Analysis
-
max time kernel
173s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe
Resource
win10v2004-20221111-en
General
-
Target
c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe
-
Size
72KB
-
MD5
68670ea9399b4e6432026e32a653d47a
-
SHA1
463f3857fb85054d9236c09a402822636cae6e62
-
SHA256
c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db
-
SHA512
00a07050101d1206fccb69f5eb10bddc44624ff0e77d76b12919afdc15145e148aea1d2a547b3386dd562aef65887dde8499245ce3a2aa743b3c2f6789751834
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2Q:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrc
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe -
Executes dropped EXE 64 IoCs
pid Process 4308 backup.exe 3840 backup.exe 3692 System Restore.exe 3404 backup.exe 4652 backup.exe 1016 System Restore.exe 3932 backup.exe 2532 backup.exe 1440 backup.exe 1652 backup.exe 2992 backup.exe 2432 backup.exe 1348 backup.exe 3620 backup.exe 2988 backup.exe 4608 data.exe 968 backup.exe 4212 backup.exe 4648 backup.exe 4236 backup.exe 1848 backup.exe 2540 backup.exe 2604 backup.exe 1604 backup.exe 3916 backup.exe 2328 backup.exe 1888 backup.exe 2460 backup.exe 5020 backup.exe 4016 backup.exe 2264 backup.exe 4880 backup.exe 3196 backup.exe 4824 backup.exe 3036 update.exe 3312 backup.exe 4296 backup.exe 3692 backup.exe 5064 backup.exe 5080 backup.exe 4596 backup.exe 4348 backup.exe 1216 backup.exe 3520 backup.exe 1764 backup.exe 3268 System Restore.exe 1404 backup.exe 1528 backup.exe 2556 update.exe 3508 backup.exe 2988 backup.exe 1196 System Restore.exe 3636 backup.exe 4240 backup.exe 2292 backup.exe 3248 backup.exe 4732 data.exe 2596 backup.exe 2884 backup.exe 3656 data.exe 1760 backup.exe 4632 backup.exe 1808 backup.exe 1892 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe data.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\System Restore.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe data.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\data.exe update.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe update.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe update.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\update.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe update.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 4308 backup.exe 3840 backup.exe 3692 System Restore.exe 3404 backup.exe 4652 backup.exe 1016 System Restore.exe 3932 backup.exe 2532 backup.exe 1440 backup.exe 1652 backup.exe 2992 backup.exe 2432 backup.exe 1348 backup.exe 3620 backup.exe 2988 backup.exe 4608 data.exe 968 backup.exe 4212 backup.exe 4648 backup.exe 4236 backup.exe 1848 backup.exe 2540 backup.exe 2604 backup.exe 1604 backup.exe 3916 backup.exe 1888 backup.exe 2328 backup.exe 2460 backup.exe 5020 backup.exe 4016 backup.exe 2264 backup.exe 4880 backup.exe 3036 update.exe 3196 backup.exe 4824 backup.exe 3312 backup.exe 4296 backup.exe 3692 backup.exe 5080 backup.exe 4596 backup.exe 5064 backup.exe 4348 backup.exe 1216 backup.exe 3520 backup.exe 1404 backup.exe 3268 System Restore.exe 1764 backup.exe 1528 backup.exe 3508 backup.exe 2556 update.exe 2988 backup.exe 3636 backup.exe 1196 System Restore.exe 4240 backup.exe 2292 backup.exe 3248 backup.exe 4732 data.exe 2596 backup.exe 2884 backup.exe 3656 data.exe 1760 backup.exe 4632 backup.exe 1808 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4308 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 82 PID 4412 wrote to memory of 4308 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 82 PID 4412 wrote to memory of 4308 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 82 PID 4412 wrote to memory of 3840 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 83 PID 4412 wrote to memory of 3840 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 83 PID 4412 wrote to memory of 3840 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 83 PID 4412 wrote to memory of 3692 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 84 PID 4412 wrote to memory of 3692 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 84 PID 4412 wrote to memory of 3692 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 84 PID 4412 wrote to memory of 3404 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 85 PID 4412 wrote to memory of 3404 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 85 PID 4412 wrote to memory of 3404 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 85 PID 4412 wrote to memory of 4652 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 86 PID 4412 wrote to memory of 4652 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 86 PID 4412 wrote to memory of 4652 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 86 PID 4308 wrote to memory of 1016 4308 backup.exe 87 PID 4308 wrote to memory of 1016 4308 backup.exe 87 PID 4308 wrote to memory of 1016 4308 backup.exe 87 PID 4412 wrote to memory of 3932 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 88 PID 4412 wrote to memory of 3932 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 88 PID 4412 wrote to memory of 3932 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 88 PID 1016 wrote to memory of 2532 1016 System Restore.exe 89 PID 1016 wrote to memory of 2532 1016 System Restore.exe 89 PID 1016 wrote to memory of 2532 1016 System Restore.exe 89 PID 4412 wrote to memory of 1440 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 90 PID 4412 wrote to memory of 1440 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 90 PID 4412 wrote to memory of 1440 4412 c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe 90 PID 1016 wrote to memory of 1652 1016 System Restore.exe 91 PID 1016 wrote to memory of 1652 1016 System Restore.exe 91 PID 1016 wrote to memory of 1652 1016 System Restore.exe 91 PID 1016 wrote to memory of 2992 1016 System Restore.exe 92 PID 1016 wrote to memory of 2992 1016 System Restore.exe 92 PID 1016 wrote to memory of 2992 1016 System Restore.exe 92 PID 2992 wrote to memory of 2432 2992 backup.exe 93 PID 2992 wrote to memory of 2432 2992 backup.exe 93 PID 2992 wrote to memory of 2432 2992 backup.exe 93 PID 2432 wrote to memory of 1348 2432 backup.exe 94 PID 2432 wrote to memory of 1348 2432 backup.exe 94 PID 2432 wrote to memory of 1348 2432 backup.exe 94 PID 2992 wrote to memory of 3620 2992 backup.exe 95 PID 2992 wrote to memory of 3620 2992 backup.exe 95 PID 2992 wrote to memory of 3620 2992 backup.exe 95 PID 3620 wrote to memory of 2988 3620 backup.exe 96 PID 3620 wrote to memory of 2988 3620 backup.exe 96 PID 3620 wrote to memory of 2988 3620 backup.exe 96 PID 3620 wrote to memory of 4608 3620 backup.exe 97 PID 3620 wrote to memory of 4608 3620 backup.exe 97 PID 3620 wrote to memory of 4608 3620 backup.exe 97 PID 4608 wrote to memory of 968 4608 data.exe 98 PID 4608 wrote to memory of 968 4608 data.exe 98 PID 4608 wrote to memory of 968 4608 data.exe 98 PID 4608 wrote to memory of 4212 4608 data.exe 99 PID 4608 wrote to memory of 4212 4608 data.exe 99 PID 4608 wrote to memory of 4212 4608 data.exe 99 PID 4212 wrote to memory of 4648 4212 backup.exe 100 PID 4212 wrote to memory of 4648 4212 backup.exe 100 PID 4212 wrote to memory of 4648 4212 backup.exe 100 PID 4212 wrote to memory of 4236 4212 backup.exe 101 PID 4212 wrote to memory of 4236 4212 backup.exe 101 PID 4212 wrote to memory of 4236 4212 backup.exe 101 PID 4212 wrote to memory of 1848 4212 backup.exe 102 PID 4212 wrote to memory of 1848 4212 backup.exe 102 PID 4212 wrote to memory of 1848 4212 backup.exe 102 PID 4212 wrote to memory of 2540 4212 backup.exe 103 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe"C:\Users\Admin\AppData\Local\Temp\c81edfe000d52cc5b69bb7efd42e0ade4a692dd72e83072745b5f9ea766ab2db.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\2111873877\backup.exeC:\Users\Admin\AppData\Local\Temp\2111873877\backup.exe C:\Users\Admin\AppData\Local\Temp\2111873877\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4308 -
C:\System Restore.exe"\System Restore.exe" \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1016 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2992 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3620 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
C:\Program Files\Common Files\microsoft shared\data.exe"C:\Program Files\Common Files\microsoft shared\data.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4212 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4648
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4236
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1848
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2540
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1604
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3916
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4880
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4296
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3268
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2596
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1392 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2872
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3256
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2764
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\data.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\data.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
PID:1304
-
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1888 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2264
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4824
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5064
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\System Restore.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\System Restore.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1196
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3248
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- System policy modification
PID:4772
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4720
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Modifies visibility of file extensions in Explorer
PID:876
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4340
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Disables RegEdit via registry modification
PID:4944
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5020
-
-
C:\Program Files\Common Files\System\update.exe"C:\Program Files\Common Files\System\update.exe" C:\Program Files\Common Files\System\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3036 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4596 -
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3508
-
-
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1404
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4240
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Executes dropped EXE
- System policy modification
PID:1892
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:4904
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3260
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
PID:4936
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:5112
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4016 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3312 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3692 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3636
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3656
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1516
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
PID:4436
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4776 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4284 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\11⤵PID:2512
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3196 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3520
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\update.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\update.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2556 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4732 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4632
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:3704 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2068
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Disables RegEdit via registry modification
PID:2804
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1604
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD506bc958799b193f53081fc681f538239
SHA1305b24135fa351ae828b805ed3e01f90b873a1a4
SHA256c405cadd58180a3ab2b8522939f98a8d7f00ad4aec2adcda4304a5bb1157f8c9
SHA51217770331d2aa9107a71ab519e24de925842e0e2cdfb9eb439624d8773d6114f91b61bff2d56d51d81a24618d99a1b6cea9b9ec0bc7ca07d54e09ef073b0780d4
-
Filesize
72KB
MD506bc958799b193f53081fc681f538239
SHA1305b24135fa351ae828b805ed3e01f90b873a1a4
SHA256c405cadd58180a3ab2b8522939f98a8d7f00ad4aec2adcda4304a5bb1157f8c9
SHA51217770331d2aa9107a71ab519e24de925842e0e2cdfb9eb439624d8773d6114f91b61bff2d56d51d81a24618d99a1b6cea9b9ec0bc7ca07d54e09ef073b0780d4
-
Filesize
72KB
MD54b2ab41eb86c229c7289e1ac20bf24cb
SHA15ce0f7350565b4186d53d38be057c322cad0befc
SHA256532edb8c7b14e2f0f47a25bb6c01e6b3faf247e440a8e203204d630e615ddbbc
SHA5128c0cb1784b7eb2c581f874eacbb15ebd74de4ae92c44e982f9dfa9346bfcd4750f734864068de6c243a87f3a4db21ad5acc88bf6a3f9197dc106f2921a45ce40
-
Filesize
72KB
MD54b2ab41eb86c229c7289e1ac20bf24cb
SHA15ce0f7350565b4186d53d38be057c322cad0befc
SHA256532edb8c7b14e2f0f47a25bb6c01e6b3faf247e440a8e203204d630e615ddbbc
SHA5128c0cb1784b7eb2c581f874eacbb15ebd74de4ae92c44e982f9dfa9346bfcd4750f734864068de6c243a87f3a4db21ad5acc88bf6a3f9197dc106f2921a45ce40
-
Filesize
72KB
MD59d7bb063f489e42ac7f2a6bc8e8347e2
SHA1e810347b63e99090ba7e64fb9ad9e246938a0c64
SHA256f49e691177b59aafde5b1bc13995f2e9be71be91a58d7e8b7b798c3de8065039
SHA512926bf87a99106889d7145897745a2e41ac0891f931adf730f89743f2e5eb62ea7093992fcfc07b005f82a50834f492e9eb2065b7212715acb17f98ef374ee31a
-
Filesize
72KB
MD59d7bb063f489e42ac7f2a6bc8e8347e2
SHA1e810347b63e99090ba7e64fb9ad9e246938a0c64
SHA256f49e691177b59aafde5b1bc13995f2e9be71be91a58d7e8b7b798c3de8065039
SHA512926bf87a99106889d7145897745a2e41ac0891f931adf730f89743f2e5eb62ea7093992fcfc07b005f82a50834f492e9eb2065b7212715acb17f98ef374ee31a
-
Filesize
72KB
MD5898676eee98e1cc25098b5623a14f83d
SHA185ae492f2381efd4ff37a1442a995d817d60fe4b
SHA25656588733daef1eeb050cefed4c44b2aef68a3b89d52218081158195dccd728a0
SHA51223df60904d4c3217504ea53ea44aa9dc3a573a6faa7792cc06987492fbe9fc431ee5190b1deb3649e196550a30f0752a7f870c101651cea8c4b2af2a80189790
-
Filesize
72KB
MD5898676eee98e1cc25098b5623a14f83d
SHA185ae492f2381efd4ff37a1442a995d817d60fe4b
SHA25656588733daef1eeb050cefed4c44b2aef68a3b89d52218081158195dccd728a0
SHA51223df60904d4c3217504ea53ea44aa9dc3a573a6faa7792cc06987492fbe9fc431ee5190b1deb3649e196550a30f0752a7f870c101651cea8c4b2af2a80189790
-
Filesize
72KB
MD523a78da97b59fe42b21a584a9fa78521
SHA1606ba919a201b676481ea9faeaa0e677adc5b58b
SHA256e4ded9e0f0aba6a835d83f649afa1ab6de7cf2d809e8c2301019d35ffa470057
SHA512c5cc58369db0cccd076c590b5b96731ecd30df3cea8f3955b9dc1e24a9198acd5eaef84615d1d1603910983b87760f418772f962d3f17c82fce234274dd8430d
-
Filesize
72KB
MD523a78da97b59fe42b21a584a9fa78521
SHA1606ba919a201b676481ea9faeaa0e677adc5b58b
SHA256e4ded9e0f0aba6a835d83f649afa1ab6de7cf2d809e8c2301019d35ffa470057
SHA512c5cc58369db0cccd076c590b5b96731ecd30df3cea8f3955b9dc1e24a9198acd5eaef84615d1d1603910983b87760f418772f962d3f17c82fce234274dd8430d
-
Filesize
72KB
MD5a17b247c13cd9fa668ed26dc22243379
SHA13c19cf5bda0cf55a84552eda6ac3ab5df969e380
SHA25698462dd426c74315020bfcf5bdf0a0237242d9e839d12c2b7946d1b2648e02d1
SHA512b2711f646098635c9b0536e1da838fd09232c52d13e97bbcdfb961c869728403a36b4e9a976bbd7088115c3c1ec681d23019e29d880eabf51833720b98d6d70f
-
Filesize
72KB
MD5a17b247c13cd9fa668ed26dc22243379
SHA13c19cf5bda0cf55a84552eda6ac3ab5df969e380
SHA25698462dd426c74315020bfcf5bdf0a0237242d9e839d12c2b7946d1b2648e02d1
SHA512b2711f646098635c9b0536e1da838fd09232c52d13e97bbcdfb961c869728403a36b4e9a976bbd7088115c3c1ec681d23019e29d880eabf51833720b98d6d70f
-
Filesize
72KB
MD589bf2c6e4ef7808e87148f32df24e476
SHA1082570aaa5055087023a4c1f2a27996856deec59
SHA25654e3d8e88c19e224dfbc8bafb1829da62c696786812f4542676defdc7ae615d3
SHA512380987a0dad9bf79f01f411cef88963189488444360620775b174cf944753116003794cb00f0a122361f709e8303c2e85f7669a5706c2de71fdf03564f721948
-
Filesize
72KB
MD589bf2c6e4ef7808e87148f32df24e476
SHA1082570aaa5055087023a4c1f2a27996856deec59
SHA25654e3d8e88c19e224dfbc8bafb1829da62c696786812f4542676defdc7ae615d3
SHA512380987a0dad9bf79f01f411cef88963189488444360620775b174cf944753116003794cb00f0a122361f709e8303c2e85f7669a5706c2de71fdf03564f721948
-
Filesize
72KB
MD59532e530fc60302ebcde6b382b2c37f4
SHA1dfc74d4f4bc7c9c04d4347264eff6f931ae6569a
SHA25655bc0583105d0fa65a03bec2921d649c0a7c1fb6812c8bf017a6cc0ab6f4ede0
SHA5121dce57937f77d141f010b0b152f62cef7bc1aeb15f8f09addb4113c89011a266e5d97c18824a2d81373e8510a818922b8a44329d1f3ec56ce72b6cd77571ae0c
-
Filesize
72KB
MD59532e530fc60302ebcde6b382b2c37f4
SHA1dfc74d4f4bc7c9c04d4347264eff6f931ae6569a
SHA25655bc0583105d0fa65a03bec2921d649c0a7c1fb6812c8bf017a6cc0ab6f4ede0
SHA5121dce57937f77d141f010b0b152f62cef7bc1aeb15f8f09addb4113c89011a266e5d97c18824a2d81373e8510a818922b8a44329d1f3ec56ce72b6cd77571ae0c
-
Filesize
72KB
MD5e5cfecbffb37ebe118bd39be8b5cc2fd
SHA159a26e57bf9ed61ee600a218a1c7ffcf4b896847
SHA256d9d8b07b77204d7ac303564917cbc6f6bc52f4939d9db2b9a5a716db2a54d953
SHA51292c75b9d67d0bc7db80cdbdd76224f5dd5189e25df0771152befe70dc9cae8e3757f464b4046133c0b76aa7df13aae9a7a1befb8ae927c277ae33ef88efa3056
-
Filesize
72KB
MD5e5cfecbffb37ebe118bd39be8b5cc2fd
SHA159a26e57bf9ed61ee600a218a1c7ffcf4b896847
SHA256d9d8b07b77204d7ac303564917cbc6f6bc52f4939d9db2b9a5a716db2a54d953
SHA51292c75b9d67d0bc7db80cdbdd76224f5dd5189e25df0771152befe70dc9cae8e3757f464b4046133c0b76aa7df13aae9a7a1befb8ae927c277ae33ef88efa3056
-
Filesize
72KB
MD515abd9b2f295f1ce83557cc7c4b28c1b
SHA161d01af8d92c2a6dd8ba3aad95f3fb9eebb2a383
SHA256fe8b5127e4034ab00699743c4b867aa60a9009df98eb276a274d90e9764bec2d
SHA512b1dda00926d4c78b5c18fe2bd46b99ae7b570a37c9404fd9c5d6bfb318955367658059c4db689b79a491bbd201b8044e5fec9aba3ce9a91ba372fcd778f778d9
-
Filesize
72KB
MD515abd9b2f295f1ce83557cc7c4b28c1b
SHA161d01af8d92c2a6dd8ba3aad95f3fb9eebb2a383
SHA256fe8b5127e4034ab00699743c4b867aa60a9009df98eb276a274d90e9764bec2d
SHA512b1dda00926d4c78b5c18fe2bd46b99ae7b570a37c9404fd9c5d6bfb318955367658059c4db689b79a491bbd201b8044e5fec9aba3ce9a91ba372fcd778f778d9
-
Filesize
72KB
MD523a78da97b59fe42b21a584a9fa78521
SHA1606ba919a201b676481ea9faeaa0e677adc5b58b
SHA256e4ded9e0f0aba6a835d83f649afa1ab6de7cf2d809e8c2301019d35ffa470057
SHA512c5cc58369db0cccd076c590b5b96731ecd30df3cea8f3955b9dc1e24a9198acd5eaef84615d1d1603910983b87760f418772f962d3f17c82fce234274dd8430d
-
Filesize
72KB
MD523a78da97b59fe42b21a584a9fa78521
SHA1606ba919a201b676481ea9faeaa0e677adc5b58b
SHA256e4ded9e0f0aba6a835d83f649afa1ab6de7cf2d809e8c2301019d35ffa470057
SHA512c5cc58369db0cccd076c590b5b96731ecd30df3cea8f3955b9dc1e24a9198acd5eaef84615d1d1603910983b87760f418772f962d3f17c82fce234274dd8430d
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD59532e530fc60302ebcde6b382b2c37f4
SHA1dfc74d4f4bc7c9c04d4347264eff6f931ae6569a
SHA25655bc0583105d0fa65a03bec2921d649c0a7c1fb6812c8bf017a6cc0ab6f4ede0
SHA5121dce57937f77d141f010b0b152f62cef7bc1aeb15f8f09addb4113c89011a266e5d97c18824a2d81373e8510a818922b8a44329d1f3ec56ce72b6cd77571ae0c
-
Filesize
72KB
MD59532e530fc60302ebcde6b382b2c37f4
SHA1dfc74d4f4bc7c9c04d4347264eff6f931ae6569a
SHA25655bc0583105d0fa65a03bec2921d649c0a7c1fb6812c8bf017a6cc0ab6f4ede0
SHA5121dce57937f77d141f010b0b152f62cef7bc1aeb15f8f09addb4113c89011a266e5d97c18824a2d81373e8510a818922b8a44329d1f3ec56ce72b6cd77571ae0c
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD5ea987f80b11538f75dd951d218c0e9df
SHA11ba5f93c1c37aee6b9f41da311a4669ffaf7cd58
SHA256339732117de893201365be1e00fcf218bc7d5d5e6193a386c9d61b97c5ab832a
SHA512772f370b258e0e5dd4fb0ba91ef28782dc1b66b5ede3fdb79ca8f49d1193bb933ce4d69a7042048428a262158da6c3ada9c6077fe3b44bb184919b9c605a9738
-
Filesize
72KB
MD50508e79c46cf78e5ef837f028081c0f7
SHA11b0739463d4a5d201c32844bbd1a03f18b617bac
SHA256a9f36696194e6cb54beeb51419d9c64f7694d895b447714a528d580145b0cc06
SHA5122075fec24a285bc19f75f1280ac9486e11256171e4408170eb9ae138b805718cdc8cdfe240126512b401a9bda799ddaf4f184002af0594eb7c6d397b9319f3e9
-
Filesize
72KB
MD50508e79c46cf78e5ef837f028081c0f7
SHA11b0739463d4a5d201c32844bbd1a03f18b617bac
SHA256a9f36696194e6cb54beeb51419d9c64f7694d895b447714a528d580145b0cc06
SHA5122075fec24a285bc19f75f1280ac9486e11256171e4408170eb9ae138b805718cdc8cdfe240126512b401a9bda799ddaf4f184002af0594eb7c6d397b9319f3e9
-
Filesize
72KB
MD5252968aab172a82306300a1dbd44d141
SHA14f036166f3cc1cf7e750c9f60885967c62d2ea15
SHA25613edcf66295cdcf7eb83654d0bc367c9c2d52a891d6e65fe173c728695a8d4c5
SHA51213309c9f3fcbf0ac63674afba8d856b8c3cf055125db4df189ffc73b26d0c95b7c562460e9d48842b8bc420b8b26907114529f85b98c3b11df6a0538a4837752
-
Filesize
72KB
MD5252968aab172a82306300a1dbd44d141
SHA14f036166f3cc1cf7e750c9f60885967c62d2ea15
SHA25613edcf66295cdcf7eb83654d0bc367c9c2d52a891d6e65fe173c728695a8d4c5
SHA51213309c9f3fcbf0ac63674afba8d856b8c3cf055125db4df189ffc73b26d0c95b7c562460e9d48842b8bc420b8b26907114529f85b98c3b11df6a0538a4837752
-
Filesize
72KB
MD525085a1c7cc2e0923f2dd527232d0470
SHA1d11b226348a53190a5adc4d69c798be1e4421a77
SHA2564cf564e9b7526b958bb3ffe081b624034e9d1b12374124a810982e160a5bcadf
SHA512179998143866d25ec5a093895227fb8416d170e82ae67fdf76734846972f414770bdedff1c5644242c7784a3db4f93c0a0676b35cc4aff2d42f74693371af602
-
Filesize
72KB
MD525085a1c7cc2e0923f2dd527232d0470
SHA1d11b226348a53190a5adc4d69c798be1e4421a77
SHA2564cf564e9b7526b958bb3ffe081b624034e9d1b12374124a810982e160a5bcadf
SHA512179998143866d25ec5a093895227fb8416d170e82ae67fdf76734846972f414770bdedff1c5644242c7784a3db4f93c0a0676b35cc4aff2d42f74693371af602
-
Filesize
72KB
MD584b73f0d776728c3ca5ef64f92556ef3
SHA187a7a584453deab8218a069993c7a5471870491c
SHA256f9aec7fcd9e9417c6f5220d0b997ff1363f62739079cc8204e8a78e7dcf23bb5
SHA512fedb648a5bf9d4d9b770f17ff4ece8186acdd724cab04328677177d2f3f25f43f686c2dd154477e82bab4addf2c705c2d19e9d007ddf61e7bd8d97b6c1aceb02
-
Filesize
72KB
MD584b73f0d776728c3ca5ef64f92556ef3
SHA187a7a584453deab8218a069993c7a5471870491c
SHA256f9aec7fcd9e9417c6f5220d0b997ff1363f62739079cc8204e8a78e7dcf23bb5
SHA512fedb648a5bf9d4d9b770f17ff4ece8186acdd724cab04328677177d2f3f25f43f686c2dd154477e82bab4addf2c705c2d19e9d007ddf61e7bd8d97b6c1aceb02
-
Filesize
72KB
MD5c9719d52aaaf16418cebe20185663fdc
SHA12f21b5198511268fcd08e47bdb1334add8bcecb9
SHA2562ae5e800e8153cefc94cabb7be5733bc8eb4efad86e93d6887a3712ba0ee87e6
SHA512dc13e479914d853e31b780932dc88f2389508a1eda353a76733d4b148a4a02d68190af6f2c6deb381535de6551b3d49899455985c6989366c88de4193c7c01a2
-
Filesize
72KB
MD5c9719d52aaaf16418cebe20185663fdc
SHA12f21b5198511268fcd08e47bdb1334add8bcecb9
SHA2562ae5e800e8153cefc94cabb7be5733bc8eb4efad86e93d6887a3712ba0ee87e6
SHA512dc13e479914d853e31b780932dc88f2389508a1eda353a76733d4b148a4a02d68190af6f2c6deb381535de6551b3d49899455985c6989366c88de4193c7c01a2
-
Filesize
72KB
MD5366d67ac3b0434060fff71c052751a95
SHA1227996b40507851fcffd4acecf2c862c1c0f284a
SHA256ab67313f90dc68da2e0981d854446af91a0fa3a526a40d241a4ce790f4fccd04
SHA5121021864f0e90272a030846e14875505faeaef2c356391ce436a4d1a15ea97ca8103a8b98f22dfd83b2927df11a7e7ecc7cf5d7e5fa2434655c36e277121f10a6
-
Filesize
72KB
MD5366d67ac3b0434060fff71c052751a95
SHA1227996b40507851fcffd4acecf2c862c1c0f284a
SHA256ab67313f90dc68da2e0981d854446af91a0fa3a526a40d241a4ce790f4fccd04
SHA5121021864f0e90272a030846e14875505faeaef2c356391ce436a4d1a15ea97ca8103a8b98f22dfd83b2927df11a7e7ecc7cf5d7e5fa2434655c36e277121f10a6
-
Filesize
72KB
MD5bf754228b327e56a432d49dcd89e2e31
SHA1546b51e3e73e3cdaeda95a76b1ddfd470fb9ceda
SHA2569f94690fb1a9eb61ce635d49650f7952f3bb37493e63ed0a689c33114d7a7df4
SHA512cece6c70c501ea5541328dd52001be672008bdbf4eff058dfd9decd220a98acb202e5a86d10927f1d396e84748b3b8ba553967148faec8a3aeb2c1fb300d60eb
-
Filesize
72KB
MD5bf754228b327e56a432d49dcd89e2e31
SHA1546b51e3e73e3cdaeda95a76b1ddfd470fb9ceda
SHA2569f94690fb1a9eb61ce635d49650f7952f3bb37493e63ed0a689c33114d7a7df4
SHA512cece6c70c501ea5541328dd52001be672008bdbf4eff058dfd9decd220a98acb202e5a86d10927f1d396e84748b3b8ba553967148faec8a3aeb2c1fb300d60eb
-
Filesize
72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
Filesize
72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55d2314aa3fdcbd92691f6a31e4f773e1
SHA1906b96e4360f75f7d761f466dd3b6fc104361553
SHA25687983ba980aaef30a476acb474f7de953e57f5f075117bfc90e112eca4082eaa
SHA512d8080a3fb65655c0e0851ec3f7ac500f37af679deb713b77444ce2e6a0a903ce5515fba7b1aa2ab91058aee8305fc04d527d76228f068fde86d38eb71bab7600
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55d2314aa3fdcbd92691f6a31e4f773e1
SHA1906b96e4360f75f7d761f466dd3b6fc104361553
SHA25687983ba980aaef30a476acb474f7de953e57f5f075117bfc90e112eca4082eaa
SHA512d8080a3fb65655c0e0851ec3f7ac500f37af679deb713b77444ce2e6a0a903ce5515fba7b1aa2ab91058aee8305fc04d527d76228f068fde86d38eb71bab7600
-
Filesize
72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
Filesize
72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
Filesize
72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
Filesize
72KB
MD5bea644c8bafa0a96301363e1c698df30
SHA1a5e8809560a8fc46eaa92b2f89f60a3108ce7193
SHA25668b98ee356e6a073d72c080723e22b1da9ca3ec79ed66e82dcdf79b3d9789c2f
SHA512568c619921ec9e174df2119a32a343a52be39fb7bf33712f9110ad51b23b2e2ce5325679ac0290c280afea90825f8503a4d23a7cdf06483d491e255b72b88d51
-
Filesize
72KB
MD55d2314aa3fdcbd92691f6a31e4f773e1
SHA1906b96e4360f75f7d761f466dd3b6fc104361553
SHA25687983ba980aaef30a476acb474f7de953e57f5f075117bfc90e112eca4082eaa
SHA512d8080a3fb65655c0e0851ec3f7ac500f37af679deb713b77444ce2e6a0a903ce5515fba7b1aa2ab91058aee8305fc04d527d76228f068fde86d38eb71bab7600
-
Filesize
72KB
MD55d2314aa3fdcbd92691f6a31e4f773e1
SHA1906b96e4360f75f7d761f466dd3b6fc104361553
SHA25687983ba980aaef30a476acb474f7de953e57f5f075117bfc90e112eca4082eaa
SHA512d8080a3fb65655c0e0851ec3f7ac500f37af679deb713b77444ce2e6a0a903ce5515fba7b1aa2ab91058aee8305fc04d527d76228f068fde86d38eb71bab7600
-
Filesize
72KB
MD506bc958799b193f53081fc681f538239
SHA1305b24135fa351ae828b805ed3e01f90b873a1a4
SHA256c405cadd58180a3ab2b8522939f98a8d7f00ad4aec2adcda4304a5bb1157f8c9
SHA51217770331d2aa9107a71ab519e24de925842e0e2cdfb9eb439624d8773d6114f91b61bff2d56d51d81a24618d99a1b6cea9b9ec0bc7ca07d54e09ef073b0780d4
-
Filesize
72KB
MD506bc958799b193f53081fc681f538239
SHA1305b24135fa351ae828b805ed3e01f90b873a1a4
SHA256c405cadd58180a3ab2b8522939f98a8d7f00ad4aec2adcda4304a5bb1157f8c9
SHA51217770331d2aa9107a71ab519e24de925842e0e2cdfb9eb439624d8773d6114f91b61bff2d56d51d81a24618d99a1b6cea9b9ec0bc7ca07d54e09ef073b0780d4