Analysis
-
max time kernel
177s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe
Resource
win10v2004-20221111-en
General
-
Target
6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe
-
Size
72KB
-
MD5
06b872ba01968152f3ff2cbd2d7edec3
-
SHA1
c82d1383f65c8f0b14be696972ccd8679d0348b1
-
SHA256
6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8
-
SHA512
5fff8a7b832ddefb54ceb5c57ebf74aa370496fd11c38f23c870c6ec76828e20dd7a7ded1cb3f7b7cb91c6e2323a67b046ee51fee9d5664b5921786ae67abb41
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2Z:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 204 update.exe 4484 backup.exe 1536 backup.exe 2852 backup.exe 3228 backup.exe 4832 backup.exe 1480 backup.exe 1712 backup.exe 4616 backup.exe 2332 backup.exe 2204 backup.exe 1376 backup.exe 3536 backup.exe 5028 backup.exe 2380 backup.exe 2256 System Restore.exe 4956 backup.exe 3244 backup.exe 4200 backup.exe 4720 backup.exe 1448 update.exe 3496 backup.exe 3568 update.exe 4148 backup.exe 920 backup.exe 2004 backup.exe 4364 backup.exe 5068 backup.exe 4892 backup.exe 4888 backup.exe 4744 backup.exe 940 backup.exe 1056 backup.exe 884 backup.exe 4176 update.exe 4072 backup.exe 3912 backup.exe 2248 System Restore.exe 3900 backup.exe 3916 backup.exe 4236 backup.exe 1864 backup.exe 2280 backup.exe 4372 backup.exe 1548 System Restore.exe 1220 backup.exe 4968 backup.exe 1480 backup.exe 4408 backup.exe 3968 backup.exe 3524 backup.exe 1796 backup.exe 2352 backup.exe 1452 backup.exe 2864 backup.exe 4748 backup.exe 3820 backup.exe 2540 backup.exe 2500 backup.exe 528 backup.exe 3032 backup.exe 4380 update.exe 4140 backup.exe 5048 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\System Restore.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Google\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\update.exe update.exe File opened for modification C:\Program Files (x86)\Google\Policies\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\backup.exe update.exe File opened for modification C:\Program Files (x86)\Google\Update\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe System Restore.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe update.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\Office16\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\Programs\backup.exe backup.exe File opened for modification C:\Windows\apppatch\data.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\appcompat\encapsulation\update.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 204 update.exe 4484 backup.exe 1536 backup.exe 2852 backup.exe 3228 backup.exe 4832 backup.exe 1480 backup.exe 1712 backup.exe 4616 backup.exe 2332 backup.exe 2204 backup.exe 1376 backup.exe 3536 backup.exe 5028 backup.exe 2380 backup.exe 2256 System Restore.exe 4956 backup.exe 3244 backup.exe 4200 backup.exe 4720 backup.exe 3496 backup.exe 1448 update.exe 3568 update.exe 4364 backup.exe 2004 backup.exe 920 backup.exe 4148 backup.exe 4744 backup.exe 5068 backup.exe 4176 update.exe 4888 backup.exe 1056 backup.exe 884 backup.exe 940 backup.exe 4892 backup.exe 4072 backup.exe 3916 backup.exe 3912 backup.exe 2248 System Restore.exe 3900 backup.exe 1864 backup.exe 4236 backup.exe 2280 backup.exe 4372 backup.exe 1548 System Restore.exe 1220 backup.exe 4968 backup.exe 1480 backup.exe 4408 backup.exe 3968 backup.exe 3524 backup.exe 1796 backup.exe 2352 backup.exe 1452 backup.exe 2540 backup.exe 3820 backup.exe 4748 backup.exe 2864 backup.exe 2500 backup.exe 528 backup.exe 4380 update.exe 3032 backup.exe 4140 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 204 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 80 PID 4376 wrote to memory of 204 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 80 PID 4376 wrote to memory of 204 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 80 PID 4376 wrote to memory of 4484 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 81 PID 4376 wrote to memory of 4484 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 81 PID 4376 wrote to memory of 4484 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 81 PID 4376 wrote to memory of 1536 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 82 PID 4376 wrote to memory of 1536 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 82 PID 4376 wrote to memory of 1536 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 82 PID 4376 wrote to memory of 2852 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 83 PID 4376 wrote to memory of 2852 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 83 PID 4376 wrote to memory of 2852 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 83 PID 4376 wrote to memory of 3228 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 84 PID 4376 wrote to memory of 3228 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 84 PID 4376 wrote to memory of 3228 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 84 PID 4376 wrote to memory of 4832 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 85 PID 4376 wrote to memory of 4832 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 85 PID 4376 wrote to memory of 4832 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 85 PID 4376 wrote to memory of 1480 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 86 PID 4376 wrote to memory of 1480 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 86 PID 4376 wrote to memory of 1480 4376 6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe 86 PID 204 wrote to memory of 1712 204 update.exe 87 PID 204 wrote to memory of 1712 204 update.exe 87 PID 204 wrote to memory of 1712 204 update.exe 87 PID 1712 wrote to memory of 4616 1712 backup.exe 88 PID 1712 wrote to memory of 4616 1712 backup.exe 88 PID 1712 wrote to memory of 4616 1712 backup.exe 88 PID 1712 wrote to memory of 2332 1712 backup.exe 89 PID 1712 wrote to memory of 2332 1712 backup.exe 89 PID 1712 wrote to memory of 2332 1712 backup.exe 89 PID 1712 wrote to memory of 2204 1712 backup.exe 90 PID 1712 wrote to memory of 2204 1712 backup.exe 90 PID 1712 wrote to memory of 2204 1712 backup.exe 90 PID 2204 wrote to memory of 1376 2204 backup.exe 91 PID 2204 wrote to memory of 1376 2204 backup.exe 91 PID 2204 wrote to memory of 1376 2204 backup.exe 91 PID 1376 wrote to memory of 3536 1376 backup.exe 92 PID 1376 wrote to memory of 3536 1376 backup.exe 92 PID 1376 wrote to memory of 3536 1376 backup.exe 92 PID 2204 wrote to memory of 5028 2204 backup.exe 93 PID 2204 wrote to memory of 5028 2204 backup.exe 93 PID 2204 wrote to memory of 5028 2204 backup.exe 93 PID 5028 wrote to memory of 2380 5028 backup.exe 94 PID 5028 wrote to memory of 2380 5028 backup.exe 94 PID 5028 wrote to memory of 2380 5028 backup.exe 94 PID 5028 wrote to memory of 2256 5028 backup.exe 95 PID 5028 wrote to memory of 2256 5028 backup.exe 95 PID 5028 wrote to memory of 2256 5028 backup.exe 95 PID 2256 wrote to memory of 4956 2256 System Restore.exe 96 PID 2256 wrote to memory of 4956 2256 System Restore.exe 96 PID 2256 wrote to memory of 4956 2256 System Restore.exe 96 PID 2256 wrote to memory of 3244 2256 System Restore.exe 97 PID 2256 wrote to memory of 3244 2256 System Restore.exe 97 PID 2256 wrote to memory of 3244 2256 System Restore.exe 97 PID 1712 wrote to memory of 4720 1712 backup.exe 99 PID 1712 wrote to memory of 4720 1712 backup.exe 99 PID 1712 wrote to memory of 4720 1712 backup.exe 99 PID 5028 wrote to memory of 4200 5028 backup.exe 100 PID 5028 wrote to memory of 4200 5028 backup.exe 100 PID 5028 wrote to memory of 4200 5028 backup.exe 100 PID 2204 wrote to memory of 1448 2204 backup.exe 101 PID 2204 wrote to memory of 1448 2204 backup.exe 101 PID 2204 wrote to memory of 1448 2204 backup.exe 101 PID 2256 wrote to memory of 3496 2256 System Restore.exe 102 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe"C:\Users\Admin\AppData\Local\Temp\6f768822457cbaa312111666af61264df191ecaeb976f4ad8298aab9ca1ddca8.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\1134904656\update.exeC:\Users\Admin\AppData\Local\Temp\1134904656\update.exe C:\Users\Admin\AppData\Local\Temp\1134904656\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:204 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2204 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3536
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5028 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
C:\Program Files\Common Files\microsoft shared\System Restore.exe"C:\Program Files\Common Files\microsoft shared\System Restore.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2256 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3244 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3912
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1480
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3820
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4140
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- System policy modification
PID:3456
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵PID:4884
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵PID:4152
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1804
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵PID:180
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
PID:3828
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵PID:1856
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3496 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\System Restore.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\System Restore.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\System Restore.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1548
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1220
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4268
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2004 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\update.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\update.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4176
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4072
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4372
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3540
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵PID:3896
-
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\data.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\data.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵
- Disables RegEdit via registry modification
PID:1428
-
-
-
C:\Program Files\Common Files\microsoft shared\VGX\backup.exe"C:\Program Files\Common Files\microsoft shared\VGX\backup.exe" C:\Program Files\Common Files\microsoft shared\VGX\7⤵PID:4328
-
-
C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1216 -
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\8⤵PID:4264
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3408
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4200
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:920 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4892 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2280
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2352
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1904
-
-
C:\Program Files\Common Files\System\ado\it-IT\System Restore.exe"C:\Program Files\Common Files\System\ado\it-IT\System Restore.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1192
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- System policy modification
PID:4616
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1804
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:2260
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4140
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:976
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵
- Modifies visibility of file extensions in Explorer
PID:3508
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- System policy modification
PID:4268
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:776
-
-
-
-
C:\Program Files\Google\update.exe"C:\Program Files\Google\update.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1448 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4744 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3524 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1812
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4276
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3100
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3592
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2660
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4520 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\10⤵PID:4164
-
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:3492
-
-
-
-
-
C:\Program Files\Internet Explorer\update.exe"C:\Program Files\Internet Explorer\update.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3568 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
C:\Program Files\Internet Explorer\images\update.exe"C:\Program Files\Internet Explorer\images\update.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
PID:4764 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\7⤵
- Modifies visibility of file extensions in Explorer
PID:228
-
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1268
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1796
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:2788
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:4016
-
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:4696 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
PID:3076
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:340 -
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3448
-
-
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3712
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵PID:3668
-
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Drops file in Program Files directory
- System policy modification
PID:4852 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵
- Disables RegEdit via registry modification
PID:1164
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵PID:4840
-
-
C:\Program Files\Microsoft Office\root\backup.exe"C:\Program Files\Microsoft Office\root\backup.exe" C:\Program Files\Microsoft Office\root\6⤵
- Modifies visibility of file extensions in Explorer
PID:3456 -
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2292
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\7⤵
- System policy modification
PID:4804
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4720 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5068 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4236 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4968
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:528 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
PID:4324 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
PID:1996
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Drops file in Program Files directory
- System policy modification
PID:3252 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- System policy modification
PID:3684
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2452
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- System policy modification
PID:3688
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Drops file in Program Files directory
PID:2440 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- Modifies visibility of file extensions in Explorer
PID:3804
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵PID:1672
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵
- Drops file in Program Files directory
PID:4376 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\8⤵
- Drops file in Program Files directory
PID:4172 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\9⤵
- Disables RegEdit via registry modification
PID:4688
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\8⤵PID:4884
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\9⤵PID:4748
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\8⤵
- System policy modification
PID:3468
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1228 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Drops file in Program Files directory
PID:3728 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- System policy modification
PID:2224 -
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\8⤵PID:4296
-
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4764
-
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Drops file in Program Files directory
PID:3028 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3656
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:4468
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4460 -
C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe" C:\Program Files (x86)\Google\Update\1.3.36.71\7⤵PID:2444
-
-
C:\Program Files (x86)\Google\Update\Download\backup.exe"C:\Program Files (x86)\Google\Update\Download\backup.exe" C:\Program Files (x86)\Google\Update\Download\7⤵PID:1448
-
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵
- Disables RegEdit via registry modification
PID:3908
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4364 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4888 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3900
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
C:\Users\Admin\Documents\update.exeC:\Users\Admin\Documents\update.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4380
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Executes dropped EXE
PID:5048
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:4260
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1720
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:3164
-
-
C:\Users\Admin\Pictures\data.exeC:\Users\Admin\Pictures\data.exe C:\Users\Admin\Pictures\6⤵
- Disables RegEdit via registry modification
PID:4648 -
C:\Users\Admin\Pictures\Saved Pictures\backup.exe"C:\Users\Admin\Pictures\Saved Pictures\backup.exe" C:\Users\Admin\Pictures\Saved Pictures\7⤵PID:2320
-
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2960
-
-
-
C:\Users\Public\System Restore.exe"C:\Users\Public\System Restore.exe" C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:5052 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:3580
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:4160
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:4208
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵
- System policy modification
PID:4968
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
PID:3492
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:4932 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4680
-
-
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:4120 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:3536 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3932
-
-
-
C:\Windows\appcompat\Programs\backup.exeC:\Windows\appcompat\Programs\backup.exe C:\Windows\appcompat\Programs\6⤵PID:1564
-
-
C:\Windows\appcompat\encapsulation\update.exeC:\Windows\appcompat\encapsulation\update.exe C:\Windows\appcompat\encapsulation\6⤵
- Modifies visibility of file extensions in Explorer
PID:2464
-
-
-
C:\Windows\apppatch\data.exeC:\Windows\apppatch\data.exe C:\Windows\apppatch\5⤵PID:628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\1⤵PID:4804
-
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\1⤵
- Modifies visibility of file extensions in Explorer
PID:3572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e4d06cc97b7f639bb1f6f9147611095e
SHA1969976e808c9e1341cf081d23b2aaa3fe4ca7cd0
SHA25654b8d3f6757cbad47781234f378016d206ae008817e32d6227c8f6da877e510b
SHA5128c7aa1f54d20d2d6d32eb4ed4fdc8e1af6f1d7df1d0160553eba06da9bc90609b1499a5b684c824ef1b0505788e07a5a9ced05bd66fd4491a1d1bdf702284512
-
Filesize
72KB
MD5e4d06cc97b7f639bb1f6f9147611095e
SHA1969976e808c9e1341cf081d23b2aaa3fe4ca7cd0
SHA25654b8d3f6757cbad47781234f378016d206ae008817e32d6227c8f6da877e510b
SHA5128c7aa1f54d20d2d6d32eb4ed4fdc8e1af6f1d7df1d0160553eba06da9bc90609b1499a5b684c824ef1b0505788e07a5a9ced05bd66fd4491a1d1bdf702284512
-
Filesize
72KB
MD52aaf050a4d169ef7cf8cf0224da78c0b
SHA18dce01d3feb7a63cd0e4832ea72afb60ff6f5ce1
SHA256013619f60149f4855e3586e6009dd2949d2a6ea1d653b3f2f3b13ef50daa872d
SHA51277311ddd12c404c791ab5c13fc10e76ec3f025c56475d68b1b35b92060b55c032fc7b7c8cf6dbbcb6d9ad4a7f24d76386d1a5a046396e37edbb9d6536146fe55
-
Filesize
72KB
MD520dbabd72ef713579015d928d075198e
SHA1b6716d7af9839c1de1b09c8a5f79c170ed7dcddd
SHA256f1f29da69fbc183e064302253854e2a02ab1c9d3fb1a68b64789c9cb8a8b0a50
SHA512d1120b390fd90a2d88c1efa6682ab17f98c2f6f8acf58b8195cc9af639594c260f69a7f38b0e33557ae168b7ee1c2f55bd39880085e0292a5c01a60acb3a06cc
-
Filesize
72KB
MD520dbabd72ef713579015d928d075198e
SHA1b6716d7af9839c1de1b09c8a5f79c170ed7dcddd
SHA256f1f29da69fbc183e064302253854e2a02ab1c9d3fb1a68b64789c9cb8a8b0a50
SHA512d1120b390fd90a2d88c1efa6682ab17f98c2f6f8acf58b8195cc9af639594c260f69a7f38b0e33557ae168b7ee1c2f55bd39880085e0292a5c01a60acb3a06cc
-
Filesize
72KB
MD5dc4cf98affed7e93f3c1139ccb5d0c7a
SHA1f1d63f85c93b811afb2037ea72d93561b99f0c40
SHA256f117a83522ebaa2000f200ba5699fea2a7fb556e34c8e06e93c721eaafe71a6b
SHA5124facb0a76f6ad125af0e96a435e5a922bb17884cc7a6421853c8644c786d2232178b5fa435ce9ef148d016ff76f266e4236a61783dddb2ce89f0269176da7c06
-
Filesize
72KB
MD5dc4cf98affed7e93f3c1139ccb5d0c7a
SHA1f1d63f85c93b811afb2037ea72d93561b99f0c40
SHA256f117a83522ebaa2000f200ba5699fea2a7fb556e34c8e06e93c721eaafe71a6b
SHA5124facb0a76f6ad125af0e96a435e5a922bb17884cc7a6421853c8644c786d2232178b5fa435ce9ef148d016ff76f266e4236a61783dddb2ce89f0269176da7c06
-
Filesize
72KB
MD5621d5fcb5c52a5aeba6280a319f8c41c
SHA11910617e748eeb6750a366a0c9aaeebe0d817bd8
SHA2562fe1e909c8a042e44d7c177a1ce8d3c5bef71d84a5968a1626c990ab614457dc
SHA5120bc2bd3b1e4701faba3b6d548e6f6361ea29bc2cb482e575d0f6ea965d6f2342a8d816f3b70812dac0190a98150ec68aa46b6d8884a24471a404c7901a73aaea
-
Filesize
72KB
MD5621d5fcb5c52a5aeba6280a319f8c41c
SHA11910617e748eeb6750a366a0c9aaeebe0d817bd8
SHA2562fe1e909c8a042e44d7c177a1ce8d3c5bef71d84a5968a1626c990ab614457dc
SHA5120bc2bd3b1e4701faba3b6d548e6f6361ea29bc2cb482e575d0f6ea965d6f2342a8d816f3b70812dac0190a98150ec68aa46b6d8884a24471a404c7901a73aaea
-
Filesize
72KB
MD58da182f44f6c41d981ac8c0e41a92ea5
SHA198d9cc803ec0d1bb569f5cf42d1e9a4dd3e256da
SHA2565e7b307b537b89b67ded60bcc28d432b04a51bc92304b86c5d3f9d2f609e5b5d
SHA5120449b9e0cee43d9a44138b9b427fec0292a52eb42acf3617da0b2ce774070693a9742dce610a14aa0eca3a5d15342a9119960e3662a20eee6e47a679c49ed7a9
-
Filesize
72KB
MD58da182f44f6c41d981ac8c0e41a92ea5
SHA198d9cc803ec0d1bb569f5cf42d1e9a4dd3e256da
SHA2565e7b307b537b89b67ded60bcc28d432b04a51bc92304b86c5d3f9d2f609e5b5d
SHA5120449b9e0cee43d9a44138b9b427fec0292a52eb42acf3617da0b2ce774070693a9742dce610a14aa0eca3a5d15342a9119960e3662a20eee6e47a679c49ed7a9
-
Filesize
72KB
MD5d16e14b757c65a273fe33290df16660f
SHA12bb31f355524494b4a3da4a07703fc0d20b735f4
SHA256af34e979ff9a8b1195358301833ed3244fa87bb0c3876d56e7d2f14a3c0fc5a6
SHA512edf02a971b227be8462fe07696dd8317723fde3b949a43bb08b8fbb98026e779a85a785e8abb80801c5a3452cf066484c12792d9c16371938081ad323e71d5ee
-
Filesize
72KB
MD5d16e14b757c65a273fe33290df16660f
SHA12bb31f355524494b4a3da4a07703fc0d20b735f4
SHA256af34e979ff9a8b1195358301833ed3244fa87bb0c3876d56e7d2f14a3c0fc5a6
SHA512edf02a971b227be8462fe07696dd8317723fde3b949a43bb08b8fbb98026e779a85a785e8abb80801c5a3452cf066484c12792d9c16371938081ad323e71d5ee
-
Filesize
72KB
MD51ae93d2c68dab17390855e5411799545
SHA1600578db51f76bbf6cb797660db562f1dcff14ba
SHA25637e724562182e29a48c81c7c592a02cfefb551f5aaaa9cf109968eaf609d92ee
SHA5123fac0e61ce12313307f2299823fde401ac8ffa3593c405d8136695d3ed02e254f7be683b1d6a6c6a3f7dde06685ea9ab933377afdde5c12c7458579fecbb2c2e
-
Filesize
72KB
MD5ebac74e78942451899858f78e896e922
SHA1ae718de8c267475f86cfd98f4abc48c0aac3e7b0
SHA256f8bec68ae5d25c80ee204a75bdf0dab4930f67bcdc80c27742d31f47b242f646
SHA5121f8f6991a17b72336bcb50372a8ad44994570f487f7a0876ab4857b4346eaa8c30d8d7e5588be0681b30bd3f7b1962d9888e452d6e5dfe99d0568b8e0026fad6
-
Filesize
72KB
MD5ebac74e78942451899858f78e896e922
SHA1ae718de8c267475f86cfd98f4abc48c0aac3e7b0
SHA256f8bec68ae5d25c80ee204a75bdf0dab4930f67bcdc80c27742d31f47b242f646
SHA5121f8f6991a17b72336bcb50372a8ad44994570f487f7a0876ab4857b4346eaa8c30d8d7e5588be0681b30bd3f7b1962d9888e452d6e5dfe99d0568b8e0026fad6
-
Filesize
72KB
MD5621d5fcb5c52a5aeba6280a319f8c41c
SHA11910617e748eeb6750a366a0c9aaeebe0d817bd8
SHA2562fe1e909c8a042e44d7c177a1ce8d3c5bef71d84a5968a1626c990ab614457dc
SHA5120bc2bd3b1e4701faba3b6d548e6f6361ea29bc2cb482e575d0f6ea965d6f2342a8d816f3b70812dac0190a98150ec68aa46b6d8884a24471a404c7901a73aaea
-
Filesize
72KB
MD5621d5fcb5c52a5aeba6280a319f8c41c
SHA11910617e748eeb6750a366a0c9aaeebe0d817bd8
SHA2562fe1e909c8a042e44d7c177a1ce8d3c5bef71d84a5968a1626c990ab614457dc
SHA5120bc2bd3b1e4701faba3b6d548e6f6361ea29bc2cb482e575d0f6ea965d6f2342a8d816f3b70812dac0190a98150ec68aa46b6d8884a24471a404c7901a73aaea
-
Filesize
72KB
MD5a6da333fd1d2ab49cde75d9a4a84cb75
SHA1614ad3e3b75cdc08202f8be461d66fb430debb07
SHA256bbb24322694aa5f8209f7c5a5a9fd1b6cedac9a96f6929c005aa5779a02e3020
SHA51289bf9d6f05ecbe484f5e839ae631d2ea512618a31787027f0370c22d3c44938d6b3b957b6fe52930ad35f9b8704885c6c79a19317fa1d23070b817ad5c099fc5
-
Filesize
72KB
MD5a6da333fd1d2ab49cde75d9a4a84cb75
SHA1614ad3e3b75cdc08202f8be461d66fb430debb07
SHA256bbb24322694aa5f8209f7c5a5a9fd1b6cedac9a96f6929c005aa5779a02e3020
SHA51289bf9d6f05ecbe484f5e839ae631d2ea512618a31787027f0370c22d3c44938d6b3b957b6fe52930ad35f9b8704885c6c79a19317fa1d23070b817ad5c099fc5
-
Filesize
72KB
MD5e597b2a498324fa0010b7d33d9c196bf
SHA1da9cc0975ec1127648b5d54a7622e5cb7f5f3737
SHA2568c90731865738de74544335de5819246ba47f4d8a5f1ecb42001158a0def3443
SHA512affa01a0f1dc154410d34ba9f761a9475f9e1217260d7860433d5cc5df023eed06a081ed630d38f8b656df8eae027fdf2bdb5406408a5edc5b2eb6b15c561148
-
Filesize
72KB
MD5e597b2a498324fa0010b7d33d9c196bf
SHA1da9cc0975ec1127648b5d54a7622e5cb7f5f3737
SHA2568c90731865738de74544335de5819246ba47f4d8a5f1ecb42001158a0def3443
SHA512affa01a0f1dc154410d34ba9f761a9475f9e1217260d7860433d5cc5df023eed06a081ed630d38f8b656df8eae027fdf2bdb5406408a5edc5b2eb6b15c561148
-
Filesize
72KB
MD524ec0419f00f261275e581ace8d91e56
SHA158d9cfdeca59322953b3bb351280f3874e796b07
SHA25686f1b7e42d84df7ce1f341200230a2d3bdb38ca2b6aa00293b60599e564e649a
SHA51226f358a5562f64bfdb2208cfc8b7bb9d180698be83b63d6a133519729507a5d2c269d352dd110d2cc25530949780b82313344f0a63d7d6f9d233dc8633df2c9c
-
Filesize
72KB
MD5c293187596f7f1a7c34bc1a7c4e694af
SHA1cc8283b53bc0fba51a5bcfd18d319a91699d377a
SHA256d50b2677ea48f261869fc6ee48fa73bae5ead4c960351029b110773f1c354fea
SHA512109047bdadc16875df5b7567fd6ab333dcdf2d9042d93bfc16c63b849b171651aeb54e180b279ffdbeac577237f9f0bdc0f06d7f9166e26b54062d47d6f24273
-
Filesize
72KB
MD5c293187596f7f1a7c34bc1a7c4e694af
SHA1cc8283b53bc0fba51a5bcfd18d319a91699d377a
SHA256d50b2677ea48f261869fc6ee48fa73bae5ead4c960351029b110773f1c354fea
SHA512109047bdadc16875df5b7567fd6ab333dcdf2d9042d93bfc16c63b849b171651aeb54e180b279ffdbeac577237f9f0bdc0f06d7f9166e26b54062d47d6f24273
-
Filesize
72KB
MD5e6299fa0c92866ec2c257da1cb71ba06
SHA1206b448e09db69b35062d3b0cabff46aa29e801f
SHA2562a2def2fb39b7891b07be16351d27aa9e9194db41884b3591cdf4845a28dc5d0
SHA512162a4ec255e0867edfb249f124a808dcdac0457355521f80c44316b7f3ac18844f1da013dcedd98d86bf0fbafefa2eef8cc7f07aecf82e042c4670d02cfe65b9
-
Filesize
72KB
MD5e6299fa0c92866ec2c257da1cb71ba06
SHA1206b448e09db69b35062d3b0cabff46aa29e801f
SHA2562a2def2fb39b7891b07be16351d27aa9e9194db41884b3591cdf4845a28dc5d0
SHA512162a4ec255e0867edfb249f124a808dcdac0457355521f80c44316b7f3ac18844f1da013dcedd98d86bf0fbafefa2eef8cc7f07aecf82e042c4670d02cfe65b9
-
Filesize
72KB
MD58da182f44f6c41d981ac8c0e41a92ea5
SHA198d9cc803ec0d1bb569f5cf42d1e9a4dd3e256da
SHA2565e7b307b537b89b67ded60bcc28d432b04a51bc92304b86c5d3f9d2f609e5b5d
SHA5120449b9e0cee43d9a44138b9b427fec0292a52eb42acf3617da0b2ce774070693a9742dce610a14aa0eca3a5d15342a9119960e3662a20eee6e47a679c49ed7a9
-
Filesize
72KB
MD58da182f44f6c41d981ac8c0e41a92ea5
SHA198d9cc803ec0d1bb569f5cf42d1e9a4dd3e256da
SHA2565e7b307b537b89b67ded60bcc28d432b04a51bc92304b86c5d3f9d2f609e5b5d
SHA5120449b9e0cee43d9a44138b9b427fec0292a52eb42acf3617da0b2ce774070693a9742dce610a14aa0eca3a5d15342a9119960e3662a20eee6e47a679c49ed7a9
-
Filesize
72KB
MD507b684e695d19c1658b93f7c11c9c039
SHA1cabc5e54a8691f4926a45cddc334b4dfc1e335eb
SHA256ffc5150d1785339aeb58c47b369c3b96a4553501dd397d7b900444ca344e4794
SHA5120978ba178032bbbdb0b1fc1c8a4a3ac9a0fe9244aa67028e1c67ae7bbfe05fb78efe31ba9fb92fdba1028e7663ed30e768d9597e148f930d47ca1053eac61f16
-
Filesize
72KB
MD507b684e695d19c1658b93f7c11c9c039
SHA1cabc5e54a8691f4926a45cddc334b4dfc1e335eb
SHA256ffc5150d1785339aeb58c47b369c3b96a4553501dd397d7b900444ca344e4794
SHA5120978ba178032bbbdb0b1fc1c8a4a3ac9a0fe9244aa67028e1c67ae7bbfe05fb78efe31ba9fb92fdba1028e7663ed30e768d9597e148f930d47ca1053eac61f16
-
Filesize
72KB
MD5a6da333fd1d2ab49cde75d9a4a84cb75
SHA1614ad3e3b75cdc08202f8be461d66fb430debb07
SHA256bbb24322694aa5f8209f7c5a5a9fd1b6cedac9a96f6929c005aa5779a02e3020
SHA51289bf9d6f05ecbe484f5e839ae631d2ea512618a31787027f0370c22d3c44938d6b3b957b6fe52930ad35f9b8704885c6c79a19317fa1d23070b817ad5c099fc5
-
Filesize
72KB
MD5a6da333fd1d2ab49cde75d9a4a84cb75
SHA1614ad3e3b75cdc08202f8be461d66fb430debb07
SHA256bbb24322694aa5f8209f7c5a5a9fd1b6cedac9a96f6929c005aa5779a02e3020
SHA51289bf9d6f05ecbe484f5e839ae631d2ea512618a31787027f0370c22d3c44938d6b3b957b6fe52930ad35f9b8704885c6c79a19317fa1d23070b817ad5c099fc5
-
Filesize
72KB
MD5a7b7081b6979fb0232c660766f23b8c0
SHA1efab73907fe254eb48920fcf70ff78e9d307f9bf
SHA2560c808786406ecc03ec3a9e5b973c39ceba771a2cb3cf3b45158c2dcf0999b837
SHA512c6950784cfeec78dec8122bdd5b8fc0a8b735e63c2ab34bbfed8846b9ce9aed41f6088800d636fe379ee1e9ff0e4bac0ab95349fe8dfcd52379dcfc0df4ec84a
-
Filesize
72KB
MD5fd281c1f7ef94a748a41ab7e1cd355a3
SHA1a49cb22524bbbc4a99c9acd579aeee5e5e9203a8
SHA256d30d0c97427133ee28161eb1586d37770367540230f522b0f96dedda5c5db92e
SHA512197026b73350d065ba49670034d75319b03ed57a553e24c30e14874077b5f2e87457989c66cf154b71bb9ec084727a6ce232dc4c5b59bfef68d0e063f6001fc9
-
Filesize
72KB
MD5fd281c1f7ef94a748a41ab7e1cd355a3
SHA1a49cb22524bbbc4a99c9acd579aeee5e5e9203a8
SHA256d30d0c97427133ee28161eb1586d37770367540230f522b0f96dedda5c5db92e
SHA512197026b73350d065ba49670034d75319b03ed57a553e24c30e14874077b5f2e87457989c66cf154b71bb9ec084727a6ce232dc4c5b59bfef68d0e063f6001fc9
-
Filesize
72KB
MD5561269c3a6341783724d57b9f44c4a2c
SHA131eac3127c5a1fe297cabeaecab3517f81c13ba3
SHA2568dd1aeef82b57dd78c44c61ed49a7d28469164993fcfdd120e4cda0d25896e91
SHA5122be94076e1f5fbcb9652360c6fc307f2ed55840e2ced6ea419ffa8b93f29cac6fa5f6188183c7e621a63a36a3d0c4959d03fd183c015d243b747b641c7221e39
-
Filesize
72KB
MD5561269c3a6341783724d57b9f44c4a2c
SHA131eac3127c5a1fe297cabeaecab3517f81c13ba3
SHA2568dd1aeef82b57dd78c44c61ed49a7d28469164993fcfdd120e4cda0d25896e91
SHA5122be94076e1f5fbcb9652360c6fc307f2ed55840e2ced6ea419ffa8b93f29cac6fa5f6188183c7e621a63a36a3d0c4959d03fd183c015d243b747b641c7221e39
-
Filesize
72KB
MD58f433cb279b23d79fac4dec01b120ef8
SHA1ee54c40c430fbcc5fbd3e8a48a0979b4fb3d2572
SHA25604f2530a28e60c7b1746cdfe7742550b6b7d5a90e6db3ea6c91dcfad2cf49fc2
SHA512e53d838b1a39100b465c534ab1f743ef61f817a22826da67726c0f4e8e9458e2cd3f6e005779f59a09c1b81c60b70314a9c4d5eb70adf11eeaeced0ef0d4a38e
-
Filesize
72KB
MD504038731b6763850430e0c32061f32bf
SHA1326fac6cb6a3f29d7f2eb0e363a7907c1a6bc345
SHA25699cb5f1b4e8235037b64e615fdd9b4f6d5acd166ef5e2d6ad866465c5b505a3f
SHA512b01186e1a3b37be1fbc9a16df0bf770ae41f1c3bad427771f8cc65ad6a6747d441fe2ada99275592df72cc18558e8f812cf88d520086c18f5d9c2481a52c3dae
-
Filesize
72KB
MD504038731b6763850430e0c32061f32bf
SHA1326fac6cb6a3f29d7f2eb0e363a7907c1a6bc345
SHA25699cb5f1b4e8235037b64e615fdd9b4f6d5acd166ef5e2d6ad866465c5b505a3f
SHA512b01186e1a3b37be1fbc9a16df0bf770ae41f1c3bad427771f8cc65ad6a6747d441fe2ada99275592df72cc18558e8f812cf88d520086c18f5d9c2481a52c3dae
-
Filesize
72KB
MD5e4d06cc97b7f639bb1f6f9147611095e
SHA1969976e808c9e1341cf081d23b2aaa3fe4ca7cd0
SHA25654b8d3f6757cbad47781234f378016d206ae008817e32d6227c8f6da877e510b
SHA5128c7aa1f54d20d2d6d32eb4ed4fdc8e1af6f1d7df1d0160553eba06da9bc90609b1499a5b684c824ef1b0505788e07a5a9ced05bd66fd4491a1d1bdf702284512
-
Filesize
72KB
MD5e4d06cc97b7f639bb1f6f9147611095e
SHA1969976e808c9e1341cf081d23b2aaa3fe4ca7cd0
SHA25654b8d3f6757cbad47781234f378016d206ae008817e32d6227c8f6da877e510b
SHA5128c7aa1f54d20d2d6d32eb4ed4fdc8e1af6f1d7df1d0160553eba06da9bc90609b1499a5b684c824ef1b0505788e07a5a9ced05bd66fd4491a1d1bdf702284512
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53fbdfc6a0bafdcff1db41e5afffe7f39
SHA1aecfb67849aab5196e232c07b316c1da1443d1ab
SHA2566b73888f2cf51f80c71adb14f562517c84533ba3fdcbb3d045c80446de6add89
SHA512d0a9aafb97daf3c9538c4658851bdb1b4a2fcdeb279678ea5d3bd125d3ab33193f064dbf796d1a2523b32ae84b9fb3052e0cadfa5ee4136542ba70ac1d30a5a8
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53fbdfc6a0bafdcff1db41e5afffe7f39
SHA1aecfb67849aab5196e232c07b316c1da1443d1ab
SHA2566b73888f2cf51f80c71adb14f562517c84533ba3fdcbb3d045c80446de6add89
SHA512d0a9aafb97daf3c9538c4658851bdb1b4a2fcdeb279678ea5d3bd125d3ab33193f064dbf796d1a2523b32ae84b9fb3052e0cadfa5ee4136542ba70ac1d30a5a8
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
Filesize
72KB
MD5a431b8f9ec357289fbc6ab4da7a9c9f0
SHA17329e6173e7121fbcfd72ac6c324a2ecea9c356f
SHA2566849079bc26d17d2e6c14dc972b6b6bff947674453086475d1105c49f0727689
SHA512b539cf40f7fd0a303646b628815325193b456875c241fc1985b6d855d01d532ba598442261e8852154116d2ea31e696e28aa40c489c772da8397b0d750317625
-
Filesize
72KB
MD53fbdfc6a0bafdcff1db41e5afffe7f39
SHA1aecfb67849aab5196e232c07b316c1da1443d1ab
SHA2566b73888f2cf51f80c71adb14f562517c84533ba3fdcbb3d045c80446de6add89
SHA512d0a9aafb97daf3c9538c4658851bdb1b4a2fcdeb279678ea5d3bd125d3ab33193f064dbf796d1a2523b32ae84b9fb3052e0cadfa5ee4136542ba70ac1d30a5a8
-
Filesize
72KB
MD53fbdfc6a0bafdcff1db41e5afffe7f39
SHA1aecfb67849aab5196e232c07b316c1da1443d1ab
SHA2566b73888f2cf51f80c71adb14f562517c84533ba3fdcbb3d045c80446de6add89
SHA512d0a9aafb97daf3c9538c4658851bdb1b4a2fcdeb279678ea5d3bd125d3ab33193f064dbf796d1a2523b32ae84b9fb3052e0cadfa5ee4136542ba70ac1d30a5a8
-
Filesize
72KB
MD57dbe0348cccc8e977926fb004e11b005
SHA1d5f87df4a2d6c831de4a4eb3fadcce93c1cc386e
SHA256b2bcd7de92cbdf409b68cc74ff7072a232e16e47b0b25dd95216fdbf9ca99cfe
SHA512eda5768b911c6625b82b901e0e714e95f8fa942e5c0b13f1eb75bfaf4ce168686d8a15b4554e7a815d9e0b7295b76cdf449450268e47bdc301c0107cff611153
-
Filesize
72KB
MD53dc1bef24cbff24299e170a3e823d74d
SHA150cc2a6e19488c53b954be226a7889171cc35da0
SHA256f3acb20308b2e22156465072e0ef2d1fd20dbfa3a8c4d421c5e294524fb6e3c5
SHA512435e63e31f79c9973fba11b53107991aa22f16beb19024d00df12d012d4e852704029a9a37b4ec5fd47e6e71503dc1108dfaa868c060e3b5a339104c90e17488
-
Filesize
72KB
MD53dc1bef24cbff24299e170a3e823d74d
SHA150cc2a6e19488c53b954be226a7889171cc35da0
SHA256f3acb20308b2e22156465072e0ef2d1fd20dbfa3a8c4d421c5e294524fb6e3c5
SHA512435e63e31f79c9973fba11b53107991aa22f16beb19024d00df12d012d4e852704029a9a37b4ec5fd47e6e71503dc1108dfaa868c060e3b5a339104c90e17488
-
Filesize
72KB
MD5c9c505a8bc583b4e1495e8085f8997b1
SHA19b575d4a1a53f6564224cf794b74cc62d5f76ed5
SHA256d572c2e26172225a938ff98bfb86a03e988ee720659d82ef7e97378f25cdf506
SHA512a7cb0b9805e3d098b58ac80be119f29b981df70172e70838c956346ff60933f88f55c82a8d32e9a51dcf15f49773bab822ff90f20f13324a2eaeb9b3565ed6f2
-
Filesize
72KB
MD5c9c505a8bc583b4e1495e8085f8997b1
SHA19b575d4a1a53f6564224cf794b74cc62d5f76ed5
SHA256d572c2e26172225a938ff98bfb86a03e988ee720659d82ef7e97378f25cdf506
SHA512a7cb0b9805e3d098b58ac80be119f29b981df70172e70838c956346ff60933f88f55c82a8d32e9a51dcf15f49773bab822ff90f20f13324a2eaeb9b3565ed6f2
-
Filesize
72KB
MD5e4d06cc97b7f639bb1f6f9147611095e
SHA1969976e808c9e1341cf081d23b2aaa3fe4ca7cd0
SHA25654b8d3f6757cbad47781234f378016d206ae008817e32d6227c8f6da877e510b
SHA5128c7aa1f54d20d2d6d32eb4ed4fdc8e1af6f1d7df1d0160553eba06da9bc90609b1499a5b684c824ef1b0505788e07a5a9ced05bd66fd4491a1d1bdf702284512
-
Filesize
72KB
MD5e4d06cc97b7f639bb1f6f9147611095e
SHA1969976e808c9e1341cf081d23b2aaa3fe4ca7cd0
SHA25654b8d3f6757cbad47781234f378016d206ae008817e32d6227c8f6da877e510b
SHA5128c7aa1f54d20d2d6d32eb4ed4fdc8e1af6f1d7df1d0160553eba06da9bc90609b1499a5b684c824ef1b0505788e07a5a9ced05bd66fd4491a1d1bdf702284512