Analysis
-
max time kernel
195s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe
Resource
win10v2004-20221111-en
General
-
Target
79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe
-
Size
72KB
-
MD5
182784df28fdaa0f6a34defbe2d7d300
-
SHA1
eb5c2144d35e6c6a27de95a6a0071ff142711f47
-
SHA256
79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64
-
SHA512
bea5dde778538059d487eb40e12c8402cc5a215c0aa94f6d5ccf80a2cc7106539665b593382f76dd13d791395f13d67495d75bdc766f33534bdd44541b319cab
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf23:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4924 backup.exe 1956 backup.exe 3404 backup.exe 2696 backup.exe 5076 backup.exe 2680 backup.exe 3480 backup.exe 3920 backup.exe 64 System Restore.exe 2900 backup.exe 1488 backup.exe 3120 backup.exe 2828 backup.exe 4588 backup.exe 4844 data.exe 4932 backup.exe 4704 backup.exe 4688 backup.exe 4248 backup.exe 4188 backup.exe 1216 backup.exe 1244 backup.exe 2032 backup.exe 2360 backup.exe 1288 backup.exe 2252 backup.exe 4584 backup.exe 4208 backup.exe 1292 backup.exe 2812 backup.exe 4152 backup.exe 1984 backup.exe 4608 backup.exe 4212 backup.exe 1200 backup.exe 3420 backup.exe 3492 backup.exe 1100 update.exe 3692 backup.exe 4432 backup.exe 5068 backup.exe 2212 backup.exe 3716 backup.exe 4340 backup.exe 1712 backup.exe 1948 backup.exe 4412 backup.exe 4988 backup.exe 2816 backup.exe 916 backup.exe 1804 backup.exe 4604 backup.exe 3388 backup.exe 1928 backup.exe 976 backup.exe 3180 backup.exe 4496 backup.exe 2828 backup.exe 3120 backup.exe 3444 backup.exe 4872 backup.exe 3036 backup.exe 3284 backup.exe 776 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\data.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\data.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\update.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\data.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe backup.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\data.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe backup.exe File opened for modification C:\Windows\appcompat\Programs\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 4924 backup.exe 1956 backup.exe 3404 backup.exe 2696 backup.exe 5076 backup.exe 2680 backup.exe 3480 backup.exe 3920 backup.exe 64 System Restore.exe 2900 backup.exe 1488 backup.exe 3120 backup.exe 2828 backup.exe 4588 backup.exe 4844 data.exe 4932 backup.exe 4704 backup.exe 4248 backup.exe 4688 backup.exe 1244 backup.exe 1216 backup.exe 4188 backup.exe 2032 backup.exe 2360 backup.exe 1288 backup.exe 2252 backup.exe 4584 backup.exe 4208 backup.exe 1292 backup.exe 2812 backup.exe 4152 backup.exe 1984 backup.exe 4608 backup.exe 1200 backup.exe 4212 backup.exe 3420 backup.exe 3492 backup.exe 1100 update.exe 3692 backup.exe 4432 backup.exe 5068 backup.exe 2212 backup.exe 3716 backup.exe 4340 backup.exe 1948 backup.exe 4412 backup.exe 1712 backup.exe 4988 backup.exe 2816 backup.exe 916 backup.exe 1804 backup.exe 4604 backup.exe 1928 backup.exe 976 backup.exe 3180 backup.exe 3388 backup.exe 432 backup.exe 2696 backup.exe 4500 backup.exe 2756 backup.exe 776 backup.exe 772 backup.exe 3568 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 4924 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 82 PID 1668 wrote to memory of 4924 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 82 PID 1668 wrote to memory of 4924 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 82 PID 1668 wrote to memory of 1956 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 83 PID 1668 wrote to memory of 1956 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 83 PID 1668 wrote to memory of 1956 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 83 PID 1668 wrote to memory of 3404 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 84 PID 1668 wrote to memory of 3404 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 84 PID 1668 wrote to memory of 3404 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 84 PID 1668 wrote to memory of 2696 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 86 PID 1668 wrote to memory of 2696 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 86 PID 1668 wrote to memory of 2696 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 86 PID 1668 wrote to memory of 5076 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 87 PID 1668 wrote to memory of 5076 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 87 PID 1668 wrote to memory of 5076 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 87 PID 1668 wrote to memory of 2680 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 88 PID 1668 wrote to memory of 2680 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 88 PID 1668 wrote to memory of 2680 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 88 PID 1668 wrote to memory of 3480 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 89 PID 1668 wrote to memory of 3480 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 89 PID 1668 wrote to memory of 3480 1668 79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe 89 PID 4924 wrote to memory of 3920 4924 backup.exe 90 PID 4924 wrote to memory of 3920 4924 backup.exe 90 PID 4924 wrote to memory of 3920 4924 backup.exe 90 PID 3920 wrote to memory of 64 3920 backup.exe 91 PID 3920 wrote to memory of 64 3920 backup.exe 91 PID 3920 wrote to memory of 64 3920 backup.exe 91 PID 3920 wrote to memory of 2900 3920 backup.exe 92 PID 3920 wrote to memory of 2900 3920 backup.exe 92 PID 3920 wrote to memory of 2900 3920 backup.exe 92 PID 3920 wrote to memory of 1488 3920 backup.exe 93 PID 3920 wrote to memory of 1488 3920 backup.exe 93 PID 3920 wrote to memory of 1488 3920 backup.exe 93 PID 1488 wrote to memory of 3120 1488 backup.exe 94 PID 1488 wrote to memory of 3120 1488 backup.exe 94 PID 1488 wrote to memory of 3120 1488 backup.exe 94 PID 3120 wrote to memory of 2828 3120 backup.exe 95 PID 3120 wrote to memory of 2828 3120 backup.exe 95 PID 3120 wrote to memory of 2828 3120 backup.exe 95 PID 1488 wrote to memory of 4588 1488 backup.exe 96 PID 1488 wrote to memory of 4588 1488 backup.exe 96 PID 1488 wrote to memory of 4588 1488 backup.exe 96 PID 4588 wrote to memory of 4844 4588 backup.exe 97 PID 4588 wrote to memory of 4844 4588 backup.exe 97 PID 4588 wrote to memory of 4844 4588 backup.exe 97 PID 4588 wrote to memory of 4932 4588 backup.exe 98 PID 4588 wrote to memory of 4932 4588 backup.exe 98 PID 4588 wrote to memory of 4932 4588 backup.exe 98 PID 4932 wrote to memory of 4704 4932 backup.exe 99 PID 4932 wrote to memory of 4704 4932 backup.exe 99 PID 4932 wrote to memory of 4704 4932 backup.exe 99 PID 3920 wrote to memory of 4688 3920 backup.exe 100 PID 3920 wrote to memory of 4688 3920 backup.exe 100 PID 3920 wrote to memory of 4688 3920 backup.exe 100 PID 1488 wrote to memory of 4248 1488 backup.exe 101 PID 1488 wrote to memory of 4248 1488 backup.exe 101 PID 1488 wrote to memory of 4248 1488 backup.exe 101 PID 4588 wrote to memory of 4188 4588 backup.exe 103 PID 4588 wrote to memory of 4188 4588 backup.exe 103 PID 4588 wrote to memory of 4188 4588 backup.exe 103 PID 4932 wrote to memory of 1244 4932 backup.exe 104 PID 4932 wrote to memory of 1244 4932 backup.exe 104 PID 4932 wrote to memory of 1244 4932 backup.exe 104 PID 3920 wrote to memory of 1216 3920 backup.exe 102 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe"C:\Users\Admin\AppData\Local\Temp\79362e85ccb43310e12aa437f035b2b065361dbace4bf3674828685d415aac64.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\791635852\backup.exeC:\Users\Admin\AppData\Local\Temp\791635852\backup.exe C:\Users\Admin\AppData\Local\Temp\791635852\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4924 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3920 -
C:\odt\System Restore.exe"C:\odt\System Restore.exe" C:\odt\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:64
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files\Common Files\DESIGNER\data.exe"C:\Program Files\Common Files\DESIGNER\data.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4844
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4704
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4208
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3420
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5068
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4340
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:916
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Executes dropped EXE
PID:2828
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- System policy modification
PID:4060
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- System policy modification
PID:384
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵PID:4988
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵PID:5056
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3180
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵PID:364
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Disables RegEdit via registry modification
PID:5052
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:812
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1100
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵PID:1064
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4900
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\update.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\update.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:440
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵PID:1408
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3128
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵PID:3244
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
PID:1144
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3212
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵PID:1408
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4188
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1288 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4152 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1948
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Executes dropped EXE
PID:4496
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4084
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4008
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
PID:3444
-
-
C:\Program Files\Common Files\System\en-US\data.exe"C:\Program Files\Common Files\System\en-US\data.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Disables RegEdit via registry modification
PID:4736
-
-
C:\Program Files\Common Files\System\es-ES\data.exe"C:\Program Files\Common Files\System\es-ES\data.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
PID:3484
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Disables RegEdit via registry modification
PID:4132
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3876
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:4276
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:768
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4248 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2812 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4604
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:3284
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2000
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:404
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Modifies visibility of file extensions in Explorer
PID:2284 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵PID:2860
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:772
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4608
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4432
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2816
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Executes dropped EXE
PID:3120
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
PID:1004
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3240
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:4872 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Drops file in Program Files directory
- System policy modification
PID:3812 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵PID:1312
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Drops file in Program Files directory
PID:3252 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵PID:2632
-
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵
- Modifies visibility of file extensions in Explorer
PID:4216
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵PID:4524
-
-
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵PID:2624
-
-
-
C:\Program Files\Microsoft Office\System Restore.exe"C:\Program Files\Microsoft Office\System Restore.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1540 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵
- Disables RegEdit via registry modification
PID:4580
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1956
-
-
C:\Program Files\Microsoft Office\root\backup.exe"C:\Program Files\Microsoft Office\root\backup.exe" C:\Program Files\Microsoft Office\root\6⤵
- Drops file in Program Files directory
- System policy modification
PID:1804 -
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\7⤵PID:816
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\7⤵PID:4704
-
-
-
C:\Program Files\Microsoft Office\Updates\backup.exe"C:\Program Files\Microsoft Office\Updates\backup.exe" C:\Program Files\Microsoft Office\Updates\6⤵PID:2660
-
-
-
C:\Program Files\Microsoft Office 15\backup.exe"C:\Program Files\Microsoft Office 15\backup.exe" C:\Program Files\Microsoft Office 15\5⤵PID:3192
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4688 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3492
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3716 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4412 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- System policy modification
PID:4704
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- System policy modification
PID:3124
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4172 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵PID:1820
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵PID:2756
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2696 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- System policy modification
PID:1620 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- System policy modification
PID:4864
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3416
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4408 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\9⤵PID:3904
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\7⤵PID:2436
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:432 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Drops file in Program Files directory
PID:724 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Drops file in Program Files directory
PID:3744
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Drops file in Program Files directory
- System policy modification
PID:3664 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- System policy modification
PID:2896
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\data.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\data.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4064
-
-
C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\7⤵PID:4584
-
-
-
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵PID:3944
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:5012
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2252 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4212
-
-
C:\Users\Admin\Contacts\update.exeC:\Users\Admin\Contacts\update.exe C:\Users\Admin\Contacts\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1100
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:976
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:3568
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1432
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:5064
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2520
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3920 -
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\7⤵PID:4260
-
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:64
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:404
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:676
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Disables RegEdit via registry modification
PID:4624
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
PID:3044
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
PID:1964
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵PID:3160
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
PID:3036 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
PID:2160
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:2280 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Drops file in Windows directory
PID:916 -
C:\Windows\appcompat\appraiser\Telemetry\data.exeC:\Windows\appcompat\appraiser\Telemetry\data.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4288
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵
- Modifies visibility of file extensions in Explorer
PID:3836
-
-
C:\Windows\appcompat\Programs\backup.exeC:\Windows\appcompat\Programs\backup.exe C:\Windows\appcompat\Programs\6⤵PID:8
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵PID:4188
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\1⤵
- Modifies visibility of file extensions in Explorer
PID:3444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5682f0ad7d64e064b1dace64297bca3d6
SHA183d5d1394eb456adba847948d2fd919bf18a3713
SHA25602bc2baff8780ab80669b69cb5361ed35767fa452d1861eade69c3651e6edb1e
SHA51230297b870b2b3627d32ec0f37ea800a62775e40401e66bbd0c2f518501eb7be5b66efe08949e96a5889c34c93930530f24c3cd2f5bbf32011bcc78b4974a2967
-
Filesize
72KB
MD5682f0ad7d64e064b1dace64297bca3d6
SHA183d5d1394eb456adba847948d2fd919bf18a3713
SHA25602bc2baff8780ab80669b69cb5361ed35767fa452d1861eade69c3651e6edb1e
SHA51230297b870b2b3627d32ec0f37ea800a62775e40401e66bbd0c2f518501eb7be5b66efe08949e96a5889c34c93930530f24c3cd2f5bbf32011bcc78b4974a2967
-
Filesize
72KB
MD514263b11ecd108b713089215d1a8f11a
SHA1b5510c3a3182c8b4c839d31d4b1d86f65945abcb
SHA2561ff9dcf068a395479e06781883f20ed50ec0874eedf89ddb61132a0f00b091cf
SHA512080ed29d74f26bce4e761cb7c7315efc24c61878f0b15c823881bb19f8aa11f2d4e813a02a2532e54a0ab44a9d21e1d20a907ec159de3fc3783ab3766e8577ed
-
Filesize
72KB
MD514263b11ecd108b713089215d1a8f11a
SHA1b5510c3a3182c8b4c839d31d4b1d86f65945abcb
SHA2561ff9dcf068a395479e06781883f20ed50ec0874eedf89ddb61132a0f00b091cf
SHA512080ed29d74f26bce4e761cb7c7315efc24c61878f0b15c823881bb19f8aa11f2d4e813a02a2532e54a0ab44a9d21e1d20a907ec159de3fc3783ab3766e8577ed
-
Filesize
72KB
MD5b9828abd98a55e69df6e87a4063d0862
SHA10c7c367013b36bdf521dd711016d09d9b45f1f65
SHA256d806f3232d352550c1d0e3bcf10591224aa13a829b07799683a0d932da92f325
SHA5120d7bf5a35e7eeb70d222d562d9f5195525ec54425b3892ca61632671a4892a60fc7fac54c3728591431d4464c362717642946705cc0022b61cb1037fd1d27670
-
Filesize
72KB
MD5b9828abd98a55e69df6e87a4063d0862
SHA10c7c367013b36bdf521dd711016d09d9b45f1f65
SHA256d806f3232d352550c1d0e3bcf10591224aa13a829b07799683a0d932da92f325
SHA5120d7bf5a35e7eeb70d222d562d9f5195525ec54425b3892ca61632671a4892a60fc7fac54c3728591431d4464c362717642946705cc0022b61cb1037fd1d27670
-
Filesize
72KB
MD5d0c3283ec713164ea7ef34104e153be4
SHA14fd942ac411d3a3df4d2c7cbc8202a48c37c85ff
SHA2564fc722e767e9479dfc62798f9aaeef18b90d5b51f73bb40ac49bfc6027c68908
SHA512543bdfdb4b6fc8f6a2266a1ac13438e8e0902337d4a111d784dd909042fa2fd5730225802f9d4777328250031d333d1ef9f135ac52f798b8e500e02d7e31a356
-
Filesize
72KB
MD5d0c3283ec713164ea7ef34104e153be4
SHA14fd942ac411d3a3df4d2c7cbc8202a48c37c85ff
SHA2564fc722e767e9479dfc62798f9aaeef18b90d5b51f73bb40ac49bfc6027c68908
SHA512543bdfdb4b6fc8f6a2266a1ac13438e8e0902337d4a111d784dd909042fa2fd5730225802f9d4777328250031d333d1ef9f135ac52f798b8e500e02d7e31a356
-
Filesize
72KB
MD59c3d093c0f50d89bc51fecf7169bbd25
SHA10bb31cb8089b04bfa0b0c8f802023f6f01261c0e
SHA2566191612bfa318639c627e8ce0a4e121d315520b38d1ac0809814a5cb121ae0c5
SHA512f1d04b0b0c08aebfce96f0f5f851c3fa6c83e6f67e84e9bd42294774bb64feeabfbd4e6da1ae3b414785ff9c1dbbc777a259d04f7808e4d568b5e1bc6a47937b
-
Filesize
72KB
MD59c3d093c0f50d89bc51fecf7169bbd25
SHA10bb31cb8089b04bfa0b0c8f802023f6f01261c0e
SHA2566191612bfa318639c627e8ce0a4e121d315520b38d1ac0809814a5cb121ae0c5
SHA512f1d04b0b0c08aebfce96f0f5f851c3fa6c83e6f67e84e9bd42294774bb64feeabfbd4e6da1ae3b414785ff9c1dbbc777a259d04f7808e4d568b5e1bc6a47937b
-
Filesize
72KB
MD50d31a5d6f6a5f633684341a84cc60920
SHA1b68eb09dd313ca5b364f51342ffc4acc08d00de4
SHA2565e56d099ed66af5bb511a54357aeb000af368c465d73df11d6b3575cc7b9317a
SHA512f7db1f32c25d3a48e3628428003caabc70516a2908fe809ec9b6c744b8d7497086596baa72d2dd606964aefac7827c6cbc94e888cbd383c8699b17cb5414b1c6
-
Filesize
72KB
MD50d31a5d6f6a5f633684341a84cc60920
SHA1b68eb09dd313ca5b364f51342ffc4acc08d00de4
SHA2565e56d099ed66af5bb511a54357aeb000af368c465d73df11d6b3575cc7b9317a
SHA512f7db1f32c25d3a48e3628428003caabc70516a2908fe809ec9b6c744b8d7497086596baa72d2dd606964aefac7827c6cbc94e888cbd383c8699b17cb5414b1c6
-
Filesize
72KB
MD5b182b1bb401644511fb3dca256481bfe
SHA1205495bc3faf5a48b7653b35b5ccedbd37a9c7ab
SHA256153891c1f2f3755f942274cea9cd871588a943a82dbbdddb5a62f039e8240855
SHA5123775748f24039aa38f49780f78a5b97f15d4eb02c5e1d81f6b5551564295f1b91dfd2952483b377411ae7992cf0394884dbfac9634ee9fc28d403097f1fa2bfd
-
Filesize
72KB
MD5b182b1bb401644511fb3dca256481bfe
SHA1205495bc3faf5a48b7653b35b5ccedbd37a9c7ab
SHA256153891c1f2f3755f942274cea9cd871588a943a82dbbdddb5a62f039e8240855
SHA5123775748f24039aa38f49780f78a5b97f15d4eb02c5e1d81f6b5551564295f1b91dfd2952483b377411ae7992cf0394884dbfac9634ee9fc28d403097f1fa2bfd
-
Filesize
72KB
MD5154d275bd1a5a27841ea43beac72e01d
SHA1d90f174d10b7d794c639f0fe68a508a410c7889d
SHA25681f28ae6cdd8a45db5b2e006d3584277929e9451086c4a66011c614b5fa128fa
SHA512164464deb769d7bcf3440c828ac5f8ea9f77129b374710c6bf790e7bec3ff39648a63273daa3ba9d6d8ab81d2533f42518e040e1de898909500f72b4ce2ff02f
-
Filesize
72KB
MD5154d275bd1a5a27841ea43beac72e01d
SHA1d90f174d10b7d794c639f0fe68a508a410c7889d
SHA25681f28ae6cdd8a45db5b2e006d3584277929e9451086c4a66011c614b5fa128fa
SHA512164464deb769d7bcf3440c828ac5f8ea9f77129b374710c6bf790e7bec3ff39648a63273daa3ba9d6d8ab81d2533f42518e040e1de898909500f72b4ce2ff02f
-
Filesize
72KB
MD50c767be49067562fc1b570c3f2b92faa
SHA171a42106c63890023f2a9e56b731e098104fa165
SHA256b7d78ace0c3eecca02619e32cb04b10c170f82a8aef757851bcd803fb93cbb46
SHA512fc34bbff894725ed6d4ec920a86d8000c9596b4cc51513be6bb36bb527607f0d0de621266f82e3671ec3c9d16c71e757e9462e83ba2c1990117887ce786bcfa8
-
Filesize
72KB
MD50c767be49067562fc1b570c3f2b92faa
SHA171a42106c63890023f2a9e56b731e098104fa165
SHA256b7d78ace0c3eecca02619e32cb04b10c170f82a8aef757851bcd803fb93cbb46
SHA512fc34bbff894725ed6d4ec920a86d8000c9596b4cc51513be6bb36bb527607f0d0de621266f82e3671ec3c9d16c71e757e9462e83ba2c1990117887ce786bcfa8
-
Filesize
72KB
MD5b22fc0e1fea237d25104d27135c64873
SHA1661f7c6c4674dd7d55404c2ab3e07ef50336fd74
SHA256474494d43eee3fc465b7dc66c1f768ce2320ac4fa357fefa0e4a71d8cd4c8d77
SHA51268f7c3bdf5d136fb4e7169a055afd40e1ca0282a08d58b9a635fb04a4d39dd609da45740e205d48f823038e769c40bb26db536833c1f5778506f6b22d69af700
-
Filesize
72KB
MD5b22fc0e1fea237d25104d27135c64873
SHA1661f7c6c4674dd7d55404c2ab3e07ef50336fd74
SHA256474494d43eee3fc465b7dc66c1f768ce2320ac4fa357fefa0e4a71d8cd4c8d77
SHA51268f7c3bdf5d136fb4e7169a055afd40e1ca0282a08d58b9a635fb04a4d39dd609da45740e205d48f823038e769c40bb26db536833c1f5778506f6b22d69af700
-
Filesize
72KB
MD5817846463266250c0ca3a2aa4cd5ac34
SHA15ed8369b080269a9bace244fd69247dc2632959a
SHA256da0da3c97532f4f7285c8bed9eea27c4fa19829120854870e3eb063f64706619
SHA51277b29626ce2c663b7de622f504c36f8295456c4bcb0b61145c39a6ab2f88791dc4b6db45736dbae14047621f4406abada7cb1e776316d3eb934b3b3cb6f8ae73
-
Filesize
72KB
MD5817846463266250c0ca3a2aa4cd5ac34
SHA15ed8369b080269a9bace244fd69247dc2632959a
SHA256da0da3c97532f4f7285c8bed9eea27c4fa19829120854870e3eb063f64706619
SHA51277b29626ce2c663b7de622f504c36f8295456c4bcb0b61145c39a6ab2f88791dc4b6db45736dbae14047621f4406abada7cb1e776316d3eb934b3b3cb6f8ae73
-
Filesize
72KB
MD50d31a5d6f6a5f633684341a84cc60920
SHA1b68eb09dd313ca5b364f51342ffc4acc08d00de4
SHA2565e56d099ed66af5bb511a54357aeb000af368c465d73df11d6b3575cc7b9317a
SHA512f7db1f32c25d3a48e3628428003caabc70516a2908fe809ec9b6c744b8d7497086596baa72d2dd606964aefac7827c6cbc94e888cbd383c8699b17cb5414b1c6
-
Filesize
72KB
MD50d31a5d6f6a5f633684341a84cc60920
SHA1b68eb09dd313ca5b364f51342ffc4acc08d00de4
SHA2565e56d099ed66af5bb511a54357aeb000af368c465d73df11d6b3575cc7b9317a
SHA512f7db1f32c25d3a48e3628428003caabc70516a2908fe809ec9b6c744b8d7497086596baa72d2dd606964aefac7827c6cbc94e888cbd383c8699b17cb5414b1c6
-
Filesize
72KB
MD534d5fb75c27deb05cc6f5e90d66742f0
SHA13f59fb51b2bdcedc22c15c0caa31e40433304831
SHA2563666c14122c983694e2e53fd3a1236a66adbb75bd3ce8e64af384ee72ba94a2b
SHA512fd82f41ca638aa31216f024c49a2d1ddbe33f9b7980d6cf9b45aa1bc150c1d3d2b3ce7a38274496f2df70118151ff351d1872ce82d1f256aa94ef3906a11db63
-
Filesize
72KB
MD534d5fb75c27deb05cc6f5e90d66742f0
SHA13f59fb51b2bdcedc22c15c0caa31e40433304831
SHA2563666c14122c983694e2e53fd3a1236a66adbb75bd3ce8e64af384ee72ba94a2b
SHA512fd82f41ca638aa31216f024c49a2d1ddbe33f9b7980d6cf9b45aa1bc150c1d3d2b3ce7a38274496f2df70118151ff351d1872ce82d1f256aa94ef3906a11db63
-
Filesize
72KB
MD5ab70c7a6e237dfec23a6013be0272d4a
SHA1c068dfed5f6eb70e5c8d063e9868e285370dd01f
SHA2562205954e9b07ee367b4a156883f2c93645557b8a55abc439fc525867e2efd3b1
SHA51232d4d855956b87411db55cc8c472e966fef76a5dc6603c6f6876f420f427ac1b6491b6a2415b881ac9d37ea7e1a654dc4291ca5cb301f6d49480dc878e3f37bc
-
Filesize
72KB
MD5ab70c7a6e237dfec23a6013be0272d4a
SHA1c068dfed5f6eb70e5c8d063e9868e285370dd01f
SHA2562205954e9b07ee367b4a156883f2c93645557b8a55abc439fc525867e2efd3b1
SHA51232d4d855956b87411db55cc8c472e966fef76a5dc6603c6f6876f420f427ac1b6491b6a2415b881ac9d37ea7e1a654dc4291ca5cb301f6d49480dc878e3f37bc
-
Filesize
72KB
MD50ff4943e7bb8f262502df44f4e04d626
SHA191fda54dbcb4e4b97600f257e58d8e0e0c0e1357
SHA256a975dc0f6df580d016446972f07b67450a393573457368d5e0376cb1783e9ea3
SHA5128b6bfb42771c733d025ed6a8d0142dfc87d0d80f6b4fc36522e4d7834a1b838d69448edb1421a8326166e5b4c4ff09d907ff2ac31ac4810533233425e587bbd1
-
Filesize
72KB
MD50ff4943e7bb8f262502df44f4e04d626
SHA191fda54dbcb4e4b97600f257e58d8e0e0c0e1357
SHA256a975dc0f6df580d016446972f07b67450a393573457368d5e0376cb1783e9ea3
SHA5128b6bfb42771c733d025ed6a8d0142dfc87d0d80f6b4fc36522e4d7834a1b838d69448edb1421a8326166e5b4c4ff09d907ff2ac31ac4810533233425e587bbd1
-
Filesize
72KB
MD5408947211a8943fc08f203a6e856d8f8
SHA14f8ea554864fcc6704111ee8c95edc95d8864fe1
SHA2568d10348f57d9aca4136a258437a11053600d7e8782b7b90f6dd6aa2f902dce9b
SHA512596235d191133a5c78fa81319c995d7e88ce906d1e81c63ae318ccb10660401028ae4342753fb70d6f6fdb013e3959e3466e3844056d4ec85ce512e032492061
-
Filesize
72KB
MD5408947211a8943fc08f203a6e856d8f8
SHA14f8ea554864fcc6704111ee8c95edc95d8864fe1
SHA2568d10348f57d9aca4136a258437a11053600d7e8782b7b90f6dd6aa2f902dce9b
SHA512596235d191133a5c78fa81319c995d7e88ce906d1e81c63ae318ccb10660401028ae4342753fb70d6f6fdb013e3959e3466e3844056d4ec85ce512e032492061
-
Filesize
72KB
MD5f8df79423215ba206eb75155dd6ab3f6
SHA16f933838b73747e88ae35824c4e1d50a9afe35a6
SHA25638e789d5bc1eeffdcb2dabe2d4a6cafd3c85fcd6b1c565946e60c8819cac7d3f
SHA5124891e49f7aec39b5fc01a08da19f7c031fb34a97af22ea4b1e1fb98dad679f68c6bd62d6cf26cb9bb590cfed280c7d4abe1764e60b67b91d806760189bd08255
-
Filesize
72KB
MD5f8df79423215ba206eb75155dd6ab3f6
SHA16f933838b73747e88ae35824c4e1d50a9afe35a6
SHA25638e789d5bc1eeffdcb2dabe2d4a6cafd3c85fcd6b1c565946e60c8819cac7d3f
SHA5124891e49f7aec39b5fc01a08da19f7c031fb34a97af22ea4b1e1fb98dad679f68c6bd62d6cf26cb9bb590cfed280c7d4abe1764e60b67b91d806760189bd08255
-
Filesize
72KB
MD583a4168849214662037888ca7a39022a
SHA16dbd5e0c639bf8ddb96c17fc61d0f4f61b36f234
SHA256f5634ad4853fae5d96edc762ce1cf0bbda68835d0a879ac65ee98df3c09e2261
SHA512b9a34b9b4b07402fe2d0adc68104024f1e84cb35a8fc3c411e287ae6f5ef70442851deae3d16476023b2ec55625f3610cf64efe08032ef18873aab5d347d1a74
-
Filesize
72KB
MD583a4168849214662037888ca7a39022a
SHA16dbd5e0c639bf8ddb96c17fc61d0f4f61b36f234
SHA256f5634ad4853fae5d96edc762ce1cf0bbda68835d0a879ac65ee98df3c09e2261
SHA512b9a34b9b4b07402fe2d0adc68104024f1e84cb35a8fc3c411e287ae6f5ef70442851deae3d16476023b2ec55625f3610cf64efe08032ef18873aab5d347d1a74
-
Filesize
72KB
MD519f9d8afa1225c36bca4057424c8533c
SHA1367c2bcaab11394d9bd058f774d23bdf47fb980a
SHA256507b8be852bf1888454602fc4fcff500a44ae4f720ba38cdda01b11ec7368019
SHA512dbfbccf47d51563e13563c60b4123e712935becea8d934b02882056f5e2d47ff1fa0c14577e9f66939427be3a99fcc84b1051427d2ce310a209a0be634547a18
-
Filesize
72KB
MD519f9d8afa1225c36bca4057424c8533c
SHA1367c2bcaab11394d9bd058f774d23bdf47fb980a
SHA256507b8be852bf1888454602fc4fcff500a44ae4f720ba38cdda01b11ec7368019
SHA512dbfbccf47d51563e13563c60b4123e712935becea8d934b02882056f5e2d47ff1fa0c14577e9f66939427be3a99fcc84b1051427d2ce310a209a0be634547a18
-
Filesize
72KB
MD551053b2bb60ac841f242c2eb013f45b0
SHA1f19cd19718ff93ef46296feac43785b4f4f9fb33
SHA256feb4c9c843bc1ab3675b9f70e0b66334364dce7874ced517ef8037dc27e2ddf2
SHA51213b50edbeb003ccf66200e2a1d56710ff5c7a667cd83ccb1dc1bc22f44fc0f3055e52c2d99b84cf8ccd0d60fe4fe9e4be345cb3d0668d720625e9624f68440cf
-
Filesize
72KB
MD551053b2bb60ac841f242c2eb013f45b0
SHA1f19cd19718ff93ef46296feac43785b4f4f9fb33
SHA256feb4c9c843bc1ab3675b9f70e0b66334364dce7874ced517ef8037dc27e2ddf2
SHA51213b50edbeb003ccf66200e2a1d56710ff5c7a667cd83ccb1dc1bc22f44fc0f3055e52c2d99b84cf8ccd0d60fe4fe9e4be345cb3d0668d720625e9624f68440cf
-
Filesize
72KB
MD5682f0ad7d64e064b1dace64297bca3d6
SHA183d5d1394eb456adba847948d2fd919bf18a3713
SHA25602bc2baff8780ab80669b69cb5361ed35767fa452d1861eade69c3651e6edb1e
SHA51230297b870b2b3627d32ec0f37ea800a62775e40401e66bbd0c2f518501eb7be5b66efe08949e96a5889c34c93930530f24c3cd2f5bbf32011bcc78b4974a2967
-
Filesize
72KB
MD5682f0ad7d64e064b1dace64297bca3d6
SHA183d5d1394eb456adba847948d2fd919bf18a3713
SHA25602bc2baff8780ab80669b69cb5361ed35767fa452d1861eade69c3651e6edb1e
SHA51230297b870b2b3627d32ec0f37ea800a62775e40401e66bbd0c2f518501eb7be5b66efe08949e96a5889c34c93930530f24c3cd2f5bbf32011bcc78b4974a2967
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5ad386e0c382a64922e27e9cc287caec9
SHA1e97e08c29d354fe324f6e5692d66e569fd4ca121
SHA25650709e24a5fe897a04008a587d4b16d71e7a65bb2bb441bcedf4a1039519920b
SHA512ab76f480984eca1a74b6560071644f68f9344253373f4377ed2544a8c8162421653ce0768c8281bb3377c5062ed19ad3ce073d9dfa67744c26c8fbae1bf18567
-
Filesize
72KB
MD5bc95dc4706d876ebc6c7643f371ec24c
SHA1312a3adbe893f56c8fbd38ae072e6fc399de5bd9
SHA2569402fca97710e8b6af5cff8be89fa9a05eeef56e4a2e5a071028dc23f79a859b
SHA512cfe0d76fd59cc60395aa265e1d58762077768722285ef68e83114d45d27afd249922c4fa523dc7840189ca1f72c8ab39db93f9885b4b508fb54a0f358eb2895b
-
Filesize
72KB
MD5bc95dc4706d876ebc6c7643f371ec24c
SHA1312a3adbe893f56c8fbd38ae072e6fc399de5bd9
SHA2569402fca97710e8b6af5cff8be89fa9a05eeef56e4a2e5a071028dc23f79a859b
SHA512cfe0d76fd59cc60395aa265e1d58762077768722285ef68e83114d45d27afd249922c4fa523dc7840189ca1f72c8ab39db93f9885b4b508fb54a0f358eb2895b
-
Filesize
72KB
MD52312089900d8832c862042953fa8d6af
SHA171e57d88f8e29b70dfa3f695ae0b3abc03dfe03d
SHA2565ef8cefe30304691282f53e7c85b4c274d0d05f89fb5ed8e4c20cca64267894a
SHA512081cb9c76b891fcbe74a995896af0addf613787c99937ca0e4090c482f51b446ec14d8c2a01372966af684ccc92ba4438b7bb4b9bdcbd4e5717a53f25b60236b
-
Filesize
72KB
MD52312089900d8832c862042953fa8d6af
SHA171e57d88f8e29b70dfa3f695ae0b3abc03dfe03d
SHA2565ef8cefe30304691282f53e7c85b4c274d0d05f89fb5ed8e4c20cca64267894a
SHA512081cb9c76b891fcbe74a995896af0addf613787c99937ca0e4090c482f51b446ec14d8c2a01372966af684ccc92ba4438b7bb4b9bdcbd4e5717a53f25b60236b
-
Filesize
72KB
MD5576059e0488f4e8a280d9b381116d1ca
SHA1ac344519c91f667dd1c9535e68f65c208ec498ac
SHA25650fe72056a143cefe3f6246fb4d0af9864441c70fb46e230c739662b41c6ce8b
SHA5127c8966eb182a2d069abe6a83b90e219a8d9d4a8220745d010ac9f5d32d1dc4a75e8c30aac5a8d82ce29e9fb0e51e6f5abe2d68326fbd5de3dbed63649d4fc7ec
-
Filesize
72KB
MD5576059e0488f4e8a280d9b381116d1ca
SHA1ac344519c91f667dd1c9535e68f65c208ec498ac
SHA25650fe72056a143cefe3f6246fb4d0af9864441c70fb46e230c739662b41c6ce8b
SHA5127c8966eb182a2d069abe6a83b90e219a8d9d4a8220745d010ac9f5d32d1dc4a75e8c30aac5a8d82ce29e9fb0e51e6f5abe2d68326fbd5de3dbed63649d4fc7ec
-
Filesize
72KB
MD5046581f2657953838ed6ebfaf7fdd811
SHA11fea64ff751d24c4ab99375f19a28071d30aa796
SHA25618e31d282a565040438412c14dc94809a42ff7b6a32d3e5bf33bc832432b2c2c
SHA512531b17e4759e9a07bcffc131577d6fd10d694b5ec2a6f146f41497418872edd33fa2f027ebded79bd2ccc2757bae9f76b7ebf5d44a108663dce6c80369997325
-
Filesize
72KB
MD5046581f2657953838ed6ebfaf7fdd811
SHA11fea64ff751d24c4ab99375f19a28071d30aa796
SHA25618e31d282a565040438412c14dc94809a42ff7b6a32d3e5bf33bc832432b2c2c
SHA512531b17e4759e9a07bcffc131577d6fd10d694b5ec2a6f146f41497418872edd33fa2f027ebded79bd2ccc2757bae9f76b7ebf5d44a108663dce6c80369997325
-
Filesize
72KB
MD5ae529c91ab3f1a42072a0042e7dd657d
SHA1d7a8f37d157367402426e820a949653761b4fa35
SHA256abd908cf44252916fbdcbfd677a971bce88a390aafb398b1dc99f0777079677f
SHA51258e9e165d017771251db73709366290b96e69b3271b684395f3ef6745526dda0b80f6fa56e3a443570dd614a22322ba639d13bd6327711bcee1eca6f84cfea66
-
Filesize
72KB
MD5ae529c91ab3f1a42072a0042e7dd657d
SHA1d7a8f37d157367402426e820a949653761b4fa35
SHA256abd908cf44252916fbdcbfd677a971bce88a390aafb398b1dc99f0777079677f
SHA51258e9e165d017771251db73709366290b96e69b3271b684395f3ef6745526dda0b80f6fa56e3a443570dd614a22322ba639d13bd6327711bcee1eca6f84cfea66