d1f1cb6f8dd844
SHA256e25f1db43e0e6b8617914a1cfa3164f4ea58b1fc94b078726dcf751f0be82dea
SHA51236e65d5e739a38f627c21b749bb9c37c550b1ce19a764282cf4134afb3fec52d4b903d03ce17554c6363d3b32be9c173be69498c2beb72c886a99e33cb4d0e81
-
Filesize
72KB
MD51c872e848b102cb365ae421f08d54bab
SHA19c5d264785989f12c243a12ad3745f103bb57a66
SHA25673fada5bb07d66dccc24ac4e8db1efb002ae70068bc69bec5e1d099dd3f854e1
SHA512dcca1843a78db3cbffa9eb2c25adfb4ff091b27ea15a17be5d23cde6e0bb69478e0fe266e1ff9087a2ded2bd095db37d015de3c2f88f2f8f556fc4b0a2e6cbe7
-
Filesize
72KB
MD51c872e848b102cb365ae421f08d54bab
SHA19c5d264785989f12c243a12ad3745f103bb57a66
SHA25673fada5bb07d66dccc24ac4e8db1efb002ae70068bc69bec5e1d099dd3f854e1
SHA512dcca1843a78db3cbffa9eb2c25adfb4ff091b27ea15a17be5d23cde6e0bb69478e0fe266e1ff9087a2ded2bd095db37d015de3c2f88f2f8f556fc4b0a2e6cbe7
-
Filesize
72KB
MD5384fca9faa8f386d12f1ea3137a1f394
SHA12dc52baab557f1f4f4ad6f867ee10d5f23e0ded7
SHA25607b9007cccd65acbaae52b9153750cbb4f8ced9b193ab021f569cd7846c13572
SHA512229f6f81e0cb617f5414d9e6151df32812340ad4c001ed8753d287cedcca54c9081511033d9625b41c58d8f296dcc14ac6b689369c8ac2d8728d0bcaa95bcbe2
-
Filesize
72KB
MD5384fca9faa8f386d12f1ea3137a1f394
SHA12dc52baab557f1f4f4ad6f867ee10d5f23e0ded7
SHA25607b9007cccd65acbaae52b9153750cbb4f8ced9b193ab021f569cd7846c13572
SHA512229f6f81e0cb617f5414d9e6151df32812340ad4c001ed8753d287cedcca54c9081511033d9625b41c58d8f296dcc14ac6b689369c8ac2d8728d0bcaa95bcbe2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5384fca9faa8f386d12f1ea3137a1f394
SHA12dc52baab557f1f4f4ad6f867ee10d5f23e0ded7
SHA25607b9007cccd65acbaae52b9153750cbb4f8ced9b193ab021f569cd7846c13572
SHA512229f6f81e0cb617f5414d9e6151df32812340ad4c001ed8753d287cedcca54c9081511033d9625b41c58d8f296dcc14ac6b689369c8ac2d8728d0bcaa95bcbe2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5384fca9faa8f386d12f1ea3137a1f394
SHA12dc52baab557f1f4f4ad6f867ee10d5f23e0ded7
SHA25607b9007cccd65acbaae52b9153750cbb4f8ced9b193ab021f569cd7846c13572
SHA512229f6f81e0cb617f5414d9e6151df32812340ad4c001ed8753d287cedcca54c9081511033d9625b41c58d8f296dcc14ac6b689369c8ac2d8728d0bcaa95bcbe2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5384fca9faa8f386d12f1ea3137a1f394
SHA12dc52baab557f1f4f4ad6f867ee10d5f23e0ded7
SHA25607b9007cccd65acbaae52b9153750cbb4f8ced9b193ab021f569cd7846c13572
SHA512229f6f81e0cb617f5414d9e6151df32812340ad4c001ed8753d287cedcca54c9081511033d9625b41c58d8f296dcc14ac6b689369c8ac2d8728d0bcaa95bcbe2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5384fca9faa8f386d12f1ea3137a1f394
SHA12dc52baab557f1f4f4ad6f867ee10d5f23e0ded7
SHA25607b9007cccd65acbaae52b9153750cbb4f8ced9b193ab021f569cd7846c13572
SHA512229f6f81e0cb617f5414d9e6151df32812340ad4c001ed8753d287cedcca54c9081511033d9625b41c58d8f296dcc14ac6b689369c8ac2d8728d0bcaa95bcbe2
-
Filesize
72KB
MD51c872e848b102cb365ae421f08d54bab
SHA19c5d264785989f12c243a12ad3745f103bb57a66
SHA25673fada5bb07d66dccc24ac4e8db1efb002ae70068bc69bec5e1d099dd3f854e1
SHA512dcca1843a78db3cbffa9eb2c25adfb4ff091b27ea15a17be5d23cde6e0bb69478e0fe266e1ff9087a2ded2bd095db37d015de3c2f88f2f8f556fc4b0a2e6cbe7
-
Filesize
72KB
MD51c872e848b102cb365ae421f08d54bab
SHA19c5d264785989f12c243a12ad3745f103bb57a66
SHA25673fada5bb07d66dccc24ac4e8db1efb002ae70068bc69bec5e1d099dd3f854e1
SHA512dcca1843a78db3cbffa9eb2c25adfb4ff091b27ea15a17be5d23cde6e0bb69478e0fe266e1ff9087a2ded2bd095db37d015de3c2f88f2f8f556fc4b0a2e6cbe7
-
Filesize
72KB
MD5c8b93a20b11f41f532ca69d4e78b2535
SHA129f70331435e8aa23b59f56580460b0ec695a0e1
SHA256bb755fe88663075ace3e6e4ad2b0586227dcf52a2841e5585f82eb3bf185300f
SHA512415b53e0f888bed8c62d167e11ff1018fb4c50a7d966e3fbc7915d2e98a7b9f53b528ad5d01a30ac7c03292225f5c106f309ca9a0982440ace7e75793863a0b2
-
Filesize
72KB
MD5c8b93a20b11f41f532ca69d4e78b2535
SHA129f70331435e8aa23b59f56580460b0ec695a0e1
SHA256bb755fe88663075ace3e6e4ad2b0586227dcf52a2841e5585f82eb3bf185300f
SHA512415b53e0f888bed8c62d167e11ff1018fb4c50a7d966e3fbc7915d2e98a7b9f53b528ad5d01a30ac7c03292225f5c106f309ca9a0982440ace7e75793863a0b2
-
Filesize
72KB
MD54f365067003bc94257ccdba1f366dab6
SHA1c0633bed798ee4200c19583702e2a760de195db5
SHA25611eeedff5e880862bca1cf23b97b1056e491f404dd0827a25046dbe8b49db016
SHA51247da3a5795d3b0f0dddee221962715ee8ab14e52ec674e825a47ea0ae6e63ffebd64b81d5e371a28bbdc2a7b37d5f21e4f45733529f733276e5e6d48365e443c
-
Filesize
72KB
MD54f365067003bc94257ccdba1f366dab6
SHA1c0633bed798ee4200c19583702e2a760de195db5
SHA25611eeedff5e880862bca1cf23b97b1056e491f404dd0827a25046dbe8b49db016
SHA51247da3a5795d3b0f0dddee221962715ee8ab14e52ec674e825a47ea0ae6e63ffebd64b81d5e371a28bbdc2a7b37d5f21e4f45733529f733276e5e6d48365e443c
-
Filesize
72KB
MD5c0c352f545ec26d9fa47e1a05510ab21
SHA1d2b1dd23e5799660ee98740b3fa877d40fbad50e
SHA2569d1f591a3d60f90564b6c0e86eca32eef344c8633e049230a04bf41c143623e5
SHA512abafea06d2952aba054557c26a012b05395ebfc1f89fca9688560277a14cd0a2becc0209db7ff9f05ece47f9bc4744307de4942002d85b1528a37551f0703fee
-
Filesize
72KB
MD5c0c352f545ec26d9fa47e1a05510ab21
SHA1d2b1dd23e5799660ee98740b3fa877d40fbad50e
SHA2569d1f591a3d60f90564b6c0e86eca32eef344c8633e049230a04bf41c143623e5
SHA512abafea06d2952aba054557c26a012b05395ebfc1f89fca9688560277a14cd0a2becc0209db7ff9f05ece47f9bc4744307de4942002d85b1528a37551f0703fee
-
Filesize
72KB
MD58c39ec30544dbaecfbdf57c4cd30eb56
SHA10cbc1a1f2ff5a2c28afdac2649c28e4549b46529
SHA2567dcebfbf8cd62e0dc93e779cc89fec676d75e30a0b5710bbebbf47b9807f76de
SHA512b1546c071bad586461c2a7ba0f8e06d321422f401757846af5c3ffa055acc517a3e63003bbe2783ed619016a177de5fdd5f3530b14a733f109578d58d7f658cb
-
Filesize
72KB
MD58c39ec30544dbaecfbdf57c4cd30eb56
SHA10cbc1a1f2ff5a2c28afdac2649c28e4549b46529
SHA2567dcebfbf8cd62e0dc93e779cc89fec676d75e30a0b5710bbebbf47b9807f76de
SHA512b1546c071bad586461c2a7ba0f8e06d321422f401757846af5c3ffa055acc517a3e63003bbe2783ed619016a177de5fdd5f3530b14a733f109578d58d7f658cb