Analysis
-
max time kernel
153s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe
Resource
win10v2004-20220812-en
General
-
Target
e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe
-
Size
72KB
-
MD5
002ddb1687ae1673747f335ac56c9d60
-
SHA1
971599ab5fd34baabb5f825291b5d96fbfe44fc7
-
SHA256
e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f
-
SHA512
55b1f5635574e43100de197a5d6104d961660713df30006ffe81261b7e5547e3361042c537dfc4a2fc8356a001baa037a0c750cf93539cbf63edbf03601ab486
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2p:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4944 backup.exe 2116 update.exe 1056 backup.exe 2036 backup.exe 3700 backup.exe 4100 backup.exe 3552 backup.exe 2088 backup.exe 344 backup.exe 112 backup.exe 1288 backup.exe 4248 backup.exe 4372 backup.exe 4384 backup.exe 1928 backup.exe 4992 backup.exe 3304 backup.exe 3656 backup.exe 2016 backup.exe 1852 backup.exe 992 backup.exe 2236 backup.exe 4260 backup.exe 712 backup.exe 1384 backup.exe 4424 backup.exe 5016 backup.exe 3920 backup.exe 2044 backup.exe 3320 data.exe 2084 backup.exe 4104 backup.exe 4148 backup.exe 4956 backup.exe 3080 backup.exe 2108 backup.exe 4836 backup.exe 3088 backup.exe 5056 backup.exe 768 backup.exe 556 backup.exe 2284 backup.exe 3092 backup.exe 2368 backup.exe 2232 backup.exe 2068 backup.exe 3180 backup.exe 2464 backup.exe 2764 backup.exe 3420 backup.exe 2812 backup.exe 800 backup.exe 3100 backup.exe 4084 backup.exe 4204 backup.exe 868 backup.exe 5052 backup.exe 4908 backup.exe 4976 System Restore.exe 3672 backup.exe 1648 backup.exe 3680 backup.exe 4964 backup.exe 240 data.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe update.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\update.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 4944 backup.exe 2116 update.exe 1056 backup.exe 2036 backup.exe 3700 backup.exe 4100 backup.exe 3552 backup.exe 2088 backup.exe 344 backup.exe 112 backup.exe 1288 backup.exe 4248 backup.exe 4372 backup.exe 4384 backup.exe 1928 backup.exe 4992 backup.exe 3304 backup.exe 3656 backup.exe 2016 backup.exe 1852 backup.exe 992 backup.exe 2236 backup.exe 4260 backup.exe 712 backup.exe 1384 backup.exe 4424 backup.exe 5016 backup.exe 3920 backup.exe 2044 backup.exe 3320 data.exe 4104 backup.exe 2084 backup.exe 4956 backup.exe 3080 backup.exe 4148 backup.exe 2108 backup.exe 4836 backup.exe 3088 backup.exe 5056 backup.exe 768 backup.exe 556 backup.exe 3092 backup.exe 2284 backup.exe 2368 backup.exe 2232 backup.exe 2068 backup.exe 3180 backup.exe 2464 backup.exe 2764 backup.exe 3420 backup.exe 2812 backup.exe 800 backup.exe 3100 backup.exe 4204 backup.exe 868 backup.exe 5052 backup.exe 4084 backup.exe 4908 backup.exe 4976 System Restore.exe 3672 backup.exe 1648 backup.exe 3680 backup.exe 4964 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 4944 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 80 PID 2800 wrote to memory of 4944 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 80 PID 2800 wrote to memory of 4944 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 80 PID 2800 wrote to memory of 2116 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 81 PID 2800 wrote to memory of 2116 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 81 PID 2800 wrote to memory of 2116 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 81 PID 2800 wrote to memory of 1056 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 82 PID 2800 wrote to memory of 1056 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 82 PID 2800 wrote to memory of 1056 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 82 PID 2800 wrote to memory of 3700 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 83 PID 2800 wrote to memory of 3700 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 83 PID 2800 wrote to memory of 3700 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 83 PID 4944 wrote to memory of 2036 4944 backup.exe 84 PID 4944 wrote to memory of 2036 4944 backup.exe 84 PID 4944 wrote to memory of 2036 4944 backup.exe 84 PID 2800 wrote to memory of 4100 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 85 PID 2800 wrote to memory of 4100 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 85 PID 2800 wrote to memory of 4100 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 85 PID 2800 wrote to memory of 3552 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 86 PID 2800 wrote to memory of 3552 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 86 PID 2800 wrote to memory of 3552 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 86 PID 2036 wrote to memory of 2088 2036 backup.exe 87 PID 2036 wrote to memory of 2088 2036 backup.exe 87 PID 2036 wrote to memory of 2088 2036 backup.exe 87 PID 2036 wrote to memory of 112 2036 backup.exe 88 PID 2036 wrote to memory of 112 2036 backup.exe 88 PID 2036 wrote to memory of 112 2036 backup.exe 88 PID 2800 wrote to memory of 344 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 89 PID 2800 wrote to memory of 344 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 89 PID 2800 wrote to memory of 344 2800 e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe 89 PID 2036 wrote to memory of 1288 2036 backup.exe 90 PID 2036 wrote to memory of 1288 2036 backup.exe 90 PID 2036 wrote to memory of 1288 2036 backup.exe 90 PID 1288 wrote to memory of 4248 1288 backup.exe 91 PID 1288 wrote to memory of 4248 1288 backup.exe 91 PID 1288 wrote to memory of 4248 1288 backup.exe 91 PID 4248 wrote to memory of 4372 4248 backup.exe 92 PID 4248 wrote to memory of 4372 4248 backup.exe 92 PID 4248 wrote to memory of 4372 4248 backup.exe 92 PID 1288 wrote to memory of 4384 1288 backup.exe 93 PID 1288 wrote to memory of 4384 1288 backup.exe 93 PID 1288 wrote to memory of 4384 1288 backup.exe 93 PID 4384 wrote to memory of 1928 4384 backup.exe 94 PID 4384 wrote to memory of 1928 4384 backup.exe 94 PID 4384 wrote to memory of 1928 4384 backup.exe 94 PID 4384 wrote to memory of 4992 4384 backup.exe 95 PID 4384 wrote to memory of 4992 4384 backup.exe 95 PID 4384 wrote to memory of 4992 4384 backup.exe 95 PID 4992 wrote to memory of 3304 4992 backup.exe 96 PID 4992 wrote to memory of 3304 4992 backup.exe 96 PID 4992 wrote to memory of 3304 4992 backup.exe 96 PID 4992 wrote to memory of 3656 4992 backup.exe 97 PID 4992 wrote to memory of 3656 4992 backup.exe 97 PID 4992 wrote to memory of 3656 4992 backup.exe 97 PID 3656 wrote to memory of 2016 3656 backup.exe 98 PID 3656 wrote to memory of 2016 3656 backup.exe 98 PID 3656 wrote to memory of 2016 3656 backup.exe 98 PID 3656 wrote to memory of 1852 3656 backup.exe 99 PID 3656 wrote to memory of 1852 3656 backup.exe 99 PID 3656 wrote to memory of 1852 3656 backup.exe 99 PID 3656 wrote to memory of 992 3656 backup.exe 100 PID 3656 wrote to memory of 992 3656 backup.exe 100 PID 3656 wrote to memory of 992 3656 backup.exe 100 PID 3656 wrote to memory of 2236 3656 backup.exe 101 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe"C:\Users\Admin\AppData\Local\Temp\e0735067ca2a7178dcddae9b8caaf61cc054ea34e7417cbb1cc54ebda3fa297f.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\2988605015\backup.exeC:\Users\Admin\AppData\Local\Temp\2988605015\backup.exe C:\Users\Admin\AppData\Local\Temp\2988605015\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\backup.exe\backup.exe \3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:112
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1288 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4372
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3304
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3656 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1852
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:992
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4260
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:712
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4424
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3920
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2044
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\data.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\data.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5056
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3092 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3420
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4084
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1648
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\update.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\update.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵PID:3172
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4092
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2256
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\9⤵PID:4600
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\9⤵
- Disables RegEdit via registry modification
PID:3096
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\9⤵
- Disables RegEdit via registry modification
PID:5064
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4228
-
-
-
C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4504
-
-
C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hr-HR\8⤵
- Disables RegEdit via registry modification
PID:3200
-
-
C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hu-HU\8⤵
- System policy modification
PID:2820
-
-
C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1016
-
-
C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:1456
-
-
C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\it-IT\8⤵
- System policy modification
PID:3500
-
-
C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ko-KR\8⤵
- System policy modification
PID:4732
-
-
C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\8⤵PID:3464
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4148 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3088
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2232
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2764
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4204
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3672
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1428
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵PID:5084
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵PID:3276
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Disables RegEdit via registry modification
PID:680
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
PID:2064
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4524
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵PID:1940
-
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:3320
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- System policy modification
PID:1044 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵
- Disables RegEdit via registry modification
PID:4800
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵
- System policy modification
PID:1372
-
-
C:\Program Files\Common Files\microsoft shared\VGX\update.exe"C:\Program Files\Common Files\microsoft shared\VGX\update.exe" C:\Program Files\Common Files\microsoft shared\VGX\7⤵
- Modifies visibility of file extensions in Explorer
PID:3268
-
-
C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2308 -
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\8⤵
- Disables RegEdit via registry modification
PID:2856 -
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\9⤵
- Disables RegEdit via registry modification
PID:5076
-
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4836 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:800
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5052
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1856
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- System policy modification
PID:1832
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
PID:992
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1860
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:4860
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4240
-
-
C:\Program Files\Common Files\System\it-IT\update.exe"C:\Program Files\Common Files\System\it-IT\update.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3968
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:548
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:4336 -
C:\Program Files\Common Files\System\msadc\de-DE\backup.exe"C:\Program Files\Common Files\System\msadc\de-DE\backup.exe" C:\Program Files\Common Files\System\msadc\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1012
-
-
C:\Program Files\Common Files\System\msadc\en-US\backup.exe"C:\Program Files\Common Files\System\msadc\en-US\backup.exe" C:\Program Files\Common Files\System\msadc\en-US\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:736
-
-
C:\Program Files\Common Files\System\msadc\es-ES\backup.exe"C:\Program Files\Common Files\System\msadc\es-ES\backup.exe" C:\Program Files\Common Files\System\msadc\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
PID:4784
-
-
C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe"C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe" C:\Program Files\Common Files\System\msadc\fr-FR\8⤵
- System policy modification
PID:4964
-
-
C:\Program Files\Common Files\System\msadc\it-IT\backup.exe"C:\Program Files\Common Files\System\msadc\it-IT\backup.exe" C:\Program Files\Common Files\System\msadc\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:1468
-
-
C:\Program Files\Common Files\System\msadc\ja-JP\backup.exe"C:\Program Files\Common Files\System\msadc\ja-JP\backup.exe" C:\Program Files\Common Files\System\msadc\ja-JP\8⤵PID:3700
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3080 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2464 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3100
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4908
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:240
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4916
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
PID:4876
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
PID:4852
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Disables RegEdit via registry modification
PID:4260 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- System policy modification
PID:2908 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵
- System policy modification
PID:4628
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1120
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Drops file in Program Files directory
PID:4596 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4844
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4032
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
PID:3408
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:3420
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- System policy modification
PID:4904
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
PID:240
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:4420
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4104 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2812 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:868 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4964
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1212 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1348
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵PID:2260
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1508
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
PID:3084 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:5040
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Drops file in Program Files directory
PID:3740 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
PID:4740
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4396
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2276 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
PID:4012
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\8⤵
- Drops file in Program Files directory
PID:3504 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1056
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1432 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4932 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\10⤵PID:4636
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:628 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:2004 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵PID:2540
-
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Drops file in Program Files directory
- System policy modification
PID:3400 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:4092
-
-
-
-
C:\Users\System Restore.exe"C:\Users\System Restore.exe" C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:880 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1556 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2800
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Disables RegEdit via registry modification
PID:4444
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:3840
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:868
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:4876
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\update.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\update.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5724d5f94975a89ead7cd72e2fba76a9d
SHA1210d2bcc78fb7dd844df33870a15f1b6af4db026
SHA256f0468f30402794a6eb96b40fd5fe2ce6a1ddc56f5131f771cdeceda8e60d5606
SHA5126a852846c59ddaf2cf289146b4ff374067095d74d0a61c620cacc63f1481cac4a902f874f927c40638641dc2c097174d4de368c6feb6a780568d4143462df164
-
Filesize
72KB
MD5724d5f94975a89ead7cd72e2fba76a9d
SHA1210d2bcc78fb7dd844df33870a15f1b6af4db026
SHA256f0468f30402794a6eb96b40fd5fe2ce6a1ddc56f5131f771cdeceda8e60d5606
SHA5126a852846c59ddaf2cf289146b4ff374067095d74d0a61c620cacc63f1481cac4a902f874f927c40638641dc2c097174d4de368c6feb6a780568d4143462df164
-
Filesize
72KB
MD56de25f134ef10db735b43fe0aed35780
SHA1640c4bfd5ff3aa3fd174893148712f72cbfed179
SHA25699b83577545add5f3167b049acc5d18572ac37ebcd86b5921ae28254de8b076f
SHA512b0fc32d9c5c3bd07950a3b44733044a9c0a1a662f96160230b415f9afba095be50e02beb8767126f002c913ccc83009a2a46d552384425faf6ab6c05a1c6ec68
-
Filesize
72KB
MD56de25f134ef10db735b43fe0aed35780
SHA1640c4bfd5ff3aa3fd174893148712f72cbfed179
SHA25699b83577545add5f3167b049acc5d18572ac37ebcd86b5921ae28254de8b076f
SHA512b0fc32d9c5c3bd07950a3b44733044a9c0a1a662f96160230b415f9afba095be50e02beb8767126f002c913ccc83009a2a46d552384425faf6ab6c05a1c6ec68
-
Filesize
72KB
MD59a54909e0bf913f5a72e46562ab11e7f
SHA1160745e437ae08f323dafab1dd4aeedb03190a68
SHA256ca5fbc1c9f5a3d8fbf2f889e7893e7a9378a48e30fd6f87672d7a5beef3494f6
SHA5128bf36746b2e969d158e93d39489e9b0571f3655ff859feb7b8751063dac7859735c9bc28f8374d0917bfda86bf25302f4597d2199e4e58ce04a5b496df03959e
-
Filesize
72KB
MD59a54909e0bf913f5a72e46562ab11e7f
SHA1160745e437ae08f323dafab1dd4aeedb03190a68
SHA256ca5fbc1c9f5a3d8fbf2f889e7893e7a9378a48e30fd6f87672d7a5beef3494f6
SHA5128bf36746b2e969d158e93d39489e9b0571f3655ff859feb7b8751063dac7859735c9bc28f8374d0917bfda86bf25302f4597d2199e4e58ce04a5b496df03959e
-
Filesize
72KB
MD5480337c8408c5978dcbf820096d692a4
SHA119ed0ec64d40124c5902247c8e835bb4644737e9
SHA2566d12a71616bb5ae1a4ee55d3b57b8de5d3658488dfde565496c73c5647b21664
SHA51275581102395887f6554b3060e518197a22910e27ab5926b059baf486e2a0f38dfe431b5be864690d739363ed423d28f768616cb2c643548a5402b6f835b19a97
-
Filesize
72KB
MD5480337c8408c5978dcbf820096d692a4
SHA119ed0ec64d40124c5902247c8e835bb4644737e9
SHA2566d12a71616bb5ae1a4ee55d3b57b8de5d3658488dfde565496c73c5647b21664
SHA51275581102395887f6554b3060e518197a22910e27ab5926b059baf486e2a0f38dfe431b5be864690d739363ed423d28f768616cb2c643548a5402b6f835b19a97
-
Filesize
72KB
MD55aad070b720c711c8ac1d1787e08f026
SHA15ace1c0078831f6c84b9b74d955edd8270d6bc95
SHA2562ab72061eae8bdfb87be0f22b75c90d3a04b5e90eb3de244b5ceb6212129a2a2
SHA512120d35dfda04b4ff2b7192a5c7d674457b58868944da8da4bc0294585671ce7f6b1758586dcc9c179568a27da11a5d0d35503b4ed9d03013a558bfb001f1c14b
-
Filesize
72KB
MD55aad070b720c711c8ac1d1787e08f026
SHA15ace1c0078831f6c84b9b74d955edd8270d6bc95
SHA2562ab72061eae8bdfb87be0f22b75c90d3a04b5e90eb3de244b5ceb6212129a2a2
SHA512120d35dfda04b4ff2b7192a5c7d674457b58868944da8da4bc0294585671ce7f6b1758586dcc9c179568a27da11a5d0d35503b4ed9d03013a558bfb001f1c14b
-
Filesize
72KB
MD566bdfec1098f6be187ba61d9f73c16be
SHA1456ccd4c88ac78e48994efdd11c8ba5cc5d6f444
SHA256acc2cf7d83c0c2689944e0459bc0f04a66779087e840b9bbf7ad68c6c288d558
SHA5124ef5309041283f801bb13b132c1f656140bce2ee9f4472c8d368cc1f4c35da61c05ffd84f15a9eedb75a6c18231e3dfc59daa24ca88816e3575071c39ff0882e
-
Filesize
72KB
MD566bdfec1098f6be187ba61d9f73c16be
SHA1456ccd4c88ac78e48994efdd11c8ba5cc5d6f444
SHA256acc2cf7d83c0c2689944e0459bc0f04a66779087e840b9bbf7ad68c6c288d558
SHA5124ef5309041283f801bb13b132c1f656140bce2ee9f4472c8d368cc1f4c35da61c05ffd84f15a9eedb75a6c18231e3dfc59daa24ca88816e3575071c39ff0882e
-
Filesize
72KB
MD5e51b354577794e329f72a64966a8d189
SHA11730572a5ace6555d209299d60188eef3cf42722
SHA2565027c9b82ec7c8979839202125063ca83919ba70ffbbcc6401f9dc6a402e3c82
SHA512aa6fd56cfc5e81be804dad108a29693022945a06edab1c3d74430f8158241708b50f427ebd7b868cea332f83b65c4d364ae3c6ed529796fd9af9a0d44e68c432
-
Filesize
72KB
MD5e51b354577794e329f72a64966a8d189
SHA11730572a5ace6555d209299d60188eef3cf42722
SHA2565027c9b82ec7c8979839202125063ca83919ba70ffbbcc6401f9dc6a402e3c82
SHA512aa6fd56cfc5e81be804dad108a29693022945a06edab1c3d74430f8158241708b50f427ebd7b868cea332f83b65c4d364ae3c6ed529796fd9af9a0d44e68c432
-
Filesize
72KB
MD55aad070b720c711c8ac1d1787e08f026
SHA15ace1c0078831f6c84b9b74d955edd8270d6bc95
SHA2562ab72061eae8bdfb87be0f22b75c90d3a04b5e90eb3de244b5ceb6212129a2a2
SHA512120d35dfda04b4ff2b7192a5c7d674457b58868944da8da4bc0294585671ce7f6b1758586dcc9c179568a27da11a5d0d35503b4ed9d03013a558bfb001f1c14b
-
Filesize
72KB
MD55aad070b720c711c8ac1d1787e08f026
SHA15ace1c0078831f6c84b9b74d955edd8270d6bc95
SHA2562ab72061eae8bdfb87be0f22b75c90d3a04b5e90eb3de244b5ceb6212129a2a2
SHA512120d35dfda04b4ff2b7192a5c7d674457b58868944da8da4bc0294585671ce7f6b1758586dcc9c179568a27da11a5d0d35503b4ed9d03013a558bfb001f1c14b
-
Filesize
72KB
MD546cd0c6e6a5fcb59ec7180855d50dcde
SHA14881bfaec448efaf15b6e0da7e8f488eb88f07d6
SHA256a8eaa24adf57f4a133e583b977af66c6cbba219221ae26bea82830b39d91e568
SHA5126089f82df95a7fb813c94d01d392e3ab1f3d74d8f80e287003b6a107a5953aecf1256b5c56a8db5673bf7f8565afee88dbfd2413b7c5fddd6cf99548a4b487dd
-
Filesize
72KB
MD546cd0c6e6a5fcb59ec7180855d50dcde
SHA14881bfaec448efaf15b6e0da7e8f488eb88f07d6
SHA256a8eaa24adf57f4a133e583b977af66c6cbba219221ae26bea82830b39d91e568
SHA5126089f82df95a7fb813c94d01d392e3ab1f3d74d8f80e287003b6a107a5953aecf1256b5c56a8db5673bf7f8565afee88dbfd2413b7c5fddd6cf99548a4b487dd
-
Filesize
72KB
MD5e51b354577794e329f72a64966a8d189
SHA11730572a5ace6555d209299d60188eef3cf42722
SHA2565027c9b82ec7c8979839202125063ca83919ba70ffbbcc6401f9dc6a402e3c82
SHA512aa6fd56cfc5e81be804dad108a29693022945a06edab1c3d74430f8158241708b50f427ebd7b868cea332f83b65c4d364ae3c6ed529796fd9af9a0d44e68c432
-
Filesize
72KB
MD5e51b354577794e329f72a64966a8d189
SHA11730572a5ace6555d209299d60188eef3cf42722
SHA2565027c9b82ec7c8979839202125063ca83919ba70ffbbcc6401f9dc6a402e3c82
SHA512aa6fd56cfc5e81be804dad108a29693022945a06edab1c3d74430f8158241708b50f427ebd7b868cea332f83b65c4d364ae3c6ed529796fd9af9a0d44e68c432
-
Filesize
72KB
MD546cd0c6e6a5fcb59ec7180855d50dcde
SHA14881bfaec448efaf15b6e0da7e8f488eb88f07d6
SHA256a8eaa24adf57f4a133e583b977af66c6cbba219221ae26bea82830b39d91e568
SHA5126089f82df95a7fb813c94d01d392e3ab1f3d74d8f80e287003b6a107a5953aecf1256b5c56a8db5673bf7f8565afee88dbfd2413b7c5fddd6cf99548a4b487dd
-
Filesize
72KB
MD546cd0c6e6a5fcb59ec7180855d50dcde
SHA14881bfaec448efaf15b6e0da7e8f488eb88f07d6
SHA256a8eaa24adf57f4a133e583b977af66c6cbba219221ae26bea82830b39d91e568
SHA5126089f82df95a7fb813c94d01d392e3ab1f3d74d8f80e287003b6a107a5953aecf1256b5c56a8db5673bf7f8565afee88dbfd2413b7c5fddd6cf99548a4b487dd
-
Filesize
72KB
MD546cd0c6e6a5fcb59ec7180855d50dcde
SHA14881bfaec448efaf15b6e0da7e8f488eb88f07d6
SHA256a8eaa24adf57f4a133e583b977af66c6cbba219221ae26bea82830b39d91e568
SHA5126089f82df95a7fb813c94d01d392e3ab1f3d74d8f80e287003b6a107a5953aecf1256b5c56a8db5673bf7f8565afee88dbfd2413b7c5fddd6cf99548a4b487dd
-
Filesize
72KB
MD546cd0c6e6a5fcb59ec7180855d50dcde
SHA14881bfaec448efaf15b6e0da7e8f488eb88f07d6
SHA256a8eaa24adf57f4a133e583b977af66c6cbba219221ae26bea82830b39d91e568
SHA5126089f82df95a7fb813c94d01d392e3ab1f3d74d8f80e287003b6a107a5953aecf1256b5c56a8db5673bf7f8565afee88dbfd2413b7c5fddd6cf99548a4b487dd
-
Filesize
72KB
MD5ca1f472f3813c88ade7e006e20bb799e
SHA1595961dd56a9b66bd152651c2a8897a62dfef944
SHA256598fad3f8510435ee8dfa8d0e7d2d9c1bf4137178181e1255c089ab16c040b16
SHA512926faf0cb5e26a282096a379b143d850a8eb867f253795c2e4c5d81dd474924da88f379aaad0b1cc83f46f50d597d2b16736d68a866939e02dadbdfc30da18b7
-
Filesize
72KB
MD5ca1f472f3813c88ade7e006e20bb799e
SHA1595961dd56a9b66bd152651c2a8897a62dfef944
SHA256598fad3f8510435ee8dfa8d0e7d2d9c1bf4137178181e1255c089ab16c040b16
SHA512926faf0cb5e26a282096a379b143d850a8eb867f253795c2e4c5d81dd474924da88f379aaad0b1cc83f46f50d597d2b16736d68a866939e02dadbdfc30da18b7
-
Filesize
72KB
MD5ca1f472f3813c88ade7e006e20bb799e
SHA1595961dd56a9b66bd152651c2a8897a62dfef944
SHA256598fad3f8510435ee8dfa8d0e7d2d9c1bf4137178181e1255c089ab16c040b16
SHA512926faf0cb5e26a282096a379b143d850a8eb867f253795c2e4c5d81dd474924da88f379aaad0b1cc83f46f50d597d2b16736d68a866939e02dadbdfc30da18b7
-
Filesize
72KB
MD5ca1f472f3813c88ade7e006e20bb799e
SHA1595961dd56a9b66bd152651c2a8897a62dfef944
SHA256598fad3f8510435ee8dfa8d0e7d2d9c1bf4137178181e1255c089ab16c040b16
SHA512926faf0cb5e26a282096a379b143d850a8eb867f253795c2e4c5d81dd474924da88f379aaad0b1cc83f46f50d597d2b16736d68a866939e02dadbdfc30da18b7
-
Filesize
72KB
MD5ca1f472f3813c88ade7e006e20bb799e
SHA1595961dd56a9b66bd152651c2a8897a62dfef944
SHA256598fad3f8510435ee8dfa8d0e7d2d9c1bf4137178181e1255c089ab16c040b16
SHA512926faf0cb5e26a282096a379b143d850a8eb867f253795c2e4c5d81dd474924da88f379aaad0b1cc83f46f50d597d2b16736d68a866939e02dadbdfc30da18b7
-
Filesize
72KB
MD5ca1f472f3813c88ade7e006e20bb799e
SHA1595961dd56a9b66bd152651c2a8897a62dfef944
SHA256598fad3f8510435ee8dfa8d0e7d2d9c1bf4137178181e1255c089ab16c040b16
SHA512926faf0cb5e26a282096a379b143d850a8eb867f253795c2e4c5d81dd474924da88f379aaad0b1cc83f46f50d597d2b16736d68a866939e02dadbdfc30da18b7
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD595f969d357990b3d35d4cdc5cd008172
SHA1405b9eb025a32eda7c220d83db1ddff5170b00d3
SHA256f08832890096c7487e7ceb485c510a291060c711bf29028aaf8afc797aaad6c1
SHA512dff34e60b3c4e442185e80dc59d81848d1df575bfda74cf7745705fd5daa636c2f352bbf2c0290972bff0dce76e7f4cd9d060a2f0d186b76ba91e75d3f02065e
-
Filesize
72KB
MD50dfe8761cfaf01deef745b085af1315e
SHA1662442f61f1953b0dca978264c87d3800bf7338d
SHA256d150e9c756b33170292e0b7a85fa0f7df245d96976f5c413b498e481c874723f
SHA512b1e8a968642257ec059ef41b160cdc2fbd955e7baaaea62998360bc9576ff3cbc616d369b1c361024ce2339b148c7de253c9668572073957d6559c74f28d8204
-
Filesize
72KB
MD50dfe8761cfaf01deef745b085af1315e
SHA1662442f61f1953b0dca978264c87d3800bf7338d
SHA256d150e9c756b33170292e0b7a85fa0f7df245d96976f5c413b498e481c874723f
SHA512b1e8a968642257ec059ef41b160cdc2fbd955e7baaaea62998360bc9576ff3cbc616d369b1c361024ce2339b148c7de253c9668572073957d6559c74f28d8204
-
Filesize
72KB
MD50dfe8761cfaf01deef745b085af1315e
SHA1662442f61f1953b0dca978264c87d3800bf7338d
SHA256d150e9c756b33170292e0b7a85fa0f7df245d96976f5c413b498e481c874723f
SHA512b1e8a968642257ec059ef41b160cdc2fbd955e7baaaea62998360bc9576ff3cbc616d369b1c361024ce2339b148c7de253c9668572073957d6559c74f28d8204
-
Filesize
72KB
MD50dfe8761cfaf01deef745b085af1315e
SHA1662442f61f1953b0dca978264c87d3800bf7338d
SHA256d150e9c756b33170292e0b7a85fa0f7df245d96976f5c413b498e481c874723f
SHA512b1e8a968642257ec059ef41b160cdc2fbd955e7baaaea62998360bc9576ff3cbc616d369b1c361024ce2339b148c7de253c9668572073957d6559c74f28d8204
-
Filesize
72KB
MD5ad40b814f778e4c121c57fcf0251083d
SHA17317ec51b2f952fac685452ef71453446ef04f68
SHA256873617cb890fdcbfdaa7b41b499763840ce557e129b4ecfe329b12610a607590
SHA512997be052af9992a88b1ab4722db71a29e3093cc3cd5e3ba68439609c2d8d70d8cdaa059e77b8e430466753bce857ee2773bf9eb36603f9e56df03cad2fb22d8a
-
Filesize
72KB
MD5ad40b814f778e4c121c57fcf0251083d
SHA17317ec51b2f952fac685452ef71453446ef04f68
SHA256873617cb890fdcbfdaa7b41b499763840ce557e129b4ecfe329b12610a607590
SHA512997be052af9992a88b1ab4722db71a29e3093cc3cd5e3ba68439609c2d8d70d8cdaa059e77b8e430466753bce857ee2773bf9eb36603f9e56df03cad2fb22d8a
-
Filesize
72KB
MD57c294eb2787daf266b13e4bbdf8a4205
SHA1649dda29db8ab9a6b7660fab09a127afd9281a45
SHA256bc9d20f12e9446182cd85c1d90e762e119ec743ff8c4807373427388d08b99d9
SHA512164309f4a145be1b2ca445d8ddc6d582493526efcc13a30cbfb2df15b9424f59ee0ecf4bf1d321d25c8cad7a8aae66c18b43a642c2ba3470b436cd124c6dc6fa
-
Filesize
72KB
MD57c294eb2787daf266b13e4bbdf8a4205
SHA1649dda29db8ab9a6b7660fab09a127afd9281a45
SHA256bc9d20f12e9446182cd85c1d90e762e119ec743ff8c4807373427388d08b99d9
SHA512164309f4a145be1b2ca445d8ddc6d582493526efcc13a30cbfb2df15b9424f59ee0ecf4bf1d321d25c8cad7a8aae66c18b43a642c2ba3470b436cd124c6dc6fa
-
Filesize
72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
Filesize
72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
Filesize
72KB
MD514fbd89e3d222e21cd3cd4e912e89b25
SHA1b81d25af580ac1ae3c319f0157482203787ae870
SHA256677577627255e570bd90dfd900b403e4fe092598646414f9f747b5480be47b82
SHA5120959925adc8f3705d114aaa7067eb7e88ba8312d5702fc545c8ceaec0e9b0e94e5acf9ca12b7b51a469027d141fa21edef8142a18329875a6dc74807dd96a047
-
Filesize
72KB
MD514fbd89e3d222e21cd3cd4e912e89b25
SHA1b81d25af580ac1ae3c319f0157482203787ae870
SHA256677577627255e570bd90dfd900b403e4fe092598646414f9f747b5480be47b82
SHA5120959925adc8f3705d114aaa7067eb7e88ba8312d5702fc545c8ceaec0e9b0e94e5acf9ca12b7b51a469027d141fa21edef8142a18329875a6dc74807dd96a047
-
Filesize
72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
Filesize
72KB
MD5afdc25afef2ce0399159d9f8be030fb7
SHA1365ad457064c1472acac5fe849c42eac8c58f3ea
SHA2566f97505c986eece47c712577239ec17afdd44149537769060ff98ccec1f9e290
SHA5125c6ee6a903fefccb74b5e7380b05356614fc2dba0abec1b1123ec4a4f3fdfb4d086eef8e08e98071d6ded27c297c47af83a403c80eb205a7aa92f99339bc6712
-
Filesize
72KB
MD50b416441f226e78bf3573bb3decc7983
SHA12188ec983a33794e7dc72adec39f5416faff3db1
SHA256ea75a36c1931b92a234deb430fd8fa481e5e0afea2ae4cc14032a8bbb275a079
SHA5124d85dda371bffda2b42c3549f30bf014c33ed26119454495ebca92b592f79effcc45a6a8e54444f11efaa38ff6912edb660119c0c19a791e4a1f034ad047983c
-
Filesize
72KB
MD50b416441f226e78bf3573bb3decc7983
SHA12188ec983a33794e7dc72adec39f5416faff3db1
SHA256ea75a36c1931b92a234deb430fd8fa481e5e0afea2ae4cc14032a8bbb275a079
SHA5124d85dda371bffda2b42c3549f30bf014c33ed26119454495ebca92b592f79effcc45a6a8e54444f11efaa38ff6912edb660119c0c19a791e4a1f034ad047983c
-
Filesize
72KB
MD5589fc73c0e931bcf5b4b48507bb3ac98
SHA1d80d7b9a37e3e1cd8e61de1ebb5c1b4d836bee11
SHA2561be968fe664cc16d03d6b8188d0973d24b82084ac07dea882f3e9b5ed3f74e6a
SHA512fd22b299ae5980eb20df1dd28bd1d353b509ee85e835a0281b21eecc09cd8af987656916034e1560afa3abd51e677386d96884040f9051401cc53497540336ec
-
Filesize
72KB
MD5589fc73c0e931bcf5b4b48507bb3ac98
SHA1d80d7b9a37e3e1cd8e61de1ebb5c1b4d836bee11
SHA2561be968fe664cc16d03d6b8188d0973d24b82084ac07dea882f3e9b5ed3f74e6a
SHA512fd22b299ae5980eb20df1dd28bd1d353b509ee85e835a0281b21eecc09cd8af987656916034e1560afa3abd51e677386d96884040f9051401cc53497540336ec
-
Filesize
72KB
MD552fd2ca3e4715c9b45830fdbe468501e
SHA1c55b56053df58d8bf6860450f56e7562d471d196
SHA25662c9b38602e5b8e8f30e7005348f5513ecaa3229ea3d25964f53b29a972ef877
SHA51216227856ce78a9225715c2f2982e9c794bcd9e79bd192c1febb842e3fd72ad9bb2c51657a042c9c58f364d707bcf66a9361ecefe66ea4f27bd430675f56ff4fe
-
Filesize
72KB
MD552fd2ca3e4715c9b45830fdbe468501e
SHA1c55b56053df58d8bf6860450f56e7562d471d196
SHA25662c9b38602e5b8e8f30e7005348f5513ecaa3229ea3d25964f53b29a972ef877
SHA51216227856ce78a9225715c2f2982e9c794bcd9e79bd192c1febb842e3fd72ad9bb2c51657a042c9c58f364d707bcf66a9361ecefe66ea4f27bd430675f56ff4fe