Analysis
-
max time kernel
183s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe
Resource
win10v2004-20221111-en
General
-
Target
3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe
-
Size
72KB
-
MD5
0885b006b12b79488bf49cb0ffbcd227
-
SHA1
b54b5c12237493c57f7605fc4bbd66073996f3f2
-
SHA256
3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7
-
SHA512
8fc6e072d6e1eda02f4e2830db918fe2ed198b0b578aa23d011c17e838c908d158a7928465a8ba78a28a3f5ba8dc60200d30b3c5f0d6b8facfd9443abd11786c
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2K:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 5044 backup.exe 4800 backup.exe 3228 backup.exe 3336 backup.exe 1004 backup.exe 4416 backup.exe 840 backup.exe 4796 backup.exe 956 backup.exe 3184 backup.exe 4276 update.exe 1768 backup.exe 4120 backup.exe 3020 backup.exe 2208 backup.exe 4652 backup.exe 1648 backup.exe 1260 backup.exe 3748 backup.exe 2360 backup.exe 3272 backup.exe 2200 backup.exe 1924 backup.exe 792 backup.exe 4160 backup.exe 4788 backup.exe 4156 backup.exe 2276 backup.exe 3708 backup.exe 3144 backup.exe 376 backup.exe 3128 data.exe 2680 backup.exe 4024 backup.exe 4292 backup.exe 3796 backup.exe 3156 backup.exe 1844 backup.exe 3368 backup.exe 3044 update.exe 1996 backup.exe 3764 backup.exe 4980 backup.exe 856 backup.exe 4472 backup.exe 2880 backup.exe 1936 backup.exe 3396 update.exe 4724 update.exe 4936 backup.exe 3636 backup.exe 2208 backup.exe 3844 backup.exe 1648 backup.exe 4764 backup.exe 1740 backup.exe 2328 backup.exe 3680 backup.exe 4400 backup.exe 1156 backup.exe 1104 backup.exe 868 backup.exe 3752 backup.exe 4160 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe update.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\System Restore.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\backup.exe backup.exe File opened for modification C:\Program Files\update.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe update.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\update.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe update.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\Programs\backup.exe backup.exe File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 5044 backup.exe 4800 backup.exe 3228 backup.exe 3336 backup.exe 1004 backup.exe 840 backup.exe 4416 backup.exe 4796 backup.exe 956 backup.exe 3184 backup.exe 4276 update.exe 1768 backup.exe 4120 backup.exe 3020 backup.exe 2208 backup.exe 4652 backup.exe 1648 backup.exe 1260 backup.exe 3748 backup.exe 2360 backup.exe 3272 backup.exe 2200 backup.exe 1924 backup.exe 792 backup.exe 4160 backup.exe 4788 backup.exe 4156 backup.exe 2276 backup.exe 3708 backup.exe 3144 backup.exe 376 backup.exe 3128 data.exe 2680 backup.exe 4292 backup.exe 4024 backup.exe 3796 backup.exe 3156 backup.exe 3368 backup.exe 1844 backup.exe 3044 update.exe 1996 backup.exe 856 backup.exe 4980 backup.exe 4472 backup.exe 3764 backup.exe 1936 backup.exe 2880 backup.exe 3396 update.exe 4724 update.exe 4936 backup.exe 3636 backup.exe 2208 backup.exe 4764 backup.exe 3844 backup.exe 1648 backup.exe 1740 backup.exe 2328 backup.exe 3680 backup.exe 4400 backup.exe 1104 backup.exe 1156 backup.exe 868 backup.exe 3752 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 5044 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 83 PID 1728 wrote to memory of 5044 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 83 PID 1728 wrote to memory of 5044 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 83 PID 1728 wrote to memory of 4800 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 84 PID 1728 wrote to memory of 4800 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 84 PID 1728 wrote to memory of 4800 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 84 PID 1728 wrote to memory of 3228 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 85 PID 1728 wrote to memory of 3228 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 85 PID 1728 wrote to memory of 3228 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 85 PID 1728 wrote to memory of 3336 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 86 PID 1728 wrote to memory of 3336 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 86 PID 1728 wrote to memory of 3336 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 86 PID 1728 wrote to memory of 1004 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 87 PID 1728 wrote to memory of 1004 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 87 PID 1728 wrote to memory of 1004 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 87 PID 5044 wrote to memory of 4416 5044 backup.exe 88 PID 5044 wrote to memory of 4416 5044 backup.exe 88 PID 5044 wrote to memory of 4416 5044 backup.exe 88 PID 1728 wrote to memory of 840 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 89 PID 1728 wrote to memory of 840 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 89 PID 1728 wrote to memory of 840 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 89 PID 1728 wrote to memory of 4796 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 90 PID 1728 wrote to memory of 4796 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 90 PID 1728 wrote to memory of 4796 1728 3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe 90 PID 4416 wrote to memory of 956 4416 backup.exe 91 PID 4416 wrote to memory of 956 4416 backup.exe 91 PID 4416 wrote to memory of 956 4416 backup.exe 91 PID 4416 wrote to memory of 3184 4416 backup.exe 92 PID 4416 wrote to memory of 3184 4416 backup.exe 92 PID 4416 wrote to memory of 3184 4416 backup.exe 92 PID 4416 wrote to memory of 4276 4416 backup.exe 94 PID 4416 wrote to memory of 4276 4416 backup.exe 94 PID 4416 wrote to memory of 4276 4416 backup.exe 94 PID 4276 wrote to memory of 1768 4276 update.exe 95 PID 4276 wrote to memory of 1768 4276 update.exe 95 PID 4276 wrote to memory of 1768 4276 update.exe 95 PID 1768 wrote to memory of 4120 1768 backup.exe 96 PID 1768 wrote to memory of 4120 1768 backup.exe 96 PID 1768 wrote to memory of 4120 1768 backup.exe 96 PID 4276 wrote to memory of 3020 4276 update.exe 97 PID 4276 wrote to memory of 3020 4276 update.exe 97 PID 4276 wrote to memory of 3020 4276 update.exe 97 PID 3020 wrote to memory of 2208 3020 backup.exe 98 PID 3020 wrote to memory of 2208 3020 backup.exe 98 PID 3020 wrote to memory of 2208 3020 backup.exe 98 PID 3020 wrote to memory of 4652 3020 backup.exe 99 PID 3020 wrote to memory of 4652 3020 backup.exe 99 PID 3020 wrote to memory of 4652 3020 backup.exe 99 PID 4652 wrote to memory of 1648 4652 backup.exe 100 PID 4652 wrote to memory of 1648 4652 backup.exe 100 PID 4652 wrote to memory of 1648 4652 backup.exe 100 PID 4652 wrote to memory of 1260 4652 backup.exe 101 PID 4652 wrote to memory of 1260 4652 backup.exe 101 PID 4652 wrote to memory of 1260 4652 backup.exe 101 PID 1260 wrote to memory of 3748 1260 backup.exe 102 PID 1260 wrote to memory of 3748 1260 backup.exe 102 PID 1260 wrote to memory of 3748 1260 backup.exe 102 PID 1260 wrote to memory of 2360 1260 backup.exe 103 PID 1260 wrote to memory of 2360 1260 backup.exe 103 PID 1260 wrote to memory of 2360 1260 backup.exe 103 PID 1260 wrote to memory of 3272 1260 backup.exe 104 PID 1260 wrote to memory of 3272 1260 backup.exe 104 PID 1260 wrote to memory of 3272 1260 backup.exe 104 PID 1260 wrote to memory of 2200 1260 backup.exe 105 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe"C:\Users\Admin\AppData\Local\Temp\3b07f8487b99a5ccd79b4be7336c2f49c340fedab5a4bfa6a40072063e2d44e7.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\2499908060\backup.exeC:\Users\Admin\AppData\Local\Temp\2499908060\backup.exe C:\Users\Admin\AppData\Local\Temp\2499908060\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\backup.exe\backup.exe \3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3184
-
-
C:\Program Files\update.exe"C:\Program Files\update.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4276 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1768 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4120
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3020 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4652 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1260 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3748
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2360
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3272
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4160
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4788
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:376
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2680
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4764
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1156
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Drops file in Program Files directory
- System policy modification
PID:3500 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵PID:1132
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4260
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
PID:316
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵
- Disables RegEdit via registry modification
PID:4696
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵
- Disables RegEdit via registry modification
PID:4864
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4732
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\9⤵
- System policy modification
PID:4128
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\9⤵PID:3988
-
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2276 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\update.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\update.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3636
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵PID:372
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:2180
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:3080
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4292 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3764
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4936
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:868
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\data.exe"C:\Program Files\Common Files\microsoft shared\TextConv\data.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵PID:4944
-
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- System policy modification
PID:4928
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3456 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4356
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵PID:1992
-
-
C:\Program Files\Common Files\microsoft shared\VGX\backup.exe"C:\Program Files\Common Files\microsoft shared\VGX\backup.exe" C:\Program Files\Common Files\microsoft shared\VGX\7⤵PID:2184
-
-
C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:844 -
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\8⤵
- Disables RegEdit via registry modification
PID:2244 -
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2008
-
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3144
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3156 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4980 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3844
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3752
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3448
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- System policy modification
PID:4776
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Disables RegEdit via registry modification
PID:2056
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1624
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:932
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2596
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:2180
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- System policy modification
PID:4848
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:4716
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3708 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Program Files\Google\Chrome\Application\update.exe"C:\Program Files\Google\Chrome\Application\update.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3396 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3680 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4484
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
PID:4352
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- System policy modification
PID:984
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Disables RegEdit via registry modification
PID:1480
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
PID:3412
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1988
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4828 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1076 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵PID:5076
-
-
-
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4024 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1844
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:3064
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
PID:4032
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- System policy modification
PID:1916
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Disables RegEdit via registry modification
PID:2932
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵
- Disables RegEdit via registry modification
PID:2844
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Drops file in Program Files directory
PID:3692 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Drops file in Program Files directory
PID:1096 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Disables RegEdit via registry modification
PID:2252
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1068 -
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵
- Disables RegEdit via registry modification
PID:2188
-
-
C:\Program Files\Java\jdk1.8.0_66\db\lib\System Restore.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\System Restore.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3720
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵PID:4088
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4156 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3796 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4472 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4724
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:4160 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3296 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵PID:1908
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2020 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- System policy modification
PID:1224
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Disables RegEdit via registry modification
PID:3068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1320
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:2440 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵PID:224
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵PID:4832
-
-
-
-
-
C:\Program Files (x86)\Common Files\data.exe"C:\Program Files (x86)\Common Files\data.exe" C:\Program Files (x86)\Common Files\5⤵PID:3700
-
-
-
C:\Users\data.exeC:\Users\data.exe C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3128 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1648
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1104
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- System policy modification
PID:2440
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4580
-
-
C:\Users\Admin\Favorites\update.exeC:\Users\Admin\Favorites\update.exe C:\Users\Admin\Favorites\6⤵PID:2732
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3672
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- System policy modification
PID:1196
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:544
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:508
-
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3276
-
-
C:\Users\Admin\Pictures\Saved Pictures\backup.exe"C:\Users\Admin\Pictures\Saved Pictures\backup.exe" C:\Users\Admin\Pictures\Saved Pictures\7⤵
- Modifies visibility of file extensions in Explorer
PID:1032
-
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵
- Modifies visibility of file extensions in Explorer
PID:2276
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵PID:2668
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:540 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Disables RegEdit via registry modification
PID:3112
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:4320 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:5036 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3384
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵PID:4684
-
-
C:\Windows\appcompat\Programs\backup.exeC:\Windows\appcompat\Programs\backup.exe C:\Windows\appcompat\Programs\6⤵PID:4292
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5cd8df20861338a9edbcb55621fdb4afc
SHA1037c9c0b9fe45bab2c74d197eae48634d8346a15
SHA256777eff04f0ae699d3bff38c7a78457c52d7a5a8069ccd73da6351a0bbd613309
SHA5127596e98ca294f59c09d3255994c2be9d8035a1c18edd17fd61de1198d862bfcfb39ed6b9da22a03a69f3cfa43d65928aca58ea3b0f92785b95eda919126ef272
-
Filesize
72KB
MD5cd8df20861338a9edbcb55621fdb4afc
SHA1037c9c0b9fe45bab2c74d197eae48634d8346a15
SHA256777eff04f0ae699d3bff38c7a78457c52d7a5a8069ccd73da6351a0bbd613309
SHA5127596e98ca294f59c09d3255994c2be9d8035a1c18edd17fd61de1198d862bfcfb39ed6b9da22a03a69f3cfa43d65928aca58ea3b0f92785b95eda919126ef272
-
Filesize
72KB
MD57131c58b9194fd9853b2d7168ec3a7d1
SHA194692c416fe0015e662cb48a6827c9c85270cd4c
SHA256757e6313df214cb149aca859ec784a882df2d68fc367c5ae64215a1e2891cb7a
SHA51200c77cf463a4f5dc168939c070ae7700de9ea0235d575088eb35a879d0b4c17e1a6fd91ed72ecc9d08ae4cf86e2dded6b8a10f8be1d054a66d15aa569eb854bc
-
Filesize
72KB
MD57131c58b9194fd9853b2d7168ec3a7d1
SHA194692c416fe0015e662cb48a6827c9c85270cd4c
SHA256757e6313df214cb149aca859ec784a882df2d68fc367c5ae64215a1e2891cb7a
SHA51200c77cf463a4f5dc168939c070ae7700de9ea0235d575088eb35a879d0b4c17e1a6fd91ed72ecc9d08ae4cf86e2dded6b8a10f8be1d054a66d15aa569eb854bc
-
Filesize
72KB
MD5a9fb5b38a099d8df992d67128c6690c0
SHA1fd90887410e6085f98179ab64efc83857585b934
SHA256e3804d295ef6656dd82a5b395b7cea2413bc80642a79e94a170a2832979c3a08
SHA51270956c258a6091f7e0e8dc7c9bbb34129655a42b08747a765cb282b6bdf392b394218ee04b0ee754e542ace035543f95463a4366e101b56439a84cf6d09fbd8e
-
Filesize
72KB
MD5a9fb5b38a099d8df992d67128c6690c0
SHA1fd90887410e6085f98179ab64efc83857585b934
SHA256e3804d295ef6656dd82a5b395b7cea2413bc80642a79e94a170a2832979c3a08
SHA51270956c258a6091f7e0e8dc7c9bbb34129655a42b08747a765cb282b6bdf392b394218ee04b0ee754e542ace035543f95463a4366e101b56439a84cf6d09fbd8e
-
Filesize
72KB
MD50e8d2624660a9e001516182c351230ba
SHA1f77ebb4886ad4fd604d92678199f5fdd4300d5d6
SHA256f1df891f1c5730f8dec647ec78a6670cff2016d654ca096af46f63256e183081
SHA5129189bbefe044ac952cb7d69d9748482329fb07d04ac90dd6b967dff059e2b4c31be718b033926d82ad325a729e73d411e6345549f1b564f82ad5279ae88bee30
-
Filesize
72KB
MD50e8d2624660a9e001516182c351230ba
SHA1f77ebb4886ad4fd604d92678199f5fdd4300d5d6
SHA256f1df891f1c5730f8dec647ec78a6670cff2016d654ca096af46f63256e183081
SHA5129189bbefe044ac952cb7d69d9748482329fb07d04ac90dd6b967dff059e2b4c31be718b033926d82ad325a729e73d411e6345549f1b564f82ad5279ae88bee30
-
Filesize
72KB
MD53bc1e934773e40f0b5508198501abac8
SHA101080fb2b266b2adac50a287b34cdd085bec91fd
SHA256d53074ce43b52625e2d6589d3cb455734a39fa5d120f33d2d2ef07933666b8f9
SHA512bc317a878287d38a06c5bc48cdb31ad80b91b648da3b55e72831d762f61f1ff4d1401f67240011d90b309d9b63c88c7b095c4a8136d92a0ad7e0c615d596ee6b
-
Filesize
72KB
MD53bc1e934773e40f0b5508198501abac8
SHA101080fb2b266b2adac50a287b34cdd085bec91fd
SHA256d53074ce43b52625e2d6589d3cb455734a39fa5d120f33d2d2ef07933666b8f9
SHA512bc317a878287d38a06c5bc48cdb31ad80b91b648da3b55e72831d762f61f1ff4d1401f67240011d90b309d9b63c88c7b095c4a8136d92a0ad7e0c615d596ee6b
-
Filesize
72KB
MD55575077d15672cd7df6bc363d7dc7ce1
SHA1a9580419b7720e47a1d8c810c2c9f86ae9856848
SHA2569d1ae548ac9bc347b66bb8a5a73d2a1dcc61c8418f007a3caca371c901c4b6d7
SHA5126349f019bac3e1310e1eee2e7bab7ebeb887c253adb6a5026fa9d0dd3d23471d78dfb4272d7d9b6168b47d0972785350aa609a6acd18b6230865faec00e2fb8d
-
Filesize
72KB
MD55575077d15672cd7df6bc363d7dc7ce1
SHA1a9580419b7720e47a1d8c810c2c9f86ae9856848
SHA2569d1ae548ac9bc347b66bb8a5a73d2a1dcc61c8418f007a3caca371c901c4b6d7
SHA5126349f019bac3e1310e1eee2e7bab7ebeb887c253adb6a5026fa9d0dd3d23471d78dfb4272d7d9b6168b47d0972785350aa609a6acd18b6230865faec00e2fb8d
-
Filesize
72KB
MD5e63ee1752cdb4da94d307ef25fbf12c0
SHA1f2d2cfbad3976cac777755e9aaa570e1ae3a88ae
SHA256ccd38c5fa871e0cfe1799cfb8f891a22be5f724eb7b369f54a3b824db2c10d07
SHA512074d7273eaa83e07e76fea73905f4457a7bdc889e1ffa721d8e722a5db1662577916935fa8e3dd08e93b7aa9c007d158892b6e48d73ff485b36644951a245c12
-
Filesize
72KB
MD5e63ee1752cdb4da94d307ef25fbf12c0
SHA1f2d2cfbad3976cac777755e9aaa570e1ae3a88ae
SHA256ccd38c5fa871e0cfe1799cfb8f891a22be5f724eb7b369f54a3b824db2c10d07
SHA512074d7273eaa83e07e76fea73905f4457a7bdc889e1ffa721d8e722a5db1662577916935fa8e3dd08e93b7aa9c007d158892b6e48d73ff485b36644951a245c12
-
Filesize
72KB
MD51f31ec62b788ada385d434ee35acd91b
SHA12a8140800fa7a4731f2ef052529354c918d65d5f
SHA2562b5e82effcaedbd6afb0e53f5c8ca0abf7cc0fef6dea1d8ab239789aff1586aa
SHA512948d1d18b5a1093070413b83f7b030292c049317a968216d1b208545cd7b77a8668d3ff56628ab742a21c390b37025536d7ac24c2dddf2a7efd590777a734f22
-
Filesize
72KB
MD51f31ec62b788ada385d434ee35acd91b
SHA12a8140800fa7a4731f2ef052529354c918d65d5f
SHA2562b5e82effcaedbd6afb0e53f5c8ca0abf7cc0fef6dea1d8ab239789aff1586aa
SHA512948d1d18b5a1093070413b83f7b030292c049317a968216d1b208545cd7b77a8668d3ff56628ab742a21c390b37025536d7ac24c2dddf2a7efd590777a734f22
-
Filesize
72KB
MD5fd08804ce02de0cdec118f0ffa2e3264
SHA14175e3bdf13d4bb8da866513cc035243bc19b449
SHA256b41ab3c260f3a2df1d03e7de98270e32040b6437d58fecc3ae3c49316eaf2257
SHA512da6b129c3dbc25659da0efcccea9d69c5036e9f53efd455ca537fe0bbad5bc96de4e57cf2efc40714211cdca54f4143e3c11975d6a6287b94068d5e4eed94cd6
-
Filesize
72KB
MD5fd08804ce02de0cdec118f0ffa2e3264
SHA14175e3bdf13d4bb8da866513cc035243bc19b449
SHA256b41ab3c260f3a2df1d03e7de98270e32040b6437d58fecc3ae3c49316eaf2257
SHA512da6b129c3dbc25659da0efcccea9d69c5036e9f53efd455ca537fe0bbad5bc96de4e57cf2efc40714211cdca54f4143e3c11975d6a6287b94068d5e4eed94cd6
-
Filesize
72KB
MD53bc1e934773e40f0b5508198501abac8
SHA101080fb2b266b2adac50a287b34cdd085bec91fd
SHA256d53074ce43b52625e2d6589d3cb455734a39fa5d120f33d2d2ef07933666b8f9
SHA512bc317a878287d38a06c5bc48cdb31ad80b91b648da3b55e72831d762f61f1ff4d1401f67240011d90b309d9b63c88c7b095c4a8136d92a0ad7e0c615d596ee6b
-
Filesize
72KB
MD53bc1e934773e40f0b5508198501abac8
SHA101080fb2b266b2adac50a287b34cdd085bec91fd
SHA256d53074ce43b52625e2d6589d3cb455734a39fa5d120f33d2d2ef07933666b8f9
SHA512bc317a878287d38a06c5bc48cdb31ad80b91b648da3b55e72831d762f61f1ff4d1401f67240011d90b309d9b63c88c7b095c4a8136d92a0ad7e0c615d596ee6b
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD51f31ec62b788ada385d434ee35acd91b
SHA12a8140800fa7a4731f2ef052529354c918d65d5f
SHA2562b5e82effcaedbd6afb0e53f5c8ca0abf7cc0fef6dea1d8ab239789aff1586aa
SHA512948d1d18b5a1093070413b83f7b030292c049317a968216d1b208545cd7b77a8668d3ff56628ab742a21c390b37025536d7ac24c2dddf2a7efd590777a734f22
-
Filesize
72KB
MD51f31ec62b788ada385d434ee35acd91b
SHA12a8140800fa7a4731f2ef052529354c918d65d5f
SHA2562b5e82effcaedbd6afb0e53f5c8ca0abf7cc0fef6dea1d8ab239789aff1586aa
SHA512948d1d18b5a1093070413b83f7b030292c049317a968216d1b208545cd7b77a8668d3ff56628ab742a21c390b37025536d7ac24c2dddf2a7efd590777a734f22
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD524fabd73e6035f3549a5b8352a5757d4
SHA1c683ee83e563a3fdee14b402169c695f67f1b844
SHA256bec1e1c59443979fa80e2ffe0791cac6e41789f5e5393927d465f131481a5c54
SHA51218d0b5d93945851dcf9fae4c70691e08246ec1eafe579bf06c6da26cff6b849c06c4a54526d0681bf2b37ba4a8bfb566a0e650d25987fcd2de0f42888dad9480
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD531e22cdcb08d4822199c9bbb9f1def9a
SHA1b5a2cb6471e810ddfee8e113831b1f56b42b339a
SHA256d07feb8aaba57eaece24fd11af3c36553a4e8999c807eb1e1aa1f04716c13a4c
SHA512ab6d4cd5b23c4b7c597ee4085b9c66f9746a14b76d417c7bf24c8d36b5684e8f5b4f982fdba41b816ef1f7a26a9cd42a3ab0f8aeed6a964f538cc7859698c88c
-
Filesize
72KB
MD599afa225233f6dc68a59fef980b56810
SHA1344e400246f7f352feb472ee48a5e744191f6c41
SHA256bec7ec3aef9580e23f4580c9a828328a60c9d058447b2a2b503fc79f6afb58d9
SHA512bdb60675bac6f23fdfd865d78a6e3998575893b42073ad0d37ee9f2b961d788e60ebba45ebb9f515674f6c384c3e20544362a92ca3a3609f13235b3111465cfb
-
Filesize
72KB
MD599afa225233f6dc68a59fef980b56810
SHA1344e400246f7f352feb472ee48a5e744191f6c41
SHA256bec7ec3aef9580e23f4580c9a828328a60c9d058447b2a2b503fc79f6afb58d9
SHA512bdb60675bac6f23fdfd865d78a6e3998575893b42073ad0d37ee9f2b961d788e60ebba45ebb9f515674f6c384c3e20544362a92ca3a3609f13235b3111465cfb
-
Filesize
72KB
MD502da1955e3cd7cb851cf5d149883457f
SHA1ef9f81a2062fab8bd4f309fdd59d8ef960f3f75c
SHA2569e8c4946a6c4283d36654dcd61d290b07406febd9fd532465a8dfdc470d7dddd
SHA5125a1755aca42b25d1242a6f01e9172d331182cd1c59d2a5cda71f0f7a3fe8a6fcd8d9f855a21c03b72347f04ea71062d00b9d1739e1ed397f09fe4ef48fa97cb4
-
Filesize
72KB
MD5bea4e3384fcad0e9565ee87708223882
SHA121c4046f6e27649b4c80a3438416d34cab5ae589
SHA256448a70f84ba2482b20810d965204115ada35b302f2f880a59c959e22251685c8
SHA512607c1e2e26d4135985eefd6e515c3d982fa006f34e19a0ef60b8c1b0e563d3cedac8bb71936a8aa9d214199078fe14ce914079702a84b4fef9c07f449a7ea0d7
-
Filesize
72KB
MD5bea4e3384fcad0e9565ee87708223882
SHA121c4046f6e27649b4c80a3438416d34cab5ae589
SHA256448a70f84ba2482b20810d965204115ada35b302f2f880a59c959e22251685c8
SHA512607c1e2e26d4135985eefd6e515c3d982fa006f34e19a0ef60b8c1b0e563d3cedac8bb71936a8aa9d214199078fe14ce914079702a84b4fef9c07f449a7ea0d7
-
Filesize
72KB
MD542ea144a687317f2ca4ac813ae5d42c5
SHA18db3bc1c98cee3ec404ec470389f679d4b28a7ce
SHA25624da599d4456308b67366dc0e6b8119d864ca4dab80898bb43c018256c961dcf
SHA5122b1a062cbf5767b53b818ef8860b4e5bf860d8836bf2929cd21964b21fbe55fa60aecf7c3767ad765fb9bcc9df12c80466e86dcebf56774de3c2598688efc630
-
Filesize
72KB
MD542ea144a687317f2ca4ac813ae5d42c5
SHA18db3bc1c98cee3ec404ec470389f679d4b28a7ce
SHA25624da599d4456308b67366dc0e6b8119d864ca4dab80898bb43c018256c961dcf
SHA5122b1a062cbf5767b53b818ef8860b4e5bf860d8836bf2929cd21964b21fbe55fa60aecf7c3767ad765fb9bcc9df12c80466e86dcebf56774de3c2598688efc630
-
Filesize
72KB
MD568ac665ab55c3fbd01fbb8390b79fa75
SHA134501fae560b7029ddb3a8fde030a987e2a0abb2
SHA25659a965529a11936a0673297190518f8a5604aa52b31a8b5856c361444b851959
SHA512420a88445ac18571d4f615cdd1f00c64cf48ae63ccad0429b1fb974e5fd58859aee14c0c1e018274c28948de3501470490c21f7fee4d90607aae75b4a4ab4c08
-
Filesize
72KB
MD568ac665ab55c3fbd01fbb8390b79fa75
SHA134501fae560b7029ddb3a8fde030a987e2a0abb2
SHA25659a965529a11936a0673297190518f8a5604aa52b31a8b5856c361444b851959
SHA512420a88445ac18571d4f615cdd1f00c64cf48ae63ccad0429b1fb974e5fd58859aee14c0c1e018274c28948de3501470490c21f7fee4d90607aae75b4a4ab4c08
-
Filesize
72KB
MD55c82c6e378ba72c0f29a88a2d3290b38
SHA1b177cfe5428cbb70cd2d8633708d396ac49c89cb
SHA2562407133b76a3449e1359196a02c298d976a17dcc1a71e810b266e2fdda9b7775
SHA512ba96c46516620a1322ca36a4d00baa4a8a86a25ae24da1b1391a9d72d1b673c4ba59ba2b5fc81c7366f5b383cae172ead94d8214f9203dbefe7483ff78c6056c
-
Filesize
72KB
MD55c82c6e378ba72c0f29a88a2d3290b38
SHA1b177cfe5428cbb70cd2d8633708d396ac49c89cb
SHA2562407133b76a3449e1359196a02c298d976a17dcc1a71e810b266e2fdda9b7775
SHA512ba96c46516620a1322ca36a4d00baa4a8a86a25ae24da1b1391a9d72d1b673c4ba59ba2b5fc81c7366f5b383cae172ead94d8214f9203dbefe7483ff78c6056c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55c82c6e378ba72c0f29a88a2d3290b38
SHA1b177cfe5428cbb70cd2d8633708d396ac49c89cb
SHA2562407133b76a3449e1359196a02c298d976a17dcc1a71e810b266e2fdda9b7775
SHA512ba96c46516620a1322ca36a4d00baa4a8a86a25ae24da1b1391a9d72d1b673c4ba59ba2b5fc81c7366f5b383cae172ead94d8214f9203dbefe7483ff78c6056c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55c82c6e378ba72c0f29a88a2d3290b38
SHA1b177cfe5428cbb70cd2d8633708d396ac49c89cb
SHA2562407133b76a3449e1359196a02c298d976a17dcc1a71e810b266e2fdda9b7775
SHA512ba96c46516620a1322ca36a4d00baa4a8a86a25ae24da1b1391a9d72d1b673c4ba59ba2b5fc81c7366f5b383cae172ead94d8214f9203dbefe7483ff78c6056c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a00dc51573dc23129e1c7dafcbb872ca
SHA10941b9d91b49601a4aba1de17c551bd609c5dd54
SHA2560c7e4b14e7853da36e004d06b1568660bf0466e41e1557e411326138b69dab47
SHA5120dba9e7eddae4b3ad9216faffa93fc93f2e88125ada9f9415737562936834ab94e587969b059a1d9bddad83aa4e932dcbc4073b5410581262a7c5a0f4ea6e9a5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a00dc51573dc23129e1c7dafcbb872ca
SHA10941b9d91b49601a4aba1de17c551bd609c5dd54
SHA2560c7e4b14e7853da36e004d06b1568660bf0466e41e1557e411326138b69dab47
SHA5120dba9e7eddae4b3ad9216faffa93fc93f2e88125ada9f9415737562936834ab94e587969b059a1d9bddad83aa4e932dcbc4073b5410581262a7c5a0f4ea6e9a5
-
Filesize
72KB
MD568ac665ab55c3fbd01fbb8390b79fa75
SHA134501fae560b7029ddb3a8fde030a987e2a0abb2
SHA25659a965529a11936a0673297190518f8a5604aa52b31a8b5856c361444b851959
SHA512420a88445ac18571d4f615cdd1f00c64cf48ae63ccad0429b1fb974e5fd58859aee14c0c1e018274c28948de3501470490c21f7fee4d90607aae75b4a4ab4c08
-
Filesize
72KB
MD568ac665ab55c3fbd01fbb8390b79fa75
SHA134501fae560b7029ddb3a8fde030a987e2a0abb2
SHA25659a965529a11936a0673297190518f8a5604aa52b31a8b5856c361444b851959
SHA512420a88445ac18571d4f615cdd1f00c64cf48ae63ccad0429b1fb974e5fd58859aee14c0c1e018274c28948de3501470490c21f7fee4d90607aae75b4a4ab4c08
-
Filesize
72KB
MD55c82c6e378ba72c0f29a88a2d3290b38
SHA1b177cfe5428cbb70cd2d8633708d396ac49c89cb
SHA2562407133b76a3449e1359196a02c298d976a17dcc1a71e810b266e2fdda9b7775
SHA512ba96c46516620a1322ca36a4d00baa4a8a86a25ae24da1b1391a9d72d1b673c4ba59ba2b5fc81c7366f5b383cae172ead94d8214f9203dbefe7483ff78c6056c
-
Filesize
72KB
MD55c82c6e378ba72c0f29a88a2d3290b38
SHA1b177cfe5428cbb70cd2d8633708d396ac49c89cb
SHA2562407133b76a3449e1359196a02c298d976a17dcc1a71e810b266e2fdda9b7775
SHA512ba96c46516620a1322ca36a4d00baa4a8a86a25ae24da1b1391a9d72d1b673c4ba59ba2b5fc81c7366f5b383cae172ead94d8214f9203dbefe7483ff78c6056c
-
Filesize
72KB
MD5a00dc51573dc23129e1c7dafcbb872ca
SHA10941b9d91b49601a4aba1de17c551bd609c5dd54
SHA2560c7e4b14e7853da36e004d06b1568660bf0466e41e1557e411326138b69dab47
SHA5120dba9e7eddae4b3ad9216faffa93fc93f2e88125ada9f9415737562936834ab94e587969b059a1d9bddad83aa4e932dcbc4073b5410581262a7c5a0f4ea6e9a5
-
Filesize
72KB
MD5a00dc51573dc23129e1c7dafcbb872ca
SHA10941b9d91b49601a4aba1de17c551bd609c5dd54
SHA2560c7e4b14e7853da36e004d06b1568660bf0466e41e1557e411326138b69dab47
SHA5120dba9e7eddae4b3ad9216faffa93fc93f2e88125ada9f9415737562936834ab94e587969b059a1d9bddad83aa4e932dcbc4073b5410581262a7c5a0f4ea6e9a5
-
Filesize
72KB
MD5d1a5870f482facffa012b0162dc116f6
SHA1e04629541761b3ba9509f79ea3eb80c5c9b3fb90
SHA256a447201b171b04ca989e04a6403481f1ab18907e5863e37afb715347b28a188d
SHA5122bd295a9c5fa32cb8131ca48698cfac77f75f361f6710248d2cf41edc4badd9513d07810fefacb15d1edb348fed436f5428fcdd9637edde266395be92b96d104
-
Filesize
72KB
MD5cae55f9e1013d750445312ca542ead1e
SHA194b513f6e82a021888df633ff8258bf83f6eb776
SHA2568198cf1578943cd36dadba5068fb3fc5c5cc5d19ac0740ba665f4e3366a9e3f8
SHA5120e959caa6de116ca34a0144ef50920769657b8c056b2df7f93dee5b1810ad9d0f15028860cc3a08bc4674f352ca9a0a793a47ae5712f2052441adb75f8afda28
-
Filesize
72KB
MD5cae55f9e1013d750445312ca542ead1e
SHA194b513f6e82a021888df633ff8258bf83f6eb776
SHA2568198cf1578943cd36dadba5068fb3fc5c5cc5d19ac0740ba665f4e3366a9e3f8
SHA5120e959caa6de116ca34a0144ef50920769657b8c056b2df7f93dee5b1810ad9d0f15028860cc3a08bc4674f352ca9a0a793a47ae5712f2052441adb75f8afda28
-
Filesize
72KB
MD5cd8df20861338a9edbcb55621fdb4afc
SHA1037c9c0b9fe45bab2c74d197eae48634d8346a15
SHA256777eff04f0ae699d3bff38c7a78457c52d7a5a8069ccd73da6351a0bbd613309
SHA5127596e98ca294f59c09d3255994c2be9d8035a1c18edd17fd61de1198d862bfcfb39ed6b9da22a03a69f3cfa43d65928aca58ea3b0f92785b95eda919126ef272
-
Filesize
72KB
MD5cd8df20861338a9edbcb55621fdb4afc
SHA1037c9c0b9fe45bab2c74d197eae48634d8346a15
SHA256777eff04f0ae699d3bff38c7a78457c52d7a5a8069ccd73da6351a0bbd613309
SHA5127596e98ca294f59c09d3255994c2be9d8035a1c18edd17fd61de1198d862bfcfb39ed6b9da22a03a69f3cfa43d65928aca58ea3b0f92785b95eda919126ef272