Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:57
Static task
static1
Behavioral task
behavioral1
Sample
177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe
Resource
win10v2004-20221111-en
General
-
Target
177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe
-
Size
72KB
-
MD5
05ee5853781c2f73a4a16eaa8da9d46d
-
SHA1
8f0e243afdaca49360ee20447f00023e06e171f5
-
SHA256
177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60
-
SHA512
12056b982e2e1d8b319da22d8b06d5c4fae6e20410d6b126ccaac404900a6c6c31f191ee13d939528d3605f7c35c8fb39ce168fe7eb7b2626c9d8af3de9dcbea
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2k:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrI
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
update.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exeSystem Restore.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exe177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exeSystem Restore.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exedata.exeupdate.exebackup.exebackup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
Processes:
backup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exedata.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exepid process 3936 backup.exe 1724 update.exe 3276 backup.exe 3124 backup.exe 3480 backup.exe 5100 backup.exe 3420 backup.exe 1200 backup.exe 3808 backup.exe 5096 backup.exe 4472 backup.exe 1476 backup.exe 1460 backup.exe 5048 backup.exe 2880 backup.exe 4436 data.exe 3344 data.exe 4032 backup.exe 4840 backup.exe 2684 backup.exe 2820 backup.exe 3132 update.exe 456 backup.exe 924 backup.exe 3476 backup.exe 1292 backup.exe 2328 System Restore.exe 4216 backup.exe 748 backup.exe 2696 backup.exe 1376 backup.exe 3192 backup.exe 2768 backup.exe 3432 System Restore.exe 4844 System Restore.exe 3492 backup.exe 1452 backup.exe 2356 backup.exe 5004 backup.exe 440 backup.exe 3856 backup.exe 3260 backup.exe 1304 backup.exe 3360 backup.exe 4028 backup.exe 3532 backup.exe 5104 backup.exe 2324 backup.exe 3292 backup.exe 5096 backup.exe 1928 backup.exe 3284 backup.exe 1488 backup.exe 1476 backup.exe 1564 System Restore.exe 3120 backup.exe 3996 backup.exe 4220 backup.exe 3068 backup.exe 3344 backup.exe 4768 backup.exe 2360 backup.exe 452 backup.exe 208 backup.exe -
Drops file in Program Files directory 64 IoCs
Processes:
backup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe data.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office 15\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\Office16\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\data.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe data.exe File opened for modification C:\Program Files\Microsoft Office\root\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\data.exe data.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe -
Drops file in Windows directory 8 IoCs
Processes:
backup.exebackup.exeSystem Restore.exebackup.exedescription ioc process File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\System Restore.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe System Restore.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe System Restore.exe File opened for modification C:\Windows\appcompat\Programs\data.exe System Restore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exepid process 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exedata.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exepid process 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe 3936 backup.exe 1724 update.exe 3276 backup.exe 3124 backup.exe 3480 backup.exe 5100 backup.exe 3420 backup.exe 1200 backup.exe 3808 backup.exe 5096 backup.exe 4472 backup.exe 1476 backup.exe 1460 backup.exe 5048 backup.exe 2880 backup.exe 4436 data.exe 3344 data.exe 4032 backup.exe 4840 backup.exe 2684 backup.exe 3132 update.exe 456 backup.exe 924 backup.exe 2820 backup.exe 3476 backup.exe 1292 backup.exe 2328 System Restore.exe 4216 backup.exe 748 backup.exe 2696 backup.exe 1376 backup.exe 3192 backup.exe 3432 System Restore.exe 2768 backup.exe 4844 System Restore.exe 3492 backup.exe 1452 backup.exe 5004 backup.exe 440 backup.exe 2356 backup.exe 3856 backup.exe 1304 backup.exe 3532 backup.exe 3260 backup.exe 3360 backup.exe 5104 backup.exe 4028 backup.exe 2324 backup.exe 3292 backup.exe 5096 backup.exe 1928 backup.exe 1488 backup.exe 3284 backup.exe 1476 backup.exe 1564 System Restore.exe 3120 backup.exe 3996 backup.exe 4220 backup.exe 3068 backup.exe 3344 backup.exe 4768 backup.exe 2360 backup.exe 4856 System Restore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exedescription pid process target process PID 1156 wrote to memory of 3936 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3936 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3936 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 1724 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe update.exe PID 1156 wrote to memory of 1724 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe update.exe PID 1156 wrote to memory of 1724 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe update.exe PID 1156 wrote to memory of 3276 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3276 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3276 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3124 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3124 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3124 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3480 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3480 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3480 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 3936 wrote to memory of 5100 3936 backup.exe backup.exe PID 3936 wrote to memory of 5100 3936 backup.exe backup.exe PID 3936 wrote to memory of 5100 3936 backup.exe backup.exe PID 1156 wrote to memory of 3420 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3420 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 3420 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 1200 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 1200 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 1156 wrote to memory of 1200 1156 177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe backup.exe PID 5100 wrote to memory of 3808 5100 backup.exe backup.exe PID 5100 wrote to memory of 3808 5100 backup.exe backup.exe PID 5100 wrote to memory of 3808 5100 backup.exe backup.exe PID 5100 wrote to memory of 5096 5100 backup.exe backup.exe PID 5100 wrote to memory of 5096 5100 backup.exe backup.exe PID 5100 wrote to memory of 5096 5100 backup.exe backup.exe PID 5100 wrote to memory of 4472 5100 backup.exe backup.exe PID 5100 wrote to memory of 4472 5100 backup.exe backup.exe PID 5100 wrote to memory of 4472 5100 backup.exe backup.exe PID 4472 wrote to memory of 1476 4472 backup.exe backup.exe PID 4472 wrote to memory of 1476 4472 backup.exe backup.exe PID 4472 wrote to memory of 1476 4472 backup.exe backup.exe PID 1476 wrote to memory of 1460 1476 backup.exe backup.exe PID 1476 wrote to memory of 1460 1476 backup.exe backup.exe PID 1476 wrote to memory of 1460 1476 backup.exe backup.exe PID 4472 wrote to memory of 5048 4472 backup.exe backup.exe PID 4472 wrote to memory of 5048 4472 backup.exe backup.exe PID 4472 wrote to memory of 5048 4472 backup.exe backup.exe PID 5048 wrote to memory of 2880 5048 backup.exe backup.exe PID 5048 wrote to memory of 2880 5048 backup.exe backup.exe PID 5048 wrote to memory of 2880 5048 backup.exe backup.exe PID 5048 wrote to memory of 4436 5048 backup.exe data.exe PID 5048 wrote to memory of 4436 5048 backup.exe data.exe PID 5048 wrote to memory of 4436 5048 backup.exe data.exe PID 4436 wrote to memory of 3344 4436 data.exe data.exe PID 4436 wrote to memory of 3344 4436 data.exe data.exe PID 4436 wrote to memory of 3344 4436 data.exe data.exe PID 4436 wrote to memory of 4032 4436 data.exe backup.exe PID 4436 wrote to memory of 4032 4436 data.exe backup.exe PID 4436 wrote to memory of 4032 4436 data.exe backup.exe PID 4032 wrote to memory of 4840 4032 backup.exe backup.exe PID 4032 wrote to memory of 4840 4032 backup.exe backup.exe PID 4032 wrote to memory of 4840 4032 backup.exe backup.exe PID 4472 wrote to memory of 2684 4472 backup.exe backup.exe PID 4472 wrote to memory of 2684 4472 backup.exe backup.exe PID 4472 wrote to memory of 2684 4472 backup.exe backup.exe PID 5100 wrote to memory of 2820 5100 backup.exe backup.exe PID 5100 wrote to memory of 2820 5100 backup.exe backup.exe PID 5100 wrote to memory of 2820 5100 backup.exe backup.exe PID 5048 wrote to memory of 456 5048 backup.exe backup.exe -
System policy modification 1 TTPs 64 IoCs
Processes:
backup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe"C:\Users\Admin\AppData\Local\Temp\177308248ad196878d417c147cc976916a7d9f863e18928a71c67a7857c8fd60.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\3207943795\backup.exeC:\Users\Admin\AppData\Local\Temp\3207943795\backup.exe C:\Users\Admin\AppData\Local\Temp\3207943795\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3808 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5096 -
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1460 -
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2880 -
C:\Program Files\Common Files\microsoft shared\data.exe"C:\Program Files\Common Files\microsoft shared\data.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4436 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\data.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\data.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3344 -
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4840 -
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\update.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\update.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3132 -
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292 -
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3192 -
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3260 -
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3344 -
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- System policy modification
PID:4816 -
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:4580 -
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1324 -
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵PID:620
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
PID:1328 -
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3472 -
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵PID:2760
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:924 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2768 -
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3360 -
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵PID:1116
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:2676
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3044 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:748 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1452 -
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3532 -
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- System policy modification
PID:4264 -
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵PID:884
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3776 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵PID:3988
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Drops file in Program Files directory
PID:4748 -
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵PID:4176
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:456 -
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3476 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3492 -
C:\Program Files\Common Files\System\ado\de-DE\System Restore.exe"C:\Program Files\Common Files\System\ado\de-DE\System Restore.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Program Files\Common Files\System\ado\en-US\System Restore.exe"C:\Program Files\Common Files\System\ado\en-US\System Restore.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:4856 -
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:4812
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- System policy modification
PID:4176 -
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:3480 -
C:\Program Files\Common Files\System\ado\ja-JP\System Restore.exe"C:\Program Files\Common Files\System\ado\ja-JP\System Restore.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- System policy modification
PID:4296 -
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4028 -
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4220 -
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1556 -
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3180 -
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:3508
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵
- System policy modification
PID:4932 -
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:2764
-
C:\Program Files\Common Files\System\msadc\de-DE\backup.exe"C:\Program Files\Common Files\System\msadc\de-DE\backup.exe" C:\Program Files\Common Files\System\msadc\de-DE\8⤵PID:1116
-
C:\Program Files\Common Files\System\msadc\en-US\backup.exe"C:\Program Files\Common Files\System\msadc\en-US\backup.exe" C:\Program Files\Common Files\System\msadc\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2676 -
C:\Program Files\Common Files\System\Ole DB\update.exe"C:\Program Files\Common Files\System\Ole DB\update.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:3508
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3856 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3996 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:208 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- System policy modification
PID:2204 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Disables RegEdit via registry modification
PID:1724 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1128 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2108 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4572 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵PID:1220
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1096
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4216 -
C:\Program Files\Internet Explorer\de-DE\System Restore.exe"C:\Program Files\Internet Explorer\de-DE\System Restore.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4844 -
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:440 -
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2324 -
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- System policy modification
PID:2228 -
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1060 -
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3172 -
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Disables RegEdit via registry modification
PID:2368 -
C:\Program Files\Internet Explorer\SIGNUP\data.exe"C:\Program Files\Internet Explorer\SIGNUP\data.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:4840
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5004 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3284 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4768 -
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4160 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵PID:4944
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵
- Disables RegEdit via registry modification
PID:2568 -
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:456 -
C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3332 -
C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\9⤵PID:4012
-
C:\Program Files\Java\jdk1.8.0_66\jre\data.exe"C:\Program Files\Java\jdk1.8.0_66\jre\data.exe" C:\Program Files\Java\jdk1.8.0_66\jre\7⤵PID:1060
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵PID:5100
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1304 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3120 -
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2520 -
C:\Program Files\Microsoft Office\root\backup.exe"C:\Program Files\Microsoft Office\root\backup.exe" C:\Program Files\Microsoft Office\root\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1744 -
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2064 -
C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:384 -
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\8⤵PID:1012
-
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\8⤵PID:3808
-
C:\Program Files\Microsoft Office\root\fre\System Restore.exe"C:\Program Files\Microsoft Office\root\fre\System Restore.exe" C:\Program Files\Microsoft Office\root\fre\7⤵PID:5000
-
C:\Program Files\Microsoft Office\Updates\backup.exe"C:\Program Files\Microsoft Office\Updates\backup.exe" C:\Program Files\Microsoft Office\Updates\6⤵PID:4580
-
C:\Program Files\Microsoft Office 15\backup.exe"C:\Program Files\Microsoft Office 15\backup.exe" C:\Program Files\Microsoft Office 15\5⤵PID:3328
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Drops file in Program Files directory
PID:1628 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3192 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Disables RegEdit via registry modification
PID:4020 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1556 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵PID:4168
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵PID:1904
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵PID:1552
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5104 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1476 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:2724
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:4432 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- System policy modification
PID:3632 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1068 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\8⤵
- Disables RegEdit via registry modification
PID:872 -
C:\Program Files (x86)\Common Files\Adobe\Reader\data.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\data.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\7⤵PID:2248
-
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵PID:748
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1292 -
C:\Users\System Restore.exe"C:\Users\System Restore.exe" C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\System Restore.exe"C:\Users\Admin\System Restore.exe" C:\Users\Admin\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3432 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5096 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
PID:1796 -
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- System policy modification
PID:4708 -
C:\Users\Admin\Documents\update.exeC:\Users\Admin\Documents\update.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1156 -
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3748 -
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:2512
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3892 -
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:3104
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3292 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Executes dropped EXE
PID:452 -
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2236 -
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1992 -
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- System policy modification
PID:4828 -
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵
- Modifies visibility of file extensions in Explorer
PID:1236 -
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Windows\appcompat\System Restore.exe"C:\Windows\appcompat\System Restore.exe" C:\Windows\appcompat\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:4248 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:1356 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵
- Modifies visibility of file extensions in Explorer
PID:2768 -
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵
- Modifies visibility of file extensions in Explorer
PID:2056 -
C:\Windows\appcompat\Programs\data.exeC:\Windows\appcompat\Programs\data.exe C:\Windows\appcompat\Programs\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4352 -
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\update.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\update.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1200
-
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\1⤵PID:60
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d81e8f80b0b7f4377fad318cb586d53a
SHA1b70b8b80f4702ce738ed964b538691bea4e2b654
SHA2562c8e51dc16e2109015d87b8681390ce9a70ca7aba83f2ff2fd32314c2005f5f0
SHA51294239f58011431d6ab0a5934c7a2b5b3f59fd88809eda2f1ea66fc7d157ddf05412bb9382a0dd4c142bf54d0d4c0f7161692c82ea3c6d1ccb15d5ecc009dd2a6
-
Filesize
72KB
MD5d81e8f80b0b7f4377fad318cb586d53a
SHA1b70b8b80f4702ce738ed964b538691bea4e2b654
SHA2562c8e51dc16e2109015d87b8681390ce9a70ca7aba83f2ff2fd32314c2005f5f0
SHA51294239f58011431d6ab0a5934c7a2b5b3f59fd88809eda2f1ea66fc7d157ddf05412bb9382a0dd4c142bf54d0d4c0f7161692c82ea3c6d1ccb15d5ecc009dd2a6
-
Filesize
72KB
MD54a346a4a2f528b4ac568113468f354ef
SHA14e3b3538693ea63bf38acf147d8d1b32dbe6f9d7
SHA256a76408e993d0a90cb55030e6d8c9a4ef16586a2fc676e5bed0db47079ff3ffaf
SHA5122ca46a6f2f87bc7c412b0499494196b71e5873517a83497bfbe5db4dd93ce9de26e1c56f243274b3df983f529baa5f71158f486d8e60c68d969aef2cac955a04
-
Filesize
72KB
MD54a346a4a2f528b4ac568113468f354ef
SHA14e3b3538693ea63bf38acf147d8d1b32dbe6f9d7
SHA256a76408e993d0a90cb55030e6d8c9a4ef16586a2fc676e5bed0db47079ff3ffaf
SHA5122ca46a6f2f87bc7c412b0499494196b71e5873517a83497bfbe5db4dd93ce9de26e1c56f243274b3df983f529baa5f71158f486d8e60c68d969aef2cac955a04
-
Filesize
72KB
MD5d48e757a6599e482af9924898389caf5
SHA1dae13377ef12a552098887883e6c7c1d16aa21e3
SHA25600ad7b49fccac9efea41c7ded0a5bd7da59c0543a05721dfaf3e34575cfbd576
SHA512d5a007fc4db3aa4da0b47302b371363a5059bf63ad219f2bfaf1ae4464f930dd8deb6be6453b6fd04e553b2c308b74873b8742c439adb79b610f405d7cc515af
-
Filesize
72KB
MD5d48e757a6599e482af9924898389caf5
SHA1dae13377ef12a552098887883e6c7c1d16aa21e3
SHA25600ad7b49fccac9efea41c7ded0a5bd7da59c0543a05721dfaf3e34575cfbd576
SHA512d5a007fc4db3aa4da0b47302b371363a5059bf63ad219f2bfaf1ae4464f930dd8deb6be6453b6fd04e553b2c308b74873b8742c439adb79b610f405d7cc515af
-
Filesize
72KB
MD5adc48255c1a775e1249967357dac6f45
SHA132b6f17bb31817245cf35154f6e21568a70ee67d
SHA256505b27391db0422a4d35d9b51b63ec5b125ba2ca66320412a9521a1caeb03692
SHA512a9373c0c7627286b1f9f9e79a4051ef69f5d46de9b1bb1c9ffb80164415bab9351350aec590f4cbe62b3de20c3ed3ecae3a4058559f75bc4ce621a6b3600d53d
-
Filesize
72KB
MD5adc48255c1a775e1249967357dac6f45
SHA132b6f17bb31817245cf35154f6e21568a70ee67d
SHA256505b27391db0422a4d35d9b51b63ec5b125ba2ca66320412a9521a1caeb03692
SHA512a9373c0c7627286b1f9f9e79a4051ef69f5d46de9b1bb1c9ffb80164415bab9351350aec590f4cbe62b3de20c3ed3ecae3a4058559f75bc4ce621a6b3600d53d
-
Filesize
72KB
MD5b9f655f9a6ad6c027613ae3cd60a4e20
SHA1752d0e5ba47408291bbffb199eccd0ff83fef571
SHA2567820cbeb0e1843b9bdd1ab0c471dd2c5461d5482714a4e44a4e5cd4219e33dc2
SHA5125245c804ba2d681582a0724e60a3a08d03fdf64d6c8238bb041c05d1798596e6c06495061cfbcceeb032e0e607f3ed7d008aece43534075df0afb65f9bb09176
-
Filesize
72KB
MD5b9f655f9a6ad6c027613ae3cd60a4e20
SHA1752d0e5ba47408291bbffb199eccd0ff83fef571
SHA2567820cbeb0e1843b9bdd1ab0c471dd2c5461d5482714a4e44a4e5cd4219e33dc2
SHA5125245c804ba2d681582a0724e60a3a08d03fdf64d6c8238bb041c05d1798596e6c06495061cfbcceeb032e0e607f3ed7d008aece43534075df0afb65f9bb09176
-
Filesize
72KB
MD5d21a4eea45af1687a48904e4dad8188f
SHA17896980412503ebae84c4934f425bef0604a8fd4
SHA25608e7579bef1f905f720584d97b2556829f0d0a7234f3aba1812d0493b8f2d70a
SHA5128a3343078eee8cd310c9b2db925fe305bb14271ed32f4fb448386bccea4e353ae685a95388c1d504b6e9a61eb4d20ebbd635cc5f0a4b960f6d87d34ac6cf70d1
-
Filesize
72KB
MD5d21a4eea45af1687a48904e4dad8188f
SHA17896980412503ebae84c4934f425bef0604a8fd4
SHA25608e7579bef1f905f720584d97b2556829f0d0a7234f3aba1812d0493b8f2d70a
SHA5128a3343078eee8cd310c9b2db925fe305bb14271ed32f4fb448386bccea4e353ae685a95388c1d504b6e9a61eb4d20ebbd635cc5f0a4b960f6d87d34ac6cf70d1
-
Filesize
72KB
MD5e86084178f69f0bf3612488bbfc1e717
SHA119c3f55b964e7f3f5714f31293e86a79531e335f
SHA256e885d5692ba2e8442f396e9511988d90344ca15e8628fc1184d13713b307b53c
SHA512b488e8a3a2801d7911c510983de5745d2d65c7e5cbcc11ead4c06499390db02cb42e39a5ad09480c5d71edf95a0d5dd3b51a893dda8d8ffd9aad3831c0b47c0b
-
Filesize
72KB
MD5e86084178f69f0bf3612488bbfc1e717
SHA119c3f55b964e7f3f5714f31293e86a79531e335f
SHA256e885d5692ba2e8442f396e9511988d90344ca15e8628fc1184d13713b307b53c
SHA512b488e8a3a2801d7911c510983de5745d2d65c7e5cbcc11ead4c06499390db02cb42e39a5ad09480c5d71edf95a0d5dd3b51a893dda8d8ffd9aad3831c0b47c0b
-
Filesize
72KB
MD5a7d790b59f04911aaa50f20bdc71bf13
SHA11e77ef043951943e302e963c4d203b927811e369
SHA256bf15c942f970e39d3bbb8ff917c12bdc9984b663ebc28c02af6482672be10e5b
SHA512047a00331ff6964744a2435f742fc1ee32e6cd5db6dfc13abb16e962998e5d02a11fc5cc5c6b2c5584e2b9a7cdbba6f12c9a894c2eaa4897f44d28d245cd288f
-
Filesize
72KB
MD5a7d790b59f04911aaa50f20bdc71bf13
SHA11e77ef043951943e302e963c4d203b927811e369
SHA256bf15c942f970e39d3bbb8ff917c12bdc9984b663ebc28c02af6482672be10e5b
SHA512047a00331ff6964744a2435f742fc1ee32e6cd5db6dfc13abb16e962998e5d02a11fc5cc5c6b2c5584e2b9a7cdbba6f12c9a894c2eaa4897f44d28d245cd288f
-
Filesize
72KB
MD5b9f655f9a6ad6c027613ae3cd60a4e20
SHA1752d0e5ba47408291bbffb199eccd0ff83fef571
SHA2567820cbeb0e1843b9bdd1ab0c471dd2c5461d5482714a4e44a4e5cd4219e33dc2
SHA5125245c804ba2d681582a0724e60a3a08d03fdf64d6c8238bb041c05d1798596e6c06495061cfbcceeb032e0e607f3ed7d008aece43534075df0afb65f9bb09176
-
Filesize
72KB
MD5b9f655f9a6ad6c027613ae3cd60a4e20
SHA1752d0e5ba47408291bbffb199eccd0ff83fef571
SHA2567820cbeb0e1843b9bdd1ab0c471dd2c5461d5482714a4e44a4e5cd4219e33dc2
SHA5125245c804ba2d681582a0724e60a3a08d03fdf64d6c8238bb041c05d1798596e6c06495061cfbcceeb032e0e607f3ed7d008aece43534075df0afb65f9bb09176
-
Filesize
72KB
MD51426db8bce63be2c809d8ae68039a929
SHA1ccf36afe8a3b1e5ff90c1566da5a532ad6adf08d
SHA256a3563aa936f3203f87514ccdee51c3c639a76db18262b3c0d8157c45a7d0c7e4
SHA51290c95bb4cf4a3cde833056180c4dc70cfa19d9cf6b6eea1bf91480974d8d69a43c3deac3894506d1fe9e18d5e8645844faf3a3e9d61624c052c4e61639275e92
-
Filesize
72KB
MD51426db8bce63be2c809d8ae68039a929
SHA1ccf36afe8a3b1e5ff90c1566da5a532ad6adf08d
SHA256a3563aa936f3203f87514ccdee51c3c639a76db18262b3c0d8157c45a7d0c7e4
SHA51290c95bb4cf4a3cde833056180c4dc70cfa19d9cf6b6eea1bf91480974d8d69a43c3deac3894506d1fe9e18d5e8645844faf3a3e9d61624c052c4e61639275e92
-
Filesize
72KB
MD586bdee246edbe1b66293e7b3b07d321f
SHA158c1058c27219bdd3645c526094644cb8ea406fb
SHA25664b93168491fdf84d83de9a35525a2f8517c6521029036fa8d4952399ce7815c
SHA512ff4e13645fc94b856dcc9d09e8d8de8363132d1fc4a245dc1a49ddc8af9d1e66f7421e20f9a7f8e3c0427373d150c272ebf61f5e30bad9af74477904b184aff3
-
Filesize
72KB
MD586bdee246edbe1b66293e7b3b07d321f
SHA158c1058c27219bdd3645c526094644cb8ea406fb
SHA25664b93168491fdf84d83de9a35525a2f8517c6521029036fa8d4952399ce7815c
SHA512ff4e13645fc94b856dcc9d09e8d8de8363132d1fc4a245dc1a49ddc8af9d1e66f7421e20f9a7f8e3c0427373d150c272ebf61f5e30bad9af74477904b184aff3
-
Filesize
72KB
MD535da89a2e628465e7f1e2e38f4044fe0
SHA1f469decdfd5199ae62a9342d887de2077de09a23
SHA25616f5b9d79d77d347173ccfdd094e3f7e5cb0b984d75b898a792ed238cb2f5ff4
SHA51276f9956a73d8dcd0770b7c5f9bc5b08117015e3d738ab423f63ff93b51a433ae380c6b57cdd0a64a03266ebd1af5ccf8a441a0776b59b69c61e2645d83f67a06
-
Filesize
72KB
MD535da89a2e628465e7f1e2e38f4044fe0
SHA1f469decdfd5199ae62a9342d887de2077de09a23
SHA25616f5b9d79d77d347173ccfdd094e3f7e5cb0b984d75b898a792ed238cb2f5ff4
SHA51276f9956a73d8dcd0770b7c5f9bc5b08117015e3d738ab423f63ff93b51a433ae380c6b57cdd0a64a03266ebd1af5ccf8a441a0776b59b69c61e2645d83f67a06
-
Filesize
72KB
MD5d21a4eea45af1687a48904e4dad8188f
SHA17896980412503ebae84c4934f425bef0604a8fd4
SHA25608e7579bef1f905f720584d97b2556829f0d0a7234f3aba1812d0493b8f2d70a
SHA5128a3343078eee8cd310c9b2db925fe305bb14271ed32f4fb448386bccea4e353ae685a95388c1d504b6e9a61eb4d20ebbd635cc5f0a4b960f6d87d34ac6cf70d1
-
Filesize
72KB
MD5d21a4eea45af1687a48904e4dad8188f
SHA17896980412503ebae84c4934f425bef0604a8fd4
SHA25608e7579bef1f905f720584d97b2556829f0d0a7234f3aba1812d0493b8f2d70a
SHA5128a3343078eee8cd310c9b2db925fe305bb14271ed32f4fb448386bccea4e353ae685a95388c1d504b6e9a61eb4d20ebbd635cc5f0a4b960f6d87d34ac6cf70d1
-
Filesize
72KB
MD53c7c31d3f75c66fbabba02b0ebe71563
SHA1371a2995f1c238ff3375c7f544080cf4b56202d9
SHA256b0236a8e84495bf43886bab99fca535503264d4aa4abf1042099a662ebfa8e71
SHA51255c46fead2f6966818e7b6ffb9e5d11219139e824f09a776ab1cbdc4814c24bcab2919402eb0736363c7adcb04e6d0dd697a4677443051ac1c3ae85e462cb504
-
Filesize
72KB
MD53c7c31d3f75c66fbabba02b0ebe71563
SHA1371a2995f1c238ff3375c7f544080cf4b56202d9
SHA256b0236a8e84495bf43886bab99fca535503264d4aa4abf1042099a662ebfa8e71
SHA51255c46fead2f6966818e7b6ffb9e5d11219139e824f09a776ab1cbdc4814c24bcab2919402eb0736363c7adcb04e6d0dd697a4677443051ac1c3ae85e462cb504
-
Filesize
72KB
MD51426db8bce63be2c809d8ae68039a929
SHA1ccf36afe8a3b1e5ff90c1566da5a532ad6adf08d
SHA256a3563aa936f3203f87514ccdee51c3c639a76db18262b3c0d8157c45a7d0c7e4
SHA51290c95bb4cf4a3cde833056180c4dc70cfa19d9cf6b6eea1bf91480974d8d69a43c3deac3894506d1fe9e18d5e8645844faf3a3e9d61624c052c4e61639275e92
-
Filesize
72KB
MD51426db8bce63be2c809d8ae68039a929
SHA1ccf36afe8a3b1e5ff90c1566da5a532ad6adf08d
SHA256a3563aa936f3203f87514ccdee51c3c639a76db18262b3c0d8157c45a7d0c7e4
SHA51290c95bb4cf4a3cde833056180c4dc70cfa19d9cf6b6eea1bf91480974d8d69a43c3deac3894506d1fe9e18d5e8645844faf3a3e9d61624c052c4e61639275e92
-
Filesize
72KB
MD53db40b2337a678c1fa940cfb8de39625
SHA1515aa8d12a1de2ac4e25980e6a62526b3f37a2fd
SHA2561ecf50e24672d90c244a71095db131b6372e7d6337ebeacbc275b9e184a1d2f1
SHA5127a7ac75fd838fb8a60343a373dd2609ec07fe765d49bc54abde8605d2b6dd8b3f8db5eac8d0191fab95cb4f1a3b0e486df60ed18cb4dd57954087e5d7f6fb5c7
-
Filesize
72KB
MD53db40b2337a678c1fa940cfb8de39625
SHA1515aa8d12a1de2ac4e25980e6a62526b3f37a2fd
SHA2561ecf50e24672d90c244a71095db131b6372e7d6337ebeacbc275b9e184a1d2f1
SHA5127a7ac75fd838fb8a60343a373dd2609ec07fe765d49bc54abde8605d2b6dd8b3f8db5eac8d0191fab95cb4f1a3b0e486df60ed18cb4dd57954087e5d7f6fb5c7
-
Filesize
72KB
MD5096b4f93bc2e7e71cb9b28ba96411438
SHA1d4fa65dadbb75eabef95bbf70076f7cf288abe38
SHA25667e9c5af00c4c4d14f0e0e02706bd2b65c70a18a56b2f252e6dc95495c3c876c
SHA512e210e521414dda1dbf1f058b3c0f170bd0b42ad21f33cde8e1aee92a2125650e0a37705b9bdd29bcc85d0c4d66d348b772c8878a62262681dafa357d63fb1e06
-
Filesize
72KB
MD5096b4f93bc2e7e71cb9b28ba96411438
SHA1d4fa65dadbb75eabef95bbf70076f7cf288abe38
SHA25667e9c5af00c4c4d14f0e0e02706bd2b65c70a18a56b2f252e6dc95495c3c876c
SHA512e210e521414dda1dbf1f058b3c0f170bd0b42ad21f33cde8e1aee92a2125650e0a37705b9bdd29bcc85d0c4d66d348b772c8878a62262681dafa357d63fb1e06
-
Filesize
72KB
MD5b8dbee20d7311240d01a1507f4877246
SHA1b1ee7cd05031e998388e81b24dc886cedc349fbf
SHA256c823e56d58dece988e09d1313af0f6dd2081887859ac049cb1e054102cf68c3a
SHA512676e7fb705252eca1cda26b576019c58f920ab9bb145cf1be8e9e21feef82c8c0a584de46f76590b88475b31346b3567173e4307837ee52f405771eec952afce
-
Filesize
72KB
MD5b8dbee20d7311240d01a1507f4877246
SHA1b1ee7cd05031e998388e81b24dc886cedc349fbf
SHA256c823e56d58dece988e09d1313af0f6dd2081887859ac049cb1e054102cf68c3a
SHA512676e7fb705252eca1cda26b576019c58f920ab9bb145cf1be8e9e21feef82c8c0a584de46f76590b88475b31346b3567173e4307837ee52f405771eec952afce
-
Filesize
72KB
MD552eef89d01301c6946ee884d785b4eac
SHA1082aded787d8de2ea71b685e1fc9a502dd3222ba
SHA256ce816e759e7d9ae8fdb933aae75c892785eead338a717d51c6bd9738347c3059
SHA51234bfbfaf906505260d9a3da5260e02b2256d86861c601c4ec8f6f3164b93f946ee87e8d5a8a3a0bf2a1c0f2caf87d1d57ee065e015480af9e9ee0e684e878efd
-
Filesize
72KB
MD552eef89d01301c6946ee884d785b4eac
SHA1082aded787d8de2ea71b685e1fc9a502dd3222ba
SHA256ce816e759e7d9ae8fdb933aae75c892785eead338a717d51c6bd9738347c3059
SHA51234bfbfaf906505260d9a3da5260e02b2256d86861c601c4ec8f6f3164b93f946ee87e8d5a8a3a0bf2a1c0f2caf87d1d57ee065e015480af9e9ee0e684e878efd
-
Filesize
72KB
MD50dcb78c2b9370b92d36655068381970c
SHA15e341ecb2f07fb50bdd20c1a045cf3c804bcdb41
SHA2568faed66c686ea18f8e7b30dd4176f0876cd2859fced180a3fa0059ed83abbfd7
SHA512e532a3ca86c5f0837b6aa60092d3bfe762f671bab45af9b8dc95ac40a81c7ed2a517e8453040f3cf963901c6931ee1f00d87fbb6e921b164359d03ab0961e53b
-
Filesize
72KB
MD50dcb78c2b9370b92d36655068381970c
SHA15e341ecb2f07fb50bdd20c1a045cf3c804bcdb41
SHA2568faed66c686ea18f8e7b30dd4176f0876cd2859fced180a3fa0059ed83abbfd7
SHA512e532a3ca86c5f0837b6aa60092d3bfe762f671bab45af9b8dc95ac40a81c7ed2a517e8453040f3cf963901c6931ee1f00d87fbb6e921b164359d03ab0961e53b
-
Filesize
72KB
MD5f99a5827bfed2eed10abb3de8d4fc3e6
SHA10a196db4998ff47285d4d3371cb102249a20cd35
SHA2562b69e69992af0de82a1223c4f06a1d932737d0d26e5e896739da71b1ca2ad4b0
SHA5127f0343f37e97e99b8050c0de0434bf0f55822a175b40716f4b69cbf9813f2f2347a53f6c8883387af1a392a2d09699e11ac4b39990f689619900f2a6ea005d8f
-
Filesize
72KB
MD5f99a5827bfed2eed10abb3de8d4fc3e6
SHA10a196db4998ff47285d4d3371cb102249a20cd35
SHA2562b69e69992af0de82a1223c4f06a1d932737d0d26e5e896739da71b1ca2ad4b0
SHA5127f0343f37e97e99b8050c0de0434bf0f55822a175b40716f4b69cbf9813f2f2347a53f6c8883387af1a392a2d09699e11ac4b39990f689619900f2a6ea005d8f
-
Filesize
72KB
MD5d81e8f80b0b7f4377fad318cb586d53a
SHA1b70b8b80f4702ce738ed964b538691bea4e2b654
SHA2562c8e51dc16e2109015d87b8681390ce9a70ca7aba83f2ff2fd32314c2005f5f0
SHA51294239f58011431d6ab0a5934c7a2b5b3f59fd88809eda2f1ea66fc7d157ddf05412bb9382a0dd4c142bf54d0d4c0f7161692c82ea3c6d1ccb15d5ecc009dd2a6
-
Filesize
72KB
MD5d81e8f80b0b7f4377fad318cb586d53a
SHA1b70b8b80f4702ce738ed964b538691bea4e2b654
SHA2562c8e51dc16e2109015d87b8681390ce9a70ca7aba83f2ff2fd32314c2005f5f0
SHA51294239f58011431d6ab0a5934c7a2b5b3f59fd88809eda2f1ea66fc7d157ddf05412bb9382a0dd4c142bf54d0d4c0f7161692c82ea3c6d1ccb15d5ecc009dd2a6
-
Filesize
72KB
MD5647f426f0bf7752ac5fa78c09989f387
SHA14447337a90a858ea11ffdbf321664dbb45592cec
SHA2564349839cdf2e8453fc7116124d3b6ae645033412d3756929e4725e7bb00ec048
SHA512736e083041c2d020d5397132d016134fa67cf73485a60973dc5f8af7c7c8b777c34e74f43c89a71f6fdaf7636ef99f78cf0d627b97198232fcae543477775850
-
Filesize
72KB
MD5647f426f0bf7752ac5fa78c09989f387
SHA14447337a90a858ea11ffdbf321664dbb45592cec
SHA2564349839cdf2e8453fc7116124d3b6ae645033412d3756929e4725e7bb00ec048
SHA512736e083041c2d020d5397132d016134fa67cf73485a60973dc5f8af7c7c8b777c34e74f43c89a71f6fdaf7636ef99f78cf0d627b97198232fcae543477775850
-
Filesize
72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
Filesize
72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56a330371bd0fc14f992bc1179e500983
SHA1cfb67aee19160c48e0bd5d89e5890ec4f57cbe92
SHA2564704c802bc745991fb42c90aa1251dd52205bfe63c016b30c9ed03248e1df165
SHA512bb31e7bdb6415c1f0758e961858a92878d39d39bf661e4b0a34880477d766635484c3710b96dd0ee228a03eb22e6fe8f6caa4d002e7b0c6b453c8bddedf433c4
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56a330371bd0fc14f992bc1179e500983
SHA1cfb67aee19160c48e0bd5d89e5890ec4f57cbe92
SHA2564704c802bc745991fb42c90aa1251dd52205bfe63c016b30c9ed03248e1df165
SHA512bb31e7bdb6415c1f0758e961858a92878d39d39bf661e4b0a34880477d766635484c3710b96dd0ee228a03eb22e6fe8f6caa4d002e7b0c6b453c8bddedf433c4
-
Filesize
72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
Filesize
72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
Filesize
72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
Filesize
72KB
MD5e800629ec72199cabc8ff8086e94e342
SHA1d209f38b3f1110485bb6532121ecb53b0df3988f
SHA256e052f1e785e4d905e2601e5c5548d63bf4d4ef77bdea6ac48dc344080cc3c3f1
SHA512f61e5be2ffe2d5b4e8010d24366ffab66e16ae2a99c393e011ac7fdbab3b5611a20f3c4743ea0813e7cb95c84963a7b7bf370d0c1b9b06034c0d3cb64d61b2c6
-
Filesize
72KB
MD56a330371bd0fc14f992bc1179e500983
SHA1cfb67aee19160c48e0bd5d89e5890ec4f57cbe92
SHA2564704c802bc745991fb42c90aa1251dd52205bfe63c016b30c9ed03248e1df165
SHA512bb31e7bdb6415c1f0758e961858a92878d39d39bf661e4b0a34880477d766635484c3710b96dd0ee228a03eb22e6fe8f6caa4d002e7b0c6b453c8bddedf433c4
-
Filesize
72KB
MD56a330371bd0fc14f992bc1179e500983
SHA1cfb67aee19160c48e0bd5d89e5890ec4f57cbe92
SHA2564704c802bc745991fb42c90aa1251dd52205bfe63c016b30c9ed03248e1df165
SHA512bb31e7bdb6415c1f0758e961858a92878d39d39bf661e4b0a34880477d766635484c3710b96dd0ee228a03eb22e6fe8f6caa4d002e7b0c6b453c8bddedf433c4
-
Filesize
72KB
MD5d5e3aa50557e8509372e9d21dfab9451
SHA119262742498c46c1a1a73bb0b1d2e4ae7ebe8f36
SHA256666aabd10a7bda3cc8b76a2c4ee675e9e8f659498e8e29250acdbfc75adbfe7e
SHA5127c1e0e98feb8802797fe1da088383221903fb0dd52289f4e2f06249c0f2fbc54e23e9caff5a6a85e5d25c2da88b09ed9e51b65e8ac253d108bd9f7077bf423c2
-
Filesize
72KB
MD5d5e3aa50557e8509372e9d21dfab9451
SHA119262742498c46c1a1a73bb0b1d2e4ae7ebe8f36
SHA256666aabd10a7bda3cc8b76a2c4ee675e9e8f659498e8e29250acdbfc75adbfe7e
SHA5127c1e0e98feb8802797fe1da088383221903fb0dd52289f4e2f06249c0f2fbc54e23e9caff5a6a85e5d25c2da88b09ed9e51b65e8ac253d108bd9f7077bf423c2
-
Filesize
72KB
MD5bf94e990169de138e220877dbead4571
SHA1ba212cf744d87d122588180eb7cd30df064918b7
SHA2569723902b5f7bf5f1651b08389dd7902d5b6336fe7ef44166382367b21f73e88c
SHA5124eb82d74e1fb3751e644af63e8c37a48e8a5e4a3cd5bfd2a7eac55e0a97d6c9bf209415b76913511e7e45b3c7b083dbf962a8dc20b9a0c8665454d79a1f91f2d
-
Filesize
72KB
MD5bf94e990169de138e220877dbead4571
SHA1ba212cf744d87d122588180eb7cd30df064918b7
SHA2569723902b5f7bf5f1651b08389dd7902d5b6336fe7ef44166382367b21f73e88c
SHA5124eb82d74e1fb3751e644af63e8c37a48e8a5e4a3cd5bfd2a7eac55e0a97d6c9bf209415b76913511e7e45b3c7b083dbf962a8dc20b9a0c8665454d79a1f91f2d
-
Filesize
72KB
MD5cdc2e6cf6b28077f3b425b30cfd0eff1
SHA19dbbb1be54f6ab4968659d0ca3c2904dd6da3092
SHA256d8357b87e8f08eda33e759fdaf813223f3f8f36abfd9d72646367cd406855de4
SHA512610d15e0053b2b11813f64ffc1677db591be69459ab8b7eed90df180cce9899a96cd4d05453059d19260b9c39caaed4d4cd13d928992566699145cfb92eb8597
-
Filesize
72KB
MD5cdc2e6cf6b28077f3b425b30cfd0eff1
SHA19dbbb1be54f6ab4968659d0ca3c2904dd6da3092
SHA256d8357b87e8f08eda33e759fdaf813223f3f8f36abfd9d72646367cd406855de4
SHA512610d15e0053b2b11813f64ffc1677db591be69459ab8b7eed90df180cce9899a96cd4d05453059d19260b9c39caaed4d4cd13d928992566699145cfb92eb8597