Analysis
-
max time kernel
155s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe
Resource
win10v2004-20221111-en
General
-
Target
a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe
-
Size
72KB
-
MD5
020e0d7657d4d0930fd291d6934f13bd
-
SHA1
a6e5d871ebde5fc03c50d803a177c2786a7931ce
-
SHA256
a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb
-
SHA512
e6f108b6ec6e5bdc7ce9e047b364e70a7dfbe52d210b73f9f40af06e7dd4f2fc3ef6e746817832fc0f8040348d435d4c53c81be07a96ac4ba5ea9c1678bc99bf
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf25:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4088 backup.exe 428 backup.exe 1220 backup.exe 4252 backup.exe 4956 backup.exe 1284 backup.exe 4044 update.exe 3764 data.exe 3284 backup.exe 1728 backup.exe 4152 backup.exe 4224 backup.exe 2020 backup.exe 1252 backup.exe 1424 backup.exe 4520 System Restore.exe 1372 backup.exe 4128 backup.exe 1912 backup.exe 1164 backup.exe 2852 backup.exe 3036 backup.exe 1500 backup.exe 3528 backup.exe 3028 backup.exe 2492 backup.exe 2536 backup.exe 1748 backup.exe 4988 backup.exe 680 backup.exe 4792 backup.exe 3628 backup.exe 376 backup.exe 3664 backup.exe 3604 backup.exe 1196 backup.exe 4108 backup.exe 2080 backup.exe 4372 backup.exe 792 backup.exe 2336 backup.exe 1868 backup.exe 3512 backup.exe 2100 data.exe 1212 backup.exe 3556 backup.exe 4920 backup.exe 2028 backup.exe 4732 backup.exe 3104 backup.exe 3948 backup.exe 4228 backup.exe 2364 backup.exe 2016 backup.exe 1792 backup.exe 2528 System Restore.exe 1500 backup.exe 2076 backup.exe 2388 System Restore.exe 1504 backup.exe 1832 backup.exe 2128 backup.exe 4752 backup.exe 5060 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\data.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe System Restore.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe data.exe File opened for modification C:\Windows\addins\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 4088 backup.exe 428 backup.exe 1220 backup.exe 4252 backup.exe 4956 backup.exe 1284 backup.exe 4044 update.exe 3764 data.exe 3284 backup.exe 1728 backup.exe 4152 backup.exe 4224 backup.exe 2020 backup.exe 1252 backup.exe 1424 backup.exe 4520 System Restore.exe 1372 backup.exe 4128 backup.exe 1912 backup.exe 1164 backup.exe 2852 backup.exe 3036 backup.exe 1500 backup.exe 3528 backup.exe 3028 backup.exe 2492 backup.exe 1748 backup.exe 2536 backup.exe 4988 backup.exe 680 backup.exe 4792 backup.exe 3628 backup.exe 376 backup.exe 3604 backup.exe 3664 backup.exe 4108 backup.exe 1196 backup.exe 2080 backup.exe 4372 backup.exe 792 backup.exe 2336 backup.exe 3512 backup.exe 1868 backup.exe 2100 data.exe 1212 backup.exe 3556 backup.exe 2028 backup.exe 4920 backup.exe 4732 backup.exe 3104 backup.exe 3948 backup.exe 4228 backup.exe 2364 backup.exe 2016 backup.exe 1792 backup.exe 2528 System Restore.exe 1500 backup.exe 2076 backup.exe 2388 System Restore.exe 1504 backup.exe 1832 backup.exe 2128 backup.exe 4752 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4088 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 86 PID 4500 wrote to memory of 4088 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 86 PID 4500 wrote to memory of 4088 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 86 PID 4500 wrote to memory of 428 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 87 PID 4500 wrote to memory of 428 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 87 PID 4500 wrote to memory of 428 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 87 PID 4500 wrote to memory of 1220 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 88 PID 4500 wrote to memory of 1220 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 88 PID 4500 wrote to memory of 1220 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 88 PID 4500 wrote to memory of 4252 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 89 PID 4500 wrote to memory of 4252 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 89 PID 4500 wrote to memory of 4252 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 89 PID 4500 wrote to memory of 4956 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 90 PID 4500 wrote to memory of 4956 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 90 PID 4500 wrote to memory of 4956 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 90 PID 4500 wrote to memory of 1284 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 91 PID 4500 wrote to memory of 1284 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 91 PID 4500 wrote to memory of 1284 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 91 PID 4500 wrote to memory of 4044 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 92 PID 4500 wrote to memory of 4044 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 92 PID 4500 wrote to memory of 4044 4500 a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe 92 PID 4088 wrote to memory of 3764 4088 backup.exe 93 PID 4088 wrote to memory of 3764 4088 backup.exe 93 PID 4088 wrote to memory of 3764 4088 backup.exe 93 PID 3764 wrote to memory of 3284 3764 data.exe 94 PID 3764 wrote to memory of 3284 3764 data.exe 94 PID 3764 wrote to memory of 3284 3764 data.exe 94 PID 3764 wrote to memory of 1728 3764 data.exe 95 PID 3764 wrote to memory of 1728 3764 data.exe 95 PID 3764 wrote to memory of 1728 3764 data.exe 95 PID 3764 wrote to memory of 4152 3764 data.exe 96 PID 3764 wrote to memory of 4152 3764 data.exe 96 PID 3764 wrote to memory of 4152 3764 data.exe 96 PID 4152 wrote to memory of 4224 4152 backup.exe 97 PID 4152 wrote to memory of 4224 4152 backup.exe 97 PID 4152 wrote to memory of 4224 4152 backup.exe 97 PID 4224 wrote to memory of 2020 4224 backup.exe 98 PID 4224 wrote to memory of 2020 4224 backup.exe 98 PID 4224 wrote to memory of 2020 4224 backup.exe 98 PID 4152 wrote to memory of 1252 4152 backup.exe 99 PID 4152 wrote to memory of 1252 4152 backup.exe 99 PID 4152 wrote to memory of 1252 4152 backup.exe 99 PID 1252 wrote to memory of 1424 1252 backup.exe 100 PID 1252 wrote to memory of 1424 1252 backup.exe 100 PID 1252 wrote to memory of 1424 1252 backup.exe 100 PID 1252 wrote to memory of 4520 1252 backup.exe 101 PID 1252 wrote to memory of 4520 1252 backup.exe 101 PID 1252 wrote to memory of 4520 1252 backup.exe 101 PID 4520 wrote to memory of 1372 4520 System Restore.exe 102 PID 4520 wrote to memory of 1372 4520 System Restore.exe 102 PID 4520 wrote to memory of 1372 4520 System Restore.exe 102 PID 4520 wrote to memory of 4128 4520 System Restore.exe 103 PID 4520 wrote to memory of 4128 4520 System Restore.exe 103 PID 4520 wrote to memory of 4128 4520 System Restore.exe 103 PID 4128 wrote to memory of 1912 4128 backup.exe 104 PID 4128 wrote to memory of 1912 4128 backup.exe 104 PID 4128 wrote to memory of 1912 4128 backup.exe 104 PID 4128 wrote to memory of 1164 4128 backup.exe 106 PID 4128 wrote to memory of 1164 4128 backup.exe 106 PID 4128 wrote to memory of 1164 4128 backup.exe 106 PID 4128 wrote to memory of 2852 4128 backup.exe 107 PID 4128 wrote to memory of 2852 4128 backup.exe 107 PID 4128 wrote to memory of 2852 4128 backup.exe 107 PID 4128 wrote to memory of 3036 4128 backup.exe 108 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe"C:\Users\Admin\AppData\Local\Temp\a68e4ab47d419c5fa497603f9fd6e2ebc98f0683ad1347ef96782b1b42c93ddb.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\3975063355\backup.exeC:\Users\Admin\AppData\Local\Temp\3975063355\backup.exe C:\Users\Admin\AppData\Local\Temp\3975063355\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\data.exe\data.exe \3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3284
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4152 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4224 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2020
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1424
-
-
C:\Program Files\Common Files\microsoft shared\System Restore.exe"C:\Program Files\Common Files\microsoft shared\System Restore.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4520 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1372
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2852
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3528
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3028
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2492
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4108
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3948
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4752
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4804
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵PID:1532
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4988 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4920
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2388
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4032
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\data.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\data.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:2872
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3604 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\data.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\data.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2100
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4732
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1416
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵PID:2336
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:680
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:792 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3556
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364
-
-
C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe"C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4552
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:3560
-
-
-
C:\Program Files\Common Files\System\de-DE\System Restore.exe"C:\Program Files\Common Files\System\de-DE\System Restore.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1320
-
-
C:\Program Files\Common Files\System\en-US\System Restore.exe"C:\Program Files\Common Files\System\en-US\System Restore.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:3964
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2080 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1796
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵PID:3120
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:5060
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1792
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2128
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4376
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:1004
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
PID:3580 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵PID:2040
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2536 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3664 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3512 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3104
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3916 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵PID:2020
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:3952 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵PID:4352
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1628 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1100
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3628 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4372 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2376
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1964
-
-
-
C:\Users\Public\System Restore.exe"C:\Users\Public\System Restore.exe" C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
PID:4244 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:4248
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:1116 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:3576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54fc735d1176fadff953a05b4a4666261
SHA12e27141e5c035e6433e76ab49b193666f051a3e8
SHA2568cafa6c32a3112709c7d5af31f54e6c4eef8bc3c591c9605c267c397be9dbc30
SHA5121503378ea4c3068841af1cd134a6622dbfe0103a09175759931f92ef25d695c75d6c4cec3c11299c809af57b4b0942e74cbee3adcf390cf8bdae2330b75ce1f6
-
Filesize
72KB
MD54fc735d1176fadff953a05b4a4666261
SHA12e27141e5c035e6433e76ab49b193666f051a3e8
SHA2568cafa6c32a3112709c7d5af31f54e6c4eef8bc3c591c9605c267c397be9dbc30
SHA5121503378ea4c3068841af1cd134a6622dbfe0103a09175759931f92ef25d695c75d6c4cec3c11299c809af57b4b0942e74cbee3adcf390cf8bdae2330b75ce1f6
-
Filesize
72KB
MD57eec8506cecb38608e20d8ab2f56b4be
SHA1be007a1c537f38ae2bcaf447390d0f4875933297
SHA256cd6610ca51ba1d11ee0b8f72adcea0e88cd19952089cbb8bb9d3b82891fb465f
SHA5127c7fd906b4946d8ccfe62e7f1b72736a9c2e813090505190a06931abbf5d55077f6c2c0f0416a6bc143439d4929487b01b63674db0204e321b640097ac15a1f0
-
Filesize
72KB
MD57eec8506cecb38608e20d8ab2f56b4be
SHA1be007a1c537f38ae2bcaf447390d0f4875933297
SHA256cd6610ca51ba1d11ee0b8f72adcea0e88cd19952089cbb8bb9d3b82891fb465f
SHA5127c7fd906b4946d8ccfe62e7f1b72736a9c2e813090505190a06931abbf5d55077f6c2c0f0416a6bc143439d4929487b01b63674db0204e321b640097ac15a1f0
-
Filesize
72KB
MD528904d21347cb9421121f4ba568db8b0
SHA1584764d26824839ba29c99922abf86d0466a7600
SHA25658a103ca6fb4bb44681a5fa7bc9275e649b0569d705d24a3d77fc50c781c6771
SHA5125750ebac573d227e425f0cad0db10927bfae5e12cfc5d612ea0f0c323bb204e2c4982532112f819dee2d32e519d63cf3c0b32c2ca2abc71df8b9c1ee0fe8fd2d
-
Filesize
72KB
MD528904d21347cb9421121f4ba568db8b0
SHA1584764d26824839ba29c99922abf86d0466a7600
SHA25658a103ca6fb4bb44681a5fa7bc9275e649b0569d705d24a3d77fc50c781c6771
SHA5125750ebac573d227e425f0cad0db10927bfae5e12cfc5d612ea0f0c323bb204e2c4982532112f819dee2d32e519d63cf3c0b32c2ca2abc71df8b9c1ee0fe8fd2d
-
Filesize
72KB
MD58237b21a5ec493a7020f269ace8445c1
SHA1039baa538355fbc59ea56bad2fe8cf5592756ba8
SHA2561619c4e58a5970fa00cf025ff8b1fdcea31d5461c602b2b26029cccc166e57d6
SHA5126b4704fa4e3d023446c308408d32013efe3889305a98f82d1835cc559c96b3e0f2bf0d87277a7a2b54cf48eb09f5971778467eba445971659feafc030e8ce24d
-
Filesize
72KB
MD58237b21a5ec493a7020f269ace8445c1
SHA1039baa538355fbc59ea56bad2fe8cf5592756ba8
SHA2561619c4e58a5970fa00cf025ff8b1fdcea31d5461c602b2b26029cccc166e57d6
SHA5126b4704fa4e3d023446c308408d32013efe3889305a98f82d1835cc559c96b3e0f2bf0d87277a7a2b54cf48eb09f5971778467eba445971659feafc030e8ce24d
-
Filesize
72KB
MD5b9b8f34bbb55b2c69fdfa14341b82fb4
SHA1e41480bdcb34b3ac3f9d28bbef2ed325a7e5bba0
SHA25601b078fe3ae7e4a42152e18706514bcc0ef67f0a5efa9e89f14dbfa7415a7665
SHA512f60514a3fd27863bc67d0072cd027d1b037fdf2c9a53f7b4f8bf005e3745cb4df282c0736dede2c1fa61a5935f1c793dd460e0db41274be772b3105f6f366647
-
Filesize
72KB
MD5b9b8f34bbb55b2c69fdfa14341b82fb4
SHA1e41480bdcb34b3ac3f9d28bbef2ed325a7e5bba0
SHA25601b078fe3ae7e4a42152e18706514bcc0ef67f0a5efa9e89f14dbfa7415a7665
SHA512f60514a3fd27863bc67d0072cd027d1b037fdf2c9a53f7b4f8bf005e3745cb4df282c0736dede2c1fa61a5935f1c793dd460e0db41274be772b3105f6f366647
-
Filesize
72KB
MD5f450cca02aa3a60117ef266fb14cf5cd
SHA1a85443eab6b5e4c3582950a6ab6b67beac71930b
SHA25665206d40deccaec7712382ae46f22b383770a3208006e4ba84f2f8f472dac319
SHA512bfb917fe33b5b1396aa218a6f97efed1c3092589ec0bf58a363ca7cdd9cca65dfc940117cf0d5fe69cba6b982924b8ca10c37cf652ef615ecc6300d4800467dc
-
Filesize
72KB
MD5f450cca02aa3a60117ef266fb14cf5cd
SHA1a85443eab6b5e4c3582950a6ab6b67beac71930b
SHA25665206d40deccaec7712382ae46f22b383770a3208006e4ba84f2f8f472dac319
SHA512bfb917fe33b5b1396aa218a6f97efed1c3092589ec0bf58a363ca7cdd9cca65dfc940117cf0d5fe69cba6b982924b8ca10c37cf652ef615ecc6300d4800467dc
-
Filesize
72KB
MD5d2183afb3890f201127e4d5b45f13c1d
SHA1315c5d3cbfbd125c5a10b00d20ffea4373de943b
SHA25663cb651bc39169a5e775c01674ebe5a244d1a18db7ca8d2f7b15fb29956169b9
SHA512a212c6c32697e1aa419c700e3534003ea80da7d96d8fed6942b7f7dfbebf6d04a5e28c90154f36391c3d77a077c74038503721e070ef7befee5c660a84793ae1
-
Filesize
72KB
MD5c506aa430dd4079d8843f2a0d630d21f
SHA123cb8bc5587e95004eebd7a09cf774e48baeec1e
SHA2560f560d461bf894bd80c0eba5af1d75e457c499b0433ce446fb20059e320e9c5f
SHA5128fa1520b1f1b9179a7d6d9c8f80fb6c1695b1daab90c91b3c67d8ccc6a4c8beafa4ffc2dd98b2b47271262ee588d5f3055699b3c8201e536602c9a0608c22015
-
Filesize
72KB
MD5c506aa430dd4079d8843f2a0d630d21f
SHA123cb8bc5587e95004eebd7a09cf774e48baeec1e
SHA2560f560d461bf894bd80c0eba5af1d75e457c499b0433ce446fb20059e320e9c5f
SHA5128fa1520b1f1b9179a7d6d9c8f80fb6c1695b1daab90c91b3c67d8ccc6a4c8beafa4ffc2dd98b2b47271262ee588d5f3055699b3c8201e536602c9a0608c22015
-
Filesize
72KB
MD5706f9dc2d231031887f17fa7f1707926
SHA1f204247fe573e7d22112fdd38b7c81e11242e253
SHA2566e828369e296d591c484a49c5af783061637acd6a5397c5d491a1565d678ca60
SHA512041a59aba44941379476a12a083876316f6df3b4a625a62ad048f9bb0e34afe6ca3e3ed2f13ad194810c6465b1b2c37228dcd205ea9a60fe4619343ee772a3a8
-
Filesize
72KB
MD5706f9dc2d231031887f17fa7f1707926
SHA1f204247fe573e7d22112fdd38b7c81e11242e253
SHA2566e828369e296d591c484a49c5af783061637acd6a5397c5d491a1565d678ca60
SHA512041a59aba44941379476a12a083876316f6df3b4a625a62ad048f9bb0e34afe6ca3e3ed2f13ad194810c6465b1b2c37228dcd205ea9a60fe4619343ee772a3a8
-
Filesize
72KB
MD547dc0c652cd739fc4d767509b54c5975
SHA10c352117fcf0d5e82be9aaa57f51743a36d048c7
SHA256d4216f7703e5f961e8fc06a158b09d89454b9952bf355d24dc459310dc342070
SHA51237a81f65cb972d336d4c17056271dbfe590ed97a621312546b69b9de35d3bd73543b5017fb372bce32f7df8317abaa85ea6a25dc5aef78a68c80c22822152b8c
-
Filesize
72KB
MD547dc0c652cd739fc4d767509b54c5975
SHA10c352117fcf0d5e82be9aaa57f51743a36d048c7
SHA256d4216f7703e5f961e8fc06a158b09d89454b9952bf355d24dc459310dc342070
SHA51237a81f65cb972d336d4c17056271dbfe590ed97a621312546b69b9de35d3bd73543b5017fb372bce32f7df8317abaa85ea6a25dc5aef78a68c80c22822152b8c
-
Filesize
72KB
MD5b9b8f34bbb55b2c69fdfa14341b82fb4
SHA1e41480bdcb34b3ac3f9d28bbef2ed325a7e5bba0
SHA25601b078fe3ae7e4a42152e18706514bcc0ef67f0a5efa9e89f14dbfa7415a7665
SHA512f60514a3fd27863bc67d0072cd027d1b037fdf2c9a53f7b4f8bf005e3745cb4df282c0736dede2c1fa61a5935f1c793dd460e0db41274be772b3105f6f366647
-
Filesize
72KB
MD5b9b8f34bbb55b2c69fdfa14341b82fb4
SHA1e41480bdcb34b3ac3f9d28bbef2ed325a7e5bba0
SHA25601b078fe3ae7e4a42152e18706514bcc0ef67f0a5efa9e89f14dbfa7415a7665
SHA512f60514a3fd27863bc67d0072cd027d1b037fdf2c9a53f7b4f8bf005e3745cb4df282c0736dede2c1fa61a5935f1c793dd460e0db41274be772b3105f6f366647
-
Filesize
72KB
MD55c876c0d19d6142f881ddaac47f9aef5
SHA11c1cb8a372a8663688d56714c3e0b5a795f6f5dc
SHA256f3fa880c50a840f80e66ff8abd1b51e4b4dd2c4ad2fff253e946aed792d3f7a6
SHA512d848d6fd4eea1105571096356b5f79e844683892fb1244da47da1a7cb9e7874e79e8e40e4bbd9a63feca66b25526e5e648c2270131108b214353ffff7c1480a5
-
Filesize
72KB
MD55c876c0d19d6142f881ddaac47f9aef5
SHA11c1cb8a372a8663688d56714c3e0b5a795f6f5dc
SHA256f3fa880c50a840f80e66ff8abd1b51e4b4dd2c4ad2fff253e946aed792d3f7a6
SHA512d848d6fd4eea1105571096356b5f79e844683892fb1244da47da1a7cb9e7874e79e8e40e4bbd9a63feca66b25526e5e648c2270131108b214353ffff7c1480a5
-
Filesize
72KB
MD5706f9dc2d231031887f17fa7f1707926
SHA1f204247fe573e7d22112fdd38b7c81e11242e253
SHA2566e828369e296d591c484a49c5af783061637acd6a5397c5d491a1565d678ca60
SHA512041a59aba44941379476a12a083876316f6df3b4a625a62ad048f9bb0e34afe6ca3e3ed2f13ad194810c6465b1b2c37228dcd205ea9a60fe4619343ee772a3a8
-
Filesize
72KB
MD5706f9dc2d231031887f17fa7f1707926
SHA1f204247fe573e7d22112fdd38b7c81e11242e253
SHA2566e828369e296d591c484a49c5af783061637acd6a5397c5d491a1565d678ca60
SHA512041a59aba44941379476a12a083876316f6df3b4a625a62ad048f9bb0e34afe6ca3e3ed2f13ad194810c6465b1b2c37228dcd205ea9a60fe4619343ee772a3a8
-
Filesize
72KB
MD55c876c0d19d6142f881ddaac47f9aef5
SHA11c1cb8a372a8663688d56714c3e0b5a795f6f5dc
SHA256f3fa880c50a840f80e66ff8abd1b51e4b4dd2c4ad2fff253e946aed792d3f7a6
SHA512d848d6fd4eea1105571096356b5f79e844683892fb1244da47da1a7cb9e7874e79e8e40e4bbd9a63feca66b25526e5e648c2270131108b214353ffff7c1480a5
-
Filesize
72KB
MD55c876c0d19d6142f881ddaac47f9aef5
SHA11c1cb8a372a8663688d56714c3e0b5a795f6f5dc
SHA256f3fa880c50a840f80e66ff8abd1b51e4b4dd2c4ad2fff253e946aed792d3f7a6
SHA512d848d6fd4eea1105571096356b5f79e844683892fb1244da47da1a7cb9e7874e79e8e40e4bbd9a63feca66b25526e5e648c2270131108b214353ffff7c1480a5
-
Filesize
72KB
MD5a8fcf7a9eaa2419f3bd8114ecc547bf1
SHA12ff0d1116137e59afbe20fe326b726b73618987f
SHA256e99fd1c439909f9a5f8372ab1cab30c05e949575524fa12c05749dd8ba2cbe6f
SHA5122516ea3d26dc40d3805f8103f49e89d65c3bc1de2db14c7a1677cafb73b8e40d217e35bdb9163d872e3967d8c6e0c578052b162e00c0725b2f68ab418580b518
-
Filesize
72KB
MD5a8fcf7a9eaa2419f3bd8114ecc547bf1
SHA12ff0d1116137e59afbe20fe326b726b73618987f
SHA256e99fd1c439909f9a5f8372ab1cab30c05e949575524fa12c05749dd8ba2cbe6f
SHA5122516ea3d26dc40d3805f8103f49e89d65c3bc1de2db14c7a1677cafb73b8e40d217e35bdb9163d872e3967d8c6e0c578052b162e00c0725b2f68ab418580b518
-
Filesize
72KB
MD5a8fcf7a9eaa2419f3bd8114ecc547bf1
SHA12ff0d1116137e59afbe20fe326b726b73618987f
SHA256e99fd1c439909f9a5f8372ab1cab30c05e949575524fa12c05749dd8ba2cbe6f
SHA5122516ea3d26dc40d3805f8103f49e89d65c3bc1de2db14c7a1677cafb73b8e40d217e35bdb9163d872e3967d8c6e0c578052b162e00c0725b2f68ab418580b518
-
Filesize
72KB
MD5a8fcf7a9eaa2419f3bd8114ecc547bf1
SHA12ff0d1116137e59afbe20fe326b726b73618987f
SHA256e99fd1c439909f9a5f8372ab1cab30c05e949575524fa12c05749dd8ba2cbe6f
SHA5122516ea3d26dc40d3805f8103f49e89d65c3bc1de2db14c7a1677cafb73b8e40d217e35bdb9163d872e3967d8c6e0c578052b162e00c0725b2f68ab418580b518
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD508fd34f10d7a22613491f330e36bdecf
SHA144fca9f45a2c7172eaef8de33e8636146ba321fb
SHA25662a27b5ac4facee63f63168c973b3167cb844ac01c582b00899feaaab90c88c9
SHA512bcff0bf6addbe9e70b99556656430e9419631142b9a7fd416e50ee2e1c7ab5e1ea89d3a1196eb953ff8d01a81a95a077fc4a5ae31b3875084720bac7b2074f1f
-
Filesize
72KB
MD55895fa936103ba773e15cf3df77e7293
SHA133358dd6cbe2dcff6b809260abc11a7fbe7b371f
SHA256e28c0e964e2c5dcec5e335702d2b98153134aaf9a3ddb22ebed33b27ecf94324
SHA51253e8aa2195de58a9089a950058b73b2bed447f398a7cbefde7813a66ebe4e8566d51961362a90585b9e23e1f286777fc2a13c1d5fcead9a41edb07a6c541d586
-
Filesize
72KB
MD55895fa936103ba773e15cf3df77e7293
SHA133358dd6cbe2dcff6b809260abc11a7fbe7b371f
SHA256e28c0e964e2c5dcec5e335702d2b98153134aaf9a3ddb22ebed33b27ecf94324
SHA51253e8aa2195de58a9089a950058b73b2bed447f398a7cbefde7813a66ebe4e8566d51961362a90585b9e23e1f286777fc2a13c1d5fcead9a41edb07a6c541d586
-
Filesize
72KB
MD5b66870289496239dfdcb1ed5de41bf06
SHA19f3cca72bff4bf25f413f178b7b2c2beb071d17e
SHA256d02215ef7b8938578df52f18ca444b270da4bf97cf6e036e52efe3c48225505a
SHA51251ad56214d141ca81539a7899ac5c21df46d4f55e50cc9322d0e43ae3b31f83c42fd4e3ba4ad5d1b7b657453c8ef0077590c3d8cf189f1dac70e770ec7237fe0
-
Filesize
72KB
MD5b66870289496239dfdcb1ed5de41bf06
SHA19f3cca72bff4bf25f413f178b7b2c2beb071d17e
SHA256d02215ef7b8938578df52f18ca444b270da4bf97cf6e036e52efe3c48225505a
SHA51251ad56214d141ca81539a7899ac5c21df46d4f55e50cc9322d0e43ae3b31f83c42fd4e3ba4ad5d1b7b657453c8ef0077590c3d8cf189f1dac70e770ec7237fe0
-
Filesize
72KB
MD5e596eb9963186f5ee73445026bd8da5b
SHA12f57b2a6f117850261fb9198218686aa232c021a
SHA256ae7906b2815af952b36836e124d28c93f26d7573f7331b8eae05de7ee0d87e96
SHA512eb01e47ce6d1fd37dbdfae02457ba61e965e18e00b99f456858ae72a65c99d9d979c3a0420029debf4a029bc91208f309912c58c0640c5b1ebd5e3f7c90e59b7
-
Filesize
72KB
MD5e596eb9963186f5ee73445026bd8da5b
SHA12f57b2a6f117850261fb9198218686aa232c021a
SHA256ae7906b2815af952b36836e124d28c93f26d7573f7331b8eae05de7ee0d87e96
SHA512eb01e47ce6d1fd37dbdfae02457ba61e965e18e00b99f456858ae72a65c99d9d979c3a0420029debf4a029bc91208f309912c58c0640c5b1ebd5e3f7c90e59b7
-
Filesize
72KB
MD5610ebd848b01c08aca360091cb066ac5
SHA1e784a6b765e987ef97361eebddc10dd96d0da47d
SHA2560a65159620394733740f9ffef86f76866df99d9094c546dbfdc3f3804223ed2f
SHA512fe6f88e1c96bc3d7c8966863d7750c2598bd87a17d2c0bf173ef6df5b3fe9b496e214998b576de389e9c90915a5814a3e6f948261e93ea8692a2afea0c56bf1f
-
Filesize
72KB
MD5610ebd848b01c08aca360091cb066ac5
SHA1e784a6b765e987ef97361eebddc10dd96d0da47d
SHA2560a65159620394733740f9ffef86f76866df99d9094c546dbfdc3f3804223ed2f
SHA512fe6f88e1c96bc3d7c8966863d7750c2598bd87a17d2c0bf173ef6df5b3fe9b496e214998b576de389e9c90915a5814a3e6f948261e93ea8692a2afea0c56bf1f
-
Filesize
72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
Filesize
72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
Filesize
72KB
MD51a1a4021a3858461e28205e8e78a64ee
SHA1f4d1bb689e40cc7ec4b47c993c2f85b9b84f2fa7
SHA256fd0d4a62260a48507665b7e4c0bb145dd50671449d78eea71897d6c1dc09dd07
SHA51294e6749d679d1634e72f399c9e870319714237668506afe15c4be719e76dbe5c131425f90d87657f241f3f0316c050aec4ef38a9f0b2d9db9bacefbd6d4f533e
-
Filesize
72KB
MD51a1a4021a3858461e28205e8e78a64ee
SHA1f4d1bb689e40cc7ec4b47c993c2f85b9b84f2fa7
SHA256fd0d4a62260a48507665b7e4c0bb145dd50671449d78eea71897d6c1dc09dd07
SHA51294e6749d679d1634e72f399c9e870319714237668506afe15c4be719e76dbe5c131425f90d87657f241f3f0316c050aec4ef38a9f0b2d9db9bacefbd6d4f533e
-
Filesize
72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
Filesize
72KB
MD53dd6f2b9f70f49c1fc3b9b099d6aec68
SHA1cbb7735ea553cf8936e231df9e70a7c1a3656d76
SHA25600ed12664c18f2aa1111b9feb18bac9ce3851e6cdaead39e39cd1590614502d0
SHA512cf681110828e43aa78618f8862bf1b9c345e62d3e62069af6e0c3851b1ead90331d9040a6dd268bf3fc734e8cc18e79152c9efd92567b54410b02ea90e36b74b
-
Filesize
72KB
MD5e8f7efbe73fcdd61d52038aefe19fa1e
SHA15f9daa0e6ea8493270c63e055ba3e118e8bf6cb0
SHA256fea3fad4df12e3da4442b7ed1c5db6bfd73d6192515e05561e5035fbb1753322
SHA512e47fa66ca7f7c3c704ec9a1e9b67c6abcd27238ae666734668722faf7c33e6675cafb156ff6a6cb9ae9c6a8d9ddb37eca28f795b68e136928297ef4115525c5b
-
Filesize
72KB
MD5e8f7efbe73fcdd61d52038aefe19fa1e
SHA15f9daa0e6ea8493270c63e055ba3e118e8bf6cb0
SHA256fea3fad4df12e3da4442b7ed1c5db6bfd73d6192515e05561e5035fbb1753322
SHA512e47fa66ca7f7c3c704ec9a1e9b67c6abcd27238ae666734668722faf7c33e6675cafb156ff6a6cb9ae9c6a8d9ddb37eca28f795b68e136928297ef4115525c5b
-
Filesize
72KB
MD51ab1bfa15f4163b3af76a2c0c5583d87
SHA122fe672f9b653a7145540628e8969055a0552d35
SHA2560d5221389ed512a416c27515d51ed13aab14322ef58cddd5d774ffee1bd32323
SHA5128541ff694d9136c8f38c560239ed21380f8c34a496f104987c81caca94634f301a9b583dd6526795802026e7c87d1f97193fb654d769d4fa050ad1d17ce20dcc
-
Filesize
72KB
MD54cd155a318230a4b1bede73c34a5f8d1
SHA1158adfeb568a19156e131db67b1b493ddf48f92c
SHA256478e3f13a456b21090f45a2f42c5664dce07dd38969ae4643894bd13a854ac87
SHA512cd84dd35618541bec067ccb43638b81af621e5c1cc80f2aa4a88585b5705c2f6b76cdeae6fa2acde925e9a5ae5019ee7db412d0b9f7290878aecb0bf499d453c
-
Filesize
72KB
MD54cd155a318230a4b1bede73c34a5f8d1
SHA1158adfeb568a19156e131db67b1b493ddf48f92c
SHA256478e3f13a456b21090f45a2f42c5664dce07dd38969ae4643894bd13a854ac87
SHA512cd84dd35618541bec067ccb43638b81af621e5c1cc80f2aa4a88585b5705c2f6b76cdeae6fa2acde925e9a5ae5019ee7db412d0b9f7290878aecb0bf499d453c
-
Filesize
72KB
MD54fc735d1176fadff953a05b4a4666261
SHA12e27141e5c035e6433e76ab49b193666f051a3e8
SHA2568cafa6c32a3112709c7d5af31f54e6c4eef8bc3c591c9605c267c397be9dbc30
SHA5121503378ea4c3068841af1cd134a6622dbfe0103a09175759931f92ef25d695c75d6c4cec3c11299c809af57b4b0942e74cbee3adcf390cf8bdae2330b75ce1f6
-
Filesize
72KB
MD54fc735d1176fadff953a05b4a4666261
SHA12e27141e5c035e6433e76ab49b193666f051a3e8
SHA2568cafa6c32a3112709c7d5af31f54e6c4eef8bc3c591c9605c267c397be9dbc30
SHA5121503378ea4c3068841af1cd134a6622dbfe0103a09175759931f92ef25d695c75d6c4cec3c11299c809af57b4b0942e74cbee3adcf390cf8bdae2330b75ce1f6