Analysis
-
max time kernel
151s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe
Resource
win10v2004-20221111-en
General
-
Target
d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe
-
Size
72KB
-
MD5
0968b33f39babbf2142f97de9d67930d
-
SHA1
e51173dfc27f54dfbaee21840d42572267264dc5
-
SHA256
d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53
-
SHA512
db921ed1d06ce3eb0d32c49b5a650229e287babbe8303e8b6b2f53ed943f3f4d1aa869816318958729c691de44ca1f8780725cf3b3c8446057235f78d150a767
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2w:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPk
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4532 backup.exe 4780 backup.exe 3552 backup.exe 2256 backup.exe 3040 backup.exe 3616 backup.exe 3388 backup.exe 1376 backup.exe 4056 backup.exe 1924 backup.exe 4948 backup.exe 1996 backup.exe 3344 backup.exe 1836 backup.exe 1492 System Restore.exe 3984 backup.exe 5100 backup.exe 1268 backup.exe 3940 backup.exe 2244 backup.exe 1536 backup.exe 3976 backup.exe 1704 backup.exe 2440 System Restore.exe 892 update.exe 332 backup.exe 2488 backup.exe 3536 backup.exe 392 backup.exe 3112 backup.exe 4480 backup.exe 3100 backup.exe 4896 backup.exe 3368 backup.exe 2260 backup.exe 4820 backup.exe 4072 backup.exe 3556 backup.exe 3440 System Restore.exe 3964 backup.exe 3108 backup.exe 4116 backup.exe 1452 backup.exe 2132 backup.exe 1376 backup.exe 1924 backup.exe 4952 backup.exe 1572 backup.exe 1732 backup.exe 4232 backup.exe 1480 backup.exe 1648 backup.exe 3172 backup.exe 3176 backup.exe 4612 backup.exe 644 backup.exe 4720 backup.exe 4396 backup.exe 892 backup.exe 5028 backup.exe 3328 backup.exe 4528 backup.exe 2660 backup.exe 4268 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office 15\update.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\ModifiableWindowsApps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\System Restore.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 4532 backup.exe 4780 backup.exe 3552 backup.exe 2256 backup.exe 3040 backup.exe 3616 backup.exe 3388 backup.exe 1376 backup.exe 4056 backup.exe 1924 backup.exe 4948 backup.exe 1996 backup.exe 3344 backup.exe 1836 backup.exe 1492 System Restore.exe 3984 backup.exe 5100 backup.exe 1268 backup.exe 3940 backup.exe 2244 backup.exe 1536 backup.exe 3976 backup.exe 1704 backup.exe 2440 System Restore.exe 892 update.exe 332 backup.exe 2488 backup.exe 3536 backup.exe 392 backup.exe 3112 backup.exe 4480 backup.exe 3100 backup.exe 4896 backup.exe 2260 backup.exe 4820 backup.exe 3368 backup.exe 3440 System Restore.exe 4072 backup.exe 3556 backup.exe 3964 backup.exe 3108 backup.exe 4116 backup.exe 1452 backup.exe 2132 backup.exe 1376 backup.exe 1924 backup.exe 1572 backup.exe 4952 backup.exe 1732 backup.exe 4232 backup.exe 1480 backup.exe 1648 backup.exe 3172 backup.exe 3176 backup.exe 4612 backup.exe 644 backup.exe 4720 backup.exe 4396 backup.exe 892 backup.exe 5028 backup.exe 2660 backup.exe 3328 backup.exe 4528 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 4532 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 85 PID 1984 wrote to memory of 4532 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 85 PID 1984 wrote to memory of 4532 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 85 PID 1984 wrote to memory of 4780 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 86 PID 1984 wrote to memory of 4780 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 86 PID 1984 wrote to memory of 4780 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 86 PID 1984 wrote to memory of 3552 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 87 PID 1984 wrote to memory of 3552 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 87 PID 1984 wrote to memory of 3552 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 87 PID 1984 wrote to memory of 2256 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 88 PID 1984 wrote to memory of 2256 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 88 PID 1984 wrote to memory of 2256 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 88 PID 1984 wrote to memory of 3040 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 89 PID 1984 wrote to memory of 3040 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 89 PID 1984 wrote to memory of 3040 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 89 PID 4532 wrote to memory of 3616 4532 backup.exe 90 PID 4532 wrote to memory of 3616 4532 backup.exe 90 PID 4532 wrote to memory of 3616 4532 backup.exe 90 PID 1984 wrote to memory of 3388 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 91 PID 1984 wrote to memory of 3388 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 91 PID 1984 wrote to memory of 3388 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 91 PID 3616 wrote to memory of 1376 3616 backup.exe 92 PID 3616 wrote to memory of 1376 3616 backup.exe 92 PID 3616 wrote to memory of 1376 3616 backup.exe 92 PID 1984 wrote to memory of 4056 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 93 PID 1984 wrote to memory of 4056 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 93 PID 1984 wrote to memory of 4056 1984 d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe 93 PID 3616 wrote to memory of 1924 3616 backup.exe 94 PID 3616 wrote to memory of 1924 3616 backup.exe 94 PID 3616 wrote to memory of 1924 3616 backup.exe 94 PID 3616 wrote to memory of 4948 3616 backup.exe 95 PID 3616 wrote to memory of 4948 3616 backup.exe 95 PID 3616 wrote to memory of 4948 3616 backup.exe 95 PID 4948 wrote to memory of 1996 4948 backup.exe 96 PID 4948 wrote to memory of 1996 4948 backup.exe 96 PID 4948 wrote to memory of 1996 4948 backup.exe 96 PID 1996 wrote to memory of 3344 1996 backup.exe 97 PID 1996 wrote to memory of 3344 1996 backup.exe 97 PID 1996 wrote to memory of 3344 1996 backup.exe 97 PID 4948 wrote to memory of 1836 4948 backup.exe 98 PID 4948 wrote to memory of 1836 4948 backup.exe 98 PID 4948 wrote to memory of 1836 4948 backup.exe 98 PID 1836 wrote to memory of 1492 1836 backup.exe 99 PID 1836 wrote to memory of 1492 1836 backup.exe 99 PID 1836 wrote to memory of 1492 1836 backup.exe 99 PID 1836 wrote to memory of 3984 1836 backup.exe 100 PID 1836 wrote to memory of 3984 1836 backup.exe 100 PID 1836 wrote to memory of 3984 1836 backup.exe 100 PID 3984 wrote to memory of 5100 3984 backup.exe 101 PID 3984 wrote to memory of 5100 3984 backup.exe 101 PID 3984 wrote to memory of 5100 3984 backup.exe 101 PID 3984 wrote to memory of 1268 3984 backup.exe 102 PID 3984 wrote to memory of 1268 3984 backup.exe 102 PID 3984 wrote to memory of 1268 3984 backup.exe 102 PID 1268 wrote to memory of 3940 1268 backup.exe 103 PID 1268 wrote to memory of 3940 1268 backup.exe 103 PID 1268 wrote to memory of 3940 1268 backup.exe 103 PID 1268 wrote to memory of 2244 1268 backup.exe 104 PID 1268 wrote to memory of 2244 1268 backup.exe 104 PID 1268 wrote to memory of 2244 1268 backup.exe 104 PID 1268 wrote to memory of 1536 1268 backup.exe 105 PID 1268 wrote to memory of 1536 1268 backup.exe 105 PID 1268 wrote to memory of 1536 1268 backup.exe 105 PID 1268 wrote to memory of 3976 1268 backup.exe 106 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe"C:\Users\Admin\AppData\Local\Temp\d3ad5647ce0b38b9379285288746a47157e0014a75e4490eee2332453afc8c53.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\1818259574\backup.exeC:\Users\Admin\AppData\Local\Temp\1818259574\backup.exe C:\Users\Admin\AppData\Local\Temp\1818259574\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1376
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1996 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3344
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files\Common Files\DESIGNER\System Restore.exe"C:\Program Files\Common Files\DESIGNER\System Restore.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3984 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5100
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3940
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2244
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3976
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2440
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\update.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\update.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:892
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:332
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2488
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:392
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3112
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3100
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4896 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4072
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4116
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4952
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4396
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\9⤵
- System policy modification
PID:4796
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\9⤵
- Disables RegEdit via registry modification
PID:3932
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3916
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4256
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\9⤵PID:4460
-
-
-
C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4820
-
-
C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hr-HR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3108
-
-
C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3176
-
-
C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\it-IT\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:4268
-
-
C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4224
-
-
C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
PID:4228
-
-
C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3144
-
-
C:\Program Files\Common Files\microsoft shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\lt-LT\8⤵PID:3172
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3368 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4232
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4612
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\update.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\update.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3860
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
PID:3136
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:1472
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵PID:4880
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5028
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3328
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Modifies visibility of file extensions in Explorer
PID:4328
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵PID:2232
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4912 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- Disables RegEdit via registry modification
PID:2444
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵PID:2076
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2132 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:644 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3340
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1724
-
-
C:\Program Files\Common Files\System\ado\es-ES\update.exe"C:\Program Files\Common Files\System\ado\es-ES\update.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4112
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:4128
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4024
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1732
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- System policy modification
PID:5032
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- System policy modification
PID:2084
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4416
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2992
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:924
-
-
-
-
C:\Program Files\Google\System Restore.exe"C:\Program Files\Google\System Restore.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3440 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3964 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
PID:3428
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
PID:1496
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- System policy modification
PID:2400
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Disables RegEdit via registry modification
PID:3128
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3920
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵PID:2240
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Disables RegEdit via registry modification
PID:4460
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3172
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4528
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4764
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- System policy modification
PID:4196
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
PID:1248
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- System policy modification
PID:1808
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Drops file in Program Files directory
PID:2540 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1180 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵PID:3760
-
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2020 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵PID:4956
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵PID:648
-
-
-
C:\Program Files\Microsoft Office 15\update.exe"C:\Program Files\Microsoft Office 15\update.exe" C:\Program Files\Microsoft Office 15\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4924 -
C:\Program Files\Microsoft Office 15\ClientX64\backup.exe"C:\Program Files\Microsoft Office 15\ClientX64\backup.exe" C:\Program Files\Microsoft Office 15\ClientX64\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3316
-
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:3532
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3556 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4720 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- System policy modification
PID:3148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- System policy modification
PID:1460 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Drops file in Program Files directory
- System policy modification
PID:5000 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵PID:4184
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Drops file in Program Files directory
- System policy modification
PID:736 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵PID:1852
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵PID:1264
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\7⤵
- Disables RegEdit via registry modification
PID:4816 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2464
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4664 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3024 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1240
-
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Drops file in Program Files directory
PID:3240 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
PID:3484
-
-
C:\Program Files (x86)\Google\Policies\System Restore.exe"C:\Program Files (x86)\Google\Policies\System Restore.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
PID:4828
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1724
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Drops file in Program Files directory
- System policy modification
PID:3168 -
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:796
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:2172
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1376 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
PID:4480
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3548
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:4716
-
-
C:\Users\Admin\Documents\data.exeC:\Users\Admin\Documents\data.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4780
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4292
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:4468
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3716 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3056
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2644
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:4704
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:1532 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
PID:4480
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵PID:420
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4056
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b54b5fa7c8cfc04c67dcc52b083bc268
SHA1fcb9341f75cd601d4ef25d313365f6e82889a0a5
SHA256f691db173e0ff598f9dabb56f777ed5a94da8a3cd6a9cc6b9f9ce966016a9aee
SHA51266a6dfa9c3beae23eb467bbc8edcacc14b20b264223313ff7c6c595789ef5c0899021c18ddfbcb148662cb8b89d88dd82dcacdd1eb90268c5ccbbc55d56df198
-
Filesize
72KB
MD5b54b5fa7c8cfc04c67dcc52b083bc268
SHA1fcb9341f75cd601d4ef25d313365f6e82889a0a5
SHA256f691db173e0ff598f9dabb56f777ed5a94da8a3cd6a9cc6b9f9ce966016a9aee
SHA51266a6dfa9c3beae23eb467bbc8edcacc14b20b264223313ff7c6c595789ef5c0899021c18ddfbcb148662cb8b89d88dd82dcacdd1eb90268c5ccbbc55d56df198
-
Filesize
72KB
MD51b17d380b251dc8a6ffe77fc5a68c640
SHA13d070ba400408e0e1581fd6126a0dd8bb0f0c50e
SHA256069d1bc7138708fb4b6b70d3acdca946ace6872899eeecb18a4c27baa76dc216
SHA512640ff14d5c1feb4464883fb3840e62c907ec37db70257752ac048fc73f3f0846d44879b7847e54887d40efa108795c9477e687615b280e4f9ab344c00e6eabb2
-
Filesize
72KB
MD51b17d380b251dc8a6ffe77fc5a68c640
SHA13d070ba400408e0e1581fd6126a0dd8bb0f0c50e
SHA256069d1bc7138708fb4b6b70d3acdca946ace6872899eeecb18a4c27baa76dc216
SHA512640ff14d5c1feb4464883fb3840e62c907ec37db70257752ac048fc73f3f0846d44879b7847e54887d40efa108795c9477e687615b280e4f9ab344c00e6eabb2
-
Filesize
72KB
MD517dd91620c97efebc2a21912f8aa4c52
SHA1d64b0cd1de778093bbf045b51196c39460d353b9
SHA2563ad24a3cc22eb9ca758c259267c95a0eea06cc6305f18481cf1697dba8fde792
SHA51248f874b5deb11a905e025a888abccfbaf219c3b8faf052760e5d8c0b7f14c5760fa6e6bdebe7c08a93d267f7f8a2bc29fe0b5aa7ffef1494f756639870c152f1
-
Filesize
72KB
MD517dd91620c97efebc2a21912f8aa4c52
SHA1d64b0cd1de778093bbf045b51196c39460d353b9
SHA2563ad24a3cc22eb9ca758c259267c95a0eea06cc6305f18481cf1697dba8fde792
SHA51248f874b5deb11a905e025a888abccfbaf219c3b8faf052760e5d8c0b7f14c5760fa6e6bdebe7c08a93d267f7f8a2bc29fe0b5aa7ffef1494f756639870c152f1
-
Filesize
72KB
MD5ec6d435fc47a0a7c28ec3d01a148d74b
SHA17dfff0cda028c4cc97b6d20d891c361a9379e0ee
SHA2564b26eea44dfd2cdb4105c44ea5c3d166973d1944345554322186388df6ce5e96
SHA5123ad92045b85b59ceca241b30a69660ec7caf15c5a25a11ce1c3c283205bb5b6c237aa1481ecc70351b6cfbd1c3862e6bac2df481b646893d55d9640027646493
-
Filesize
72KB
MD5ec6d435fc47a0a7c28ec3d01a148d74b
SHA17dfff0cda028c4cc97b6d20d891c361a9379e0ee
SHA2564b26eea44dfd2cdb4105c44ea5c3d166973d1944345554322186388df6ce5e96
SHA5123ad92045b85b59ceca241b30a69660ec7caf15c5a25a11ce1c3c283205bb5b6c237aa1481ecc70351b6cfbd1c3862e6bac2df481b646893d55d9640027646493
-
Filesize
72KB
MD54399c0bb8634267ff7dd3013ff00738e
SHA1f95483e379c50f75b6e155f704a2719fa3a1be3b
SHA2560b61c98be03340110d04c121eee5abe06853e100b44f1acce158aed84b6d83cd
SHA51279f6aaa7d2e191e0d923e80ad05dc4a3ea8e6a79ea1beea9e34f962f8c255a1620079966094d60890aa97735039f281bdb4dba992f96aed5424f5043d6aa5028
-
Filesize
72KB
MD54399c0bb8634267ff7dd3013ff00738e
SHA1f95483e379c50f75b6e155f704a2719fa3a1be3b
SHA2560b61c98be03340110d04c121eee5abe06853e100b44f1acce158aed84b6d83cd
SHA51279f6aaa7d2e191e0d923e80ad05dc4a3ea8e6a79ea1beea9e34f962f8c255a1620079966094d60890aa97735039f281bdb4dba992f96aed5424f5043d6aa5028
-
Filesize
72KB
MD52bff708522929624cfe559019a7fb857
SHA1d84d839b14c74f9d76d9f43ac97f124d501ecbc2
SHA2562313c44cffb2e6efa06821fa3465338fed3faa10a285618a77793b3c6c1bfc10
SHA51240cf7a794284767a84c7f3a460fb4b3ac9e7e0e07ea4051518057e609e5c2a307068609f0b15a14652a2f898e0b0050c2bc359a99f721a343e1e8bf29683ad21
-
Filesize
72KB
MD52bff708522929624cfe559019a7fb857
SHA1d84d839b14c74f9d76d9f43ac97f124d501ecbc2
SHA2562313c44cffb2e6efa06821fa3465338fed3faa10a285618a77793b3c6c1bfc10
SHA51240cf7a794284767a84c7f3a460fb4b3ac9e7e0e07ea4051518057e609e5c2a307068609f0b15a14652a2f898e0b0050c2bc359a99f721a343e1e8bf29683ad21
-
Filesize
72KB
MD5ec6d435fc47a0a7c28ec3d01a148d74b
SHA17dfff0cda028c4cc97b6d20d891c361a9379e0ee
SHA2564b26eea44dfd2cdb4105c44ea5c3d166973d1944345554322186388df6ce5e96
SHA5123ad92045b85b59ceca241b30a69660ec7caf15c5a25a11ce1c3c283205bb5b6c237aa1481ecc70351b6cfbd1c3862e6bac2df481b646893d55d9640027646493
-
Filesize
72KB
MD5ec6d435fc47a0a7c28ec3d01a148d74b
SHA17dfff0cda028c4cc97b6d20d891c361a9379e0ee
SHA2564b26eea44dfd2cdb4105c44ea5c3d166973d1944345554322186388df6ce5e96
SHA5123ad92045b85b59ceca241b30a69660ec7caf15c5a25a11ce1c3c283205bb5b6c237aa1481ecc70351b6cfbd1c3862e6bac2df481b646893d55d9640027646493
-
Filesize
72KB
MD52eba02fa69fa83aba30fbf18b5a176eb
SHA1d17f18bd53a9766851d29e5c67e2226f549c1f90
SHA256b8812509f7d93f16c1d673c14c9c9a135349561ede656ff2f68845c3e6bc3442
SHA512eaa56157cb5ea9d7cb3fd9a440dd6f841ef833fe65f4348ee69266f6a22ce1b0d9658a99ca0cb3bdce1375ce384cf2ea3b4449f273340c318595f9b47706a001
-
Filesize
72KB
MD52eba02fa69fa83aba30fbf18b5a176eb
SHA1d17f18bd53a9766851d29e5c67e2226f549c1f90
SHA256b8812509f7d93f16c1d673c14c9c9a135349561ede656ff2f68845c3e6bc3442
SHA512eaa56157cb5ea9d7cb3fd9a440dd6f841ef833fe65f4348ee69266f6a22ce1b0d9658a99ca0cb3bdce1375ce384cf2ea3b4449f273340c318595f9b47706a001
-
Filesize
72KB
MD5a7f81812f6014b3e338455093281e2c0
SHA1d1262d07bcd89de1b1c36a71ca969bc3faf64c0f
SHA256479788b109563043c9d8b3e19d828e62a25103192ee45a2560fdd80872020770
SHA512e6207f53033a5e09d1141dc3e7288165dd82b8970b8c9d7d495bb90310e70c36f28f0174bff470bf5336d83e2e99e49dc321f139c3d95ea19f04aaf9a57f0b71
-
Filesize
72KB
MD5a7f81812f6014b3e338455093281e2c0
SHA1d1262d07bcd89de1b1c36a71ca969bc3faf64c0f
SHA256479788b109563043c9d8b3e19d828e62a25103192ee45a2560fdd80872020770
SHA512e6207f53033a5e09d1141dc3e7288165dd82b8970b8c9d7d495bb90310e70c36f28f0174bff470bf5336d83e2e99e49dc321f139c3d95ea19f04aaf9a57f0b71
-
Filesize
72KB
MD52eba02fa69fa83aba30fbf18b5a176eb
SHA1d17f18bd53a9766851d29e5c67e2226f549c1f90
SHA256b8812509f7d93f16c1d673c14c9c9a135349561ede656ff2f68845c3e6bc3442
SHA512eaa56157cb5ea9d7cb3fd9a440dd6f841ef833fe65f4348ee69266f6a22ce1b0d9658a99ca0cb3bdce1375ce384cf2ea3b4449f273340c318595f9b47706a001
-
Filesize
72KB
MD52eba02fa69fa83aba30fbf18b5a176eb
SHA1d17f18bd53a9766851d29e5c67e2226f549c1f90
SHA256b8812509f7d93f16c1d673c14c9c9a135349561ede656ff2f68845c3e6bc3442
SHA512eaa56157cb5ea9d7cb3fd9a440dd6f841ef833fe65f4348ee69266f6a22ce1b0d9658a99ca0cb3bdce1375ce384cf2ea3b4449f273340c318595f9b47706a001
-
Filesize
72KB
MD52eba02fa69fa83aba30fbf18b5a176eb
SHA1d17f18bd53a9766851d29e5c67e2226f549c1f90
SHA256b8812509f7d93f16c1d673c14c9c9a135349561ede656ff2f68845c3e6bc3442
SHA512eaa56157cb5ea9d7cb3fd9a440dd6f841ef833fe65f4348ee69266f6a22ce1b0d9658a99ca0cb3bdce1375ce384cf2ea3b4449f273340c318595f9b47706a001
-
Filesize
72KB
MD52eba02fa69fa83aba30fbf18b5a176eb
SHA1d17f18bd53a9766851d29e5c67e2226f549c1f90
SHA256b8812509f7d93f16c1d673c14c9c9a135349561ede656ff2f68845c3e6bc3442
SHA512eaa56157cb5ea9d7cb3fd9a440dd6f841ef833fe65f4348ee69266f6a22ce1b0d9658a99ca0cb3bdce1375ce384cf2ea3b4449f273340c318595f9b47706a001
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD59dda7aa4a16c06014f7e212967469fde
SHA1708f614f324a62624ad40d55d90665c0c12bd3fd
SHA25611bd59b4a142d889ebf13a66cd81445d2a15cc7b98cb2ef814d4ac5e87970ae5
SHA5129b0c01d584000ae48654ca99174d6176df1d21986254014ab378f11e79d4d52a54dda6c0146decde0077d29c1a32bcb22ff294526185f5f0ad800f8efb68d1de
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5e7bab17c17606df51aa40c78f48dfd73
SHA1886c398c370d5bc51c8f16c02b357215c450032f
SHA2567eca73abcd92d170eeaa7155bf4bd216c0518a3ef376b5a2f4a3373727c77c9d
SHA5125822e60454e283542692303af2448f0b4244af78e58fe433aff8c88cb67cf7bef7269ffe9e799188b8f7f85ce64dc7b2c7f92cf9600edcba034ade6f63db53c6
-
Filesize
72KB
MD5b915e7092a226ad7409f19d4da1d2299
SHA182dcb5da7690d34f7d3ec7fef0fc35243ad4ea2b
SHA25661873137d334738762acdc56039ee9d595ef78719db8cbcadb0bfdf978970413
SHA512c5ff13ef6c658dbfc07df08c5de86ddbeb7cb916131a617789c9ccc4037bd7c671bf4638e68239ea0c2a4730fa96faad56417432a91cd3cee05cd4a59a56c3aa
-
Filesize
72KB
MD5b915e7092a226ad7409f19d4da1d2299
SHA182dcb5da7690d34f7d3ec7fef0fc35243ad4ea2b
SHA25661873137d334738762acdc56039ee9d595ef78719db8cbcadb0bfdf978970413
SHA512c5ff13ef6c658dbfc07df08c5de86ddbeb7cb916131a617789c9ccc4037bd7c671bf4638e68239ea0c2a4730fa96faad56417432a91cd3cee05cd4a59a56c3aa
-
Filesize
72KB
MD5b54b5fa7c8cfc04c67dcc52b083bc268
SHA1fcb9341f75cd601d4ef25d313365f6e82889a0a5
SHA256f691db173e0ff598f9dabb56f777ed5a94da8a3cd6a9cc6b9f9ce966016a9aee
SHA51266a6dfa9c3beae23eb467bbc8edcacc14b20b264223313ff7c6c595789ef5c0899021c18ddfbcb148662cb8b89d88dd82dcacdd1eb90268c5ccbbc55d56df198
-
Filesize
72KB
MD5b54b5fa7c8cfc04c67dcc52b083bc268
SHA1fcb9341f75cd601d4ef25d313365f6e82889a0a5
SHA256f691db173e0ff598f9dabb56f777ed5a94da8a3cd6a9cc6b9f9ce966016a9aee
SHA51266a6dfa9c3beae23eb467bbc8edcacc14b20b264223313ff7c6c595789ef5c0899021c18ddfbcb148662cb8b89d88dd82dcacdd1eb90268c5ccbbc55d56df198
-
Filesize
72KB
MD5a8cdaa94920aa81d0b384efe60295d89
SHA101d8e578b299503f8547c5a2fc282767befa919a
SHA256397fc2f716d588342a53c42b67f0c2fc5efe8b249f5fcb0d56848a03c1f7af95
SHA512c27bf5412f4ea367738407a5653fb57d1c82c49f524bdde7e966d3ade205c2c37fac207a52153a947d36889d2bce759a51737100b2aa004cbe3dba810e670972
-
Filesize
72KB
MD5a8cdaa94920aa81d0b384efe60295d89
SHA101d8e578b299503f8547c5a2fc282767befa919a
SHA256397fc2f716d588342a53c42b67f0c2fc5efe8b249f5fcb0d56848a03c1f7af95
SHA512c27bf5412f4ea367738407a5653fb57d1c82c49f524bdde7e966d3ade205c2c37fac207a52153a947d36889d2bce759a51737100b2aa004cbe3dba810e670972
-
Filesize
72KB
MD566da3d4d14dad307dc6357f31f0c0c38
SHA1a629b73cb2d287a6e78b1336ff2685d337777583
SHA2568812a924486ecbfd5023e4e63c77f5213177b3c6245f44e3cb6bd2f28e7ad0f6
SHA512d780b500be72777047515edc4ed0d2dc672fe78717bdcb3cfd89f97483f81392b851e48ae5bf0e165ee5a3cea38262d2c09904753ecca1188bcbec68a5dd5a9f
-
Filesize
72KB
MD566da3d4d14dad307dc6357f31f0c0c38
SHA1a629b73cb2d287a6e78b1336ff2685d337777583
SHA2568812a924486ecbfd5023e4e63c77f5213177b3c6245f44e3cb6bd2f28e7ad0f6
SHA512d780b500be72777047515edc4ed0d2dc672fe78717bdcb3cfd89f97483f81392b851e48ae5bf0e165ee5a3cea38262d2c09904753ecca1188bcbec68a5dd5a9f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD566da3d4d14dad307dc6357f31f0c0c38
SHA1a629b73cb2d287a6e78b1336ff2685d337777583
SHA2568812a924486ecbfd5023e4e63c77f5213177b3c6245f44e3cb6bd2f28e7ad0f6
SHA512d780b500be72777047515edc4ed0d2dc672fe78717bdcb3cfd89f97483f81392b851e48ae5bf0e165ee5a3cea38262d2c09904753ecca1188bcbec68a5dd5a9f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD566da3d4d14dad307dc6357f31f0c0c38
SHA1a629b73cb2d287a6e78b1336ff2685d337777583
SHA2568812a924486ecbfd5023e4e63c77f5213177b3c6245f44e3cb6bd2f28e7ad0f6
SHA512d780b500be72777047515edc4ed0d2dc672fe78717bdcb3cfd89f97483f81392b851e48ae5bf0e165ee5a3cea38262d2c09904753ecca1188bcbec68a5dd5a9f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD566da3d4d14dad307dc6357f31f0c0c38
SHA1a629b73cb2d287a6e78b1336ff2685d337777583
SHA2568812a924486ecbfd5023e4e63c77f5213177b3c6245f44e3cb6bd2f28e7ad0f6
SHA512d780b500be72777047515edc4ed0d2dc672fe78717bdcb3cfd89f97483f81392b851e48ae5bf0e165ee5a3cea38262d2c09904753ecca1188bcbec68a5dd5a9f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD566da3d4d14dad307dc6357f31f0c0c38
SHA1a629b73cb2d287a6e78b1336ff2685d337777583
SHA2568812a924486ecbfd5023e4e63c77f5213177b3c6245f44e3cb6bd2f28e7ad0f6
SHA512d780b500be72777047515edc4ed0d2dc672fe78717bdcb3cfd89f97483f81392b851e48ae5bf0e165ee5a3cea38262d2c09904753ecca1188bcbec68a5dd5a9f
-
Filesize
72KB
MD5a8cdaa94920aa81d0b384efe60295d89
SHA101d8e578b299503f8547c5a2fc282767befa919a
SHA256397fc2f716d588342a53c42b67f0c2fc5efe8b249f5fcb0d56848a03c1f7af95
SHA512c27bf5412f4ea367738407a5653fb57d1c82c49f524bdde7e966d3ade205c2c37fac207a52153a947d36889d2bce759a51737100b2aa004cbe3dba810e670972
-
Filesize
72KB
MD5a8cdaa94920aa81d0b384efe60295d89
SHA101d8e578b299503f8547c5a2fc282767befa919a
SHA256397fc2f716d588342a53c42b67f0c2fc5efe8b249f5fcb0d56848a03c1f7af95
SHA512c27bf5412f4ea367738407a5653fb57d1c82c49f524bdde7e966d3ade205c2c37fac207a52153a947d36889d2bce759a51737100b2aa004cbe3dba810e670972
-
Filesize
72KB
MD5a8cdaa94920aa81d0b384efe60295d89
SHA101d8e578b299503f8547c5a2fc282767befa919a
SHA256397fc2f716d588342a53c42b67f0c2fc5efe8b249f5fcb0d56848a03c1f7af95
SHA512c27bf5412f4ea367738407a5653fb57d1c82c49f524bdde7e966d3ade205c2c37fac207a52153a947d36889d2bce759a51737100b2aa004cbe3dba810e670972
-
Filesize
72KB
MD5a8cdaa94920aa81d0b384efe60295d89
SHA101d8e578b299503f8547c5a2fc282767befa919a
SHA256397fc2f716d588342a53c42b67f0c2fc5efe8b249f5fcb0d56848a03c1f7af95
SHA512c27bf5412f4ea367738407a5653fb57d1c82c49f524bdde7e966d3ade205c2c37fac207a52153a947d36889d2bce759a51737100b2aa004cbe3dba810e670972
-
Filesize
72KB
MD534f4c066c92e9af183f17a0ba9de0baa
SHA1cc8f0ec03b603e6a22436d1cc6c14732912dbc4b
SHA25681fc8221ea5b966f431e52a1a148384a8908f6788cfc03fb652ba2e5e3cbfe17
SHA51225a0f719b21ed5a5a8d84f05678a5c55b6d4c918b5bad63c6d8a8ff104ca0f9be0e49dee1e5aeb09e4266cc14a94d8dc1d91da496b6af88bb956197ffee71203
-
Filesize
72KB
MD534f4c066c92e9af183f17a0ba9de0baa
SHA1cc8f0ec03b603e6a22436d1cc6c14732912dbc4b
SHA25681fc8221ea5b966f431e52a1a148384a8908f6788cfc03fb652ba2e5e3cbfe17
SHA51225a0f719b21ed5a5a8d84f05678a5c55b6d4c918b5bad63c6d8a8ff104ca0f9be0e49dee1e5aeb09e4266cc14a94d8dc1d91da496b6af88bb956197ffee71203
-
Filesize
72KB
MD5992608e8d3fbfdf33a08373c715e2662
SHA19db078c4d2bf05b16e891a7587e557229a726370
SHA256a45decb3308f5ce25195e41d1897ca76c71eb64afac52a0896bc933b71e200aa
SHA512045315c82fa14ca7f5e1afb993e8a795fd2a0e3a397d0536d0c41bf114c57074bb0ff1672be4e3ce5351c3dce686bb8eb4439a16b8b7964ee3bac62259144cd1
-
Filesize
72KB
MD5992608e8d3fbfdf33a08373c715e2662
SHA19db078c4d2bf05b16e891a7587e557229a726370
SHA256a45decb3308f5ce25195e41d1897ca76c71eb64afac52a0896bc933b71e200aa
SHA512045315c82fa14ca7f5e1afb993e8a795fd2a0e3a397d0536d0c41bf114c57074bb0ff1672be4e3ce5351c3dce686bb8eb4439a16b8b7964ee3bac62259144cd1
-
Filesize
72KB
MD5719fc87f8076912d1fb099789b9c5101
SHA1186d33a0d7c8497262d5c0026f4c8a14196dd03f
SHA256ed3430ad4254acb0073e166e65f0f4a9ade85de2129c2e44a2ca000ecb0ba55f
SHA5126b438da927b55d1af2e57a99ebdd4fe2b0c43d17246a470c0662bc027b99c0f44f37d9aba462a939a30a618df48d95802707381a54f732495170e2a98eee2f5c
-
Filesize
72KB
MD5719fc87f8076912d1fb099789b9c5101
SHA1186d33a0d7c8497262d5c0026f4c8a14196dd03f
SHA256ed3430ad4254acb0073e166e65f0f4a9ade85de2129c2e44a2ca000ecb0ba55f
SHA5126b438da927b55d1af2e57a99ebdd4fe2b0c43d17246a470c0662bc027b99c0f44f37d9aba462a939a30a618df48d95802707381a54f732495170e2a98eee2f5c