Analysis
-
max time kernel
175s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 12:26
Static task
static1
Behavioral task
behavioral1
Sample
b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe
Resource
win10v2004-20220812-en
General
-
Target
b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe
-
Size
72KB
-
MD5
03d8d37392b4d5fff3bad1016dc7213b
-
SHA1
b9ebe3189d1ea4a13807c9e0c5e739603d242dcc
-
SHA256
b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13
-
SHA512
bb16405ac6d50c4a9dc4260b27db6347e3e440c6dc371b2fe36a89431dbee68245469d00389f72eb58ddb80c214988d4a2cacdd478df815186c958643aae3011
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2G:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr6
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 38 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 852 backup.exe 1992 backup.exe 1716 backup.exe 1928 backup.exe 1032 backup.exe 1496 backup.exe 876 backup.exe 2004 backup.exe 1404 backup.exe 812 backup.exe 1664 backup.exe 1092 backup.exe 1036 backup.exe 1656 backup.exe 1616 System Restore.exe 800 backup.exe 552 backup.exe 536 backup.exe 1968 backup.exe 2012 backup.exe 1976 backup.exe 276 backup.exe 1608 backup.exe 1212 backup.exe 1312 backup.exe 1032 backup.exe 1292 data.exe 1284 data.exe 832 backup.exe 1428 backup.exe 1408 backup.exe 428 backup.exe 1248 backup.exe 1728 backup.exe 704 backup.exe 1096 backup.exe 1092 backup.exe 1560 backup.exe 988 backup.exe 1912 backup.exe 1480 backup.exe 1468 backup.exe 1632 backup.exe 1028 backup.exe 1008 backup.exe 932 backup.exe 2040 backup.exe 1116 data.exe 1796 backup.exe 1976 backup.exe 1604 backup.exe 1612 data.exe 1700 backup.exe 568 backup.exe 2012 backup.exe 1108 backup.exe 864 backup.exe 1944 backup.exe 1936 backup.exe 1428 backup.exe 976 backup.exe 1624 backup.exe 1064 backup.exe 1672 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 2004 backup.exe 2004 backup.exe 1404 backup.exe 1404 backup.exe 2004 backup.exe 2004 backup.exe 1664 backup.exe 1664 backup.exe 1092 backup.exe 1092 backup.exe 1664 backup.exe 1664 backup.exe 1656 backup.exe 1656 backup.exe 1616 System Restore.exe 1616 System Restore.exe 1616 System Restore.exe 1616 System Restore.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 552 backup.exe 1616 System Restore.exe 2004 backup.exe 1616 System Restore.exe 2004 backup.exe 1664 backup.exe 1656 backup.exe 552 backup.exe 552 backup.exe 1656 backup.exe 1664 backup.exe 1616 System Restore.exe 552 backup.exe -
Drops file in Program Files directory 56 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe data.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe System Restore.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\data.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe data.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe -
Suspicious use of SetWindowsHookEx 61 IoCs
pid Process 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 852 backup.exe 1992 backup.exe 1716 backup.exe 1928 backup.exe 1032 backup.exe 1496 backup.exe 876 backup.exe 2004 backup.exe 1404 backup.exe 812 backup.exe 1664 backup.exe 1092 backup.exe 1036 backup.exe 1656 backup.exe 1616 System Restore.exe 800 backup.exe 552 backup.exe 536 backup.exe 1968 backup.exe 2012 backup.exe 1976 backup.exe 276 backup.exe 1608 backup.exe 1212 backup.exe 1312 backup.exe 1032 backup.exe 1292 data.exe 1284 data.exe 832 backup.exe 1408 backup.exe 1428 backup.exe 428 backup.exe 1728 backup.exe 1248 backup.exe 1096 backup.exe 704 backup.exe 1092 backup.exe 1560 backup.exe 1912 backup.exe 1480 backup.exe 1008 backup.exe 988 backup.exe 932 backup.exe 1632 backup.exe 1028 backup.exe 1468 backup.exe 2040 backup.exe 1116 data.exe 1976 backup.exe 1700 backup.exe 1604 backup.exe 1612 data.exe 1108 backup.exe 1796 backup.exe 2012 backup.exe 568 backup.exe 864 backup.exe 1428 backup.exe 1944 backup.exe 1936 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 852 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 27 PID 1904 wrote to memory of 852 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 27 PID 1904 wrote to memory of 852 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 27 PID 1904 wrote to memory of 852 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 27 PID 1904 wrote to memory of 1992 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 28 PID 1904 wrote to memory of 1992 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 28 PID 1904 wrote to memory of 1992 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 28 PID 1904 wrote to memory of 1992 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 28 PID 1904 wrote to memory of 1716 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 29 PID 1904 wrote to memory of 1716 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 29 PID 1904 wrote to memory of 1716 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 29 PID 1904 wrote to memory of 1716 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 29 PID 1904 wrote to memory of 1928 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 30 PID 1904 wrote to memory of 1928 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 30 PID 1904 wrote to memory of 1928 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 30 PID 1904 wrote to memory of 1928 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 30 PID 1904 wrote to memory of 1032 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 31 PID 1904 wrote to memory of 1032 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 31 PID 1904 wrote to memory of 1032 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 31 PID 1904 wrote to memory of 1032 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 31 PID 1904 wrote to memory of 1496 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 32 PID 1904 wrote to memory of 1496 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 32 PID 1904 wrote to memory of 1496 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 32 PID 1904 wrote to memory of 1496 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 32 PID 1904 wrote to memory of 876 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 33 PID 1904 wrote to memory of 876 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 33 PID 1904 wrote to memory of 876 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 33 PID 1904 wrote to memory of 876 1904 b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe 33 PID 852 wrote to memory of 2004 852 backup.exe 34 PID 852 wrote to memory of 2004 852 backup.exe 34 PID 852 wrote to memory of 2004 852 backup.exe 34 PID 852 wrote to memory of 2004 852 backup.exe 34 PID 2004 wrote to memory of 1404 2004 backup.exe 35 PID 2004 wrote to memory of 1404 2004 backup.exe 35 PID 2004 wrote to memory of 1404 2004 backup.exe 35 PID 2004 wrote to memory of 1404 2004 backup.exe 35 PID 1404 wrote to memory of 812 1404 backup.exe 36 PID 1404 wrote to memory of 812 1404 backup.exe 36 PID 1404 wrote to memory of 812 1404 backup.exe 36 PID 1404 wrote to memory of 812 1404 backup.exe 36 PID 2004 wrote to memory of 1664 2004 backup.exe 37 PID 2004 wrote to memory of 1664 2004 backup.exe 37 PID 2004 wrote to memory of 1664 2004 backup.exe 37 PID 2004 wrote to memory of 1664 2004 backup.exe 37 PID 1664 wrote to memory of 1092 1664 backup.exe 38 PID 1664 wrote to memory of 1092 1664 backup.exe 38 PID 1664 wrote to memory of 1092 1664 backup.exe 38 PID 1664 wrote to memory of 1092 1664 backup.exe 38 PID 1092 wrote to memory of 1036 1092 backup.exe 39 PID 1092 wrote to memory of 1036 1092 backup.exe 39 PID 1092 wrote to memory of 1036 1092 backup.exe 39 PID 1092 wrote to memory of 1036 1092 backup.exe 39 PID 1664 wrote to memory of 1656 1664 backup.exe 40 PID 1664 wrote to memory of 1656 1664 backup.exe 40 PID 1664 wrote to memory of 1656 1664 backup.exe 40 PID 1664 wrote to memory of 1656 1664 backup.exe 40 PID 1656 wrote to memory of 1616 1656 backup.exe 41 PID 1656 wrote to memory of 1616 1656 backup.exe 41 PID 1656 wrote to memory of 1616 1656 backup.exe 41 PID 1656 wrote to memory of 1616 1656 backup.exe 41 PID 1616 wrote to memory of 800 1616 System Restore.exe 42 PID 1616 wrote to memory of 800 1616 System Restore.exe 42 PID 1616 wrote to memory of 800 1616 System Restore.exe 42 PID 1616 wrote to memory of 800 1616 System Restore.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe"C:\Users\Admin\AppData\Local\Temp\b8a225fe61652868daa3732f9a753feecbfa38bdc356bddf53dfe23e7ff93c13.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\1052766038\backup.exeC:\Users\Admin\AppData\Local\Temp\1052766038\backup.exe C:\Users\Admin\AppData\Local\Temp\1052766038\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:852 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2004 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:812
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1664 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1092 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1036
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1656 -
C:\Program Files\Common Files\Microsoft Shared\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1616 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:800
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:552 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1976
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:276
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1312
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:428
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:1144
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Executes dropped EXE
PID:976
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:704
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
PID:1064
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1476
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:704 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1708
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1428
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248
-
-
C:\Program Files\Common Files\System\data.exe"C:\Program Files\Common Files\System\data.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1116 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1884
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:988
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:568
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
PID:1624
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1992
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1096 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1988
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:832 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1912 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵PID:1000
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
PID:1672
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1124
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1092 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5cc6df0d1fcae965cb73c5e3c3bc38b1a
SHA1fdcfa5a19babdcb24f6309f075f703198295bb70
SHA2560ccb4b01089ccd6f13b78507213b553fc3398a48b2c029c94d208e0e2a46bcd5
SHA512f915d3393ef82a04822681d8039774ebaa43e59336197d79bb99c935d5ecf9a9f1a7edf2da4de7ebaea91c37dcc93f41f5be23911a1ea14caa0f0feb662cc390
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD50aecdae6e48e1ea21ecd7ab65b002c1f
SHA1b0658d123e324e2d470cf34e86f92b8c8192c9bd
SHA256e33e3441aa54a2af966d7ecf419ddf2b26feec977e5c2cae537eadcc2a1321fc
SHA51218e8626b6a4e2736ad2da7063205b014d1d9ae8dda07abb8123b9fc66ca3798c7205d81a281a2a31cc961a6e5a0e5cabf6ef05260c7a932d4410fcfae100293a
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD584c295b46e5175ec228dcfc90b512938
SHA15a6e140c0f1dc3162d188f709ffbd3d1c9096781
SHA25699f8e1158175fdaf5afa563ff3bc4989e3b186b9430d83889441f86d69493483
SHA512531d5b1d2adc7eaa2d1f6729d68fba5dae3897489234b56c9699cc9ed7aaf6389db067bd93cbcfad3d014e42131e72f83ae36701db134ab008bf7c1e8c85ce01
-
Filesize
72KB
MD50aecdae6e48e1ea21ecd7ab65b002c1f
SHA1b0658d123e324e2d470cf34e86f92b8c8192c9bd
SHA256e33e3441aa54a2af966d7ecf419ddf2b26feec977e5c2cae537eadcc2a1321fc
SHA51218e8626b6a4e2736ad2da7063205b014d1d9ae8dda07abb8123b9fc66ca3798c7205d81a281a2a31cc961a6e5a0e5cabf6ef05260c7a932d4410fcfae100293a
-
Filesize
72KB
MD50aecdae6e48e1ea21ecd7ab65b002c1f
SHA1b0658d123e324e2d470cf34e86f92b8c8192c9bd
SHA256e33e3441aa54a2af966d7ecf419ddf2b26feec977e5c2cae537eadcc2a1321fc
SHA51218e8626b6a4e2736ad2da7063205b014d1d9ae8dda07abb8123b9fc66ca3798c7205d81a281a2a31cc961a6e5a0e5cabf6ef05260c7a932d4410fcfae100293a
-
Filesize
72KB
MD5819c2d18b109d92cbe321bc323e98fa9
SHA1fb8e64e6c99eb749e34d2c7ad01b3c4f37f48940
SHA2567463cd4cb1577fd99e40f5f9be1bf442819d80df5e8cd656e589746d43849e62
SHA512944ea5bf8236ce12025b4a19603e7b22d83870caea8466b04dd2407136c279eb3fbb31133b386dd0d74c4c41a79778a27d753de469e44ba135f52507c8e0c682
-
Filesize
72KB
MD584c295b46e5175ec228dcfc90b512938
SHA15a6e140c0f1dc3162d188f709ffbd3d1c9096781
SHA25699f8e1158175fdaf5afa563ff3bc4989e3b186b9430d83889441f86d69493483
SHA512531d5b1d2adc7eaa2d1f6729d68fba5dae3897489234b56c9699cc9ed7aaf6389db067bd93cbcfad3d014e42131e72f83ae36701db134ab008bf7c1e8c85ce01
-
Filesize
72KB
MD584c295b46e5175ec228dcfc90b512938
SHA15a6e140c0f1dc3162d188f709ffbd3d1c9096781
SHA25699f8e1158175fdaf5afa563ff3bc4989e3b186b9430d83889441f86d69493483
SHA512531d5b1d2adc7eaa2d1f6729d68fba5dae3897489234b56c9699cc9ed7aaf6389db067bd93cbcfad3d014e42131e72f83ae36701db134ab008bf7c1e8c85ce01
-
Filesize
72KB
MD5819c2d18b109d92cbe321bc323e98fa9
SHA1fb8e64e6c99eb749e34d2c7ad01b3c4f37f48940
SHA2567463cd4cb1577fd99e40f5f9be1bf442819d80df5e8cd656e589746d43849e62
SHA512944ea5bf8236ce12025b4a19603e7b22d83870caea8466b04dd2407136c279eb3fbb31133b386dd0d74c4c41a79778a27d753de469e44ba135f52507c8e0c682
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD50705f86cc7b7fd69f75fc45736c9b3fc
SHA1df108c021877f0b7e1a3d3aa322b9862d1f3424d
SHA25642bd1dd21396051783c15c212b8cc28978d03e67848295af63d9b60ba2baea1b
SHA5122061bdf4325a8212f35467e72aecf76ac62e8b230bcba39ce9b58d89974b0841392b80c693ea63720438fbe0fc6f206752418598090fb3adad1a5b1fa9ea79eb
-
Filesize
72KB
MD50705f86cc7b7fd69f75fc45736c9b3fc
SHA1df108c021877f0b7e1a3d3aa322b9862d1f3424d
SHA25642bd1dd21396051783c15c212b8cc28978d03e67848295af63d9b60ba2baea1b
SHA5122061bdf4325a8212f35467e72aecf76ac62e8b230bcba39ce9b58d89974b0841392b80c693ea63720438fbe0fc6f206752418598090fb3adad1a5b1fa9ea79eb
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5f7de6ef03b03f750369928d285e14d81
SHA1978b9cb9d6fbd0f9388ddf60bf17a36e20e7628f
SHA25600f0b81cf1c91bc999d72352c5f21ad46828782a46202f0699b9a0a5706bd440
SHA512fbbe3168998fefe0ac8d9416a61f1afd674d459f52272f47ea34e051a0068631b2371c65ac4ca4cba6f9f0af111c84b2061b50866c007f3a7a104cc0712b7fb5
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5d59e4e1596eed6d75d66c63fcf8d0034
SHA1f0c0015465bafa81830452a2e20cd5524001f40f
SHA256c82e2b598b072d96f029c24ad156fad82d020491c9f2b2044097d77036df4f38
SHA5122177eff809aef23d63944f86ed505c5e34e068a6b203175611ffaba862219f1b081fcb79914483f47743ab4f5b8933f9bfb3fc98cb37243c514581f12278ac28
-
Filesize
72KB
MD5d59e4e1596eed6d75d66c63fcf8d0034
SHA1f0c0015465bafa81830452a2e20cd5524001f40f
SHA256c82e2b598b072d96f029c24ad156fad82d020491c9f2b2044097d77036df4f38
SHA5122177eff809aef23d63944f86ed505c5e34e068a6b203175611ffaba862219f1b081fcb79914483f47743ab4f5b8933f9bfb3fc98cb37243c514581f12278ac28
-
Filesize
72KB
MD5cc6df0d1fcae965cb73c5e3c3bc38b1a
SHA1fdcfa5a19babdcb24f6309f075f703198295bb70
SHA2560ccb4b01089ccd6f13b78507213b553fc3398a48b2c029c94d208e0e2a46bcd5
SHA512f915d3393ef82a04822681d8039774ebaa43e59336197d79bb99c935d5ecf9a9f1a7edf2da4de7ebaea91c37dcc93f41f5be23911a1ea14caa0f0feb662cc390
-
Filesize
72KB
MD5cc6df0d1fcae965cb73c5e3c3bc38b1a
SHA1fdcfa5a19babdcb24f6309f075f703198295bb70
SHA2560ccb4b01089ccd6f13b78507213b553fc3398a48b2c029c94d208e0e2a46bcd5
SHA512f915d3393ef82a04822681d8039774ebaa43e59336197d79bb99c935d5ecf9a9f1a7edf2da4de7ebaea91c37dcc93f41f5be23911a1ea14caa0f0feb662cc390
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD50aecdae6e48e1ea21ecd7ab65b002c1f
SHA1b0658d123e324e2d470cf34e86f92b8c8192c9bd
SHA256e33e3441aa54a2af966d7ecf419ddf2b26feec977e5c2cae537eadcc2a1321fc
SHA51218e8626b6a4e2736ad2da7063205b014d1d9ae8dda07abb8123b9fc66ca3798c7205d81a281a2a31cc961a6e5a0e5cabf6ef05260c7a932d4410fcfae100293a
-
Filesize
72KB
MD50aecdae6e48e1ea21ecd7ab65b002c1f
SHA1b0658d123e324e2d470cf34e86f92b8c8192c9bd
SHA256e33e3441aa54a2af966d7ecf419ddf2b26feec977e5c2cae537eadcc2a1321fc
SHA51218e8626b6a4e2736ad2da7063205b014d1d9ae8dda07abb8123b9fc66ca3798c7205d81a281a2a31cc961a6e5a0e5cabf6ef05260c7a932d4410fcfae100293a
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD584c295b46e5175ec228dcfc90b512938
SHA15a6e140c0f1dc3162d188f709ffbd3d1c9096781
SHA25699f8e1158175fdaf5afa563ff3bc4989e3b186b9430d83889441f86d69493483
SHA512531d5b1d2adc7eaa2d1f6729d68fba5dae3897489234b56c9699cc9ed7aaf6389db067bd93cbcfad3d014e42131e72f83ae36701db134ab008bf7c1e8c85ce01
-
Filesize
72KB
MD584c295b46e5175ec228dcfc90b512938
SHA15a6e140c0f1dc3162d188f709ffbd3d1c9096781
SHA25699f8e1158175fdaf5afa563ff3bc4989e3b186b9430d83889441f86d69493483
SHA512531d5b1d2adc7eaa2d1f6729d68fba5dae3897489234b56c9699cc9ed7aaf6389db067bd93cbcfad3d014e42131e72f83ae36701db134ab008bf7c1e8c85ce01
-
Filesize
72KB
MD50aecdae6e48e1ea21ecd7ab65b002c1f
SHA1b0658d123e324e2d470cf34e86f92b8c8192c9bd
SHA256e33e3441aa54a2af966d7ecf419ddf2b26feec977e5c2cae537eadcc2a1321fc
SHA51218e8626b6a4e2736ad2da7063205b014d1d9ae8dda07abb8123b9fc66ca3798c7205d81a281a2a31cc961a6e5a0e5cabf6ef05260c7a932d4410fcfae100293a
-
Filesize
72KB
MD50aecdae6e48e1ea21ecd7ab65b002c1f
SHA1b0658d123e324e2d470cf34e86f92b8c8192c9bd
SHA256e33e3441aa54a2af966d7ecf419ddf2b26feec977e5c2cae537eadcc2a1321fc
SHA51218e8626b6a4e2736ad2da7063205b014d1d9ae8dda07abb8123b9fc66ca3798c7205d81a281a2a31cc961a6e5a0e5cabf6ef05260c7a932d4410fcfae100293a
-
Filesize
72KB
MD5819c2d18b109d92cbe321bc323e98fa9
SHA1fb8e64e6c99eb749e34d2c7ad01b3c4f37f48940
SHA2567463cd4cb1577fd99e40f5f9be1bf442819d80df5e8cd656e589746d43849e62
SHA512944ea5bf8236ce12025b4a19603e7b22d83870caea8466b04dd2407136c279eb3fbb31133b386dd0d74c4c41a79778a27d753de469e44ba135f52507c8e0c682
-
Filesize
72KB
MD5819c2d18b109d92cbe321bc323e98fa9
SHA1fb8e64e6c99eb749e34d2c7ad01b3c4f37f48940
SHA2567463cd4cb1577fd99e40f5f9be1bf442819d80df5e8cd656e589746d43849e62
SHA512944ea5bf8236ce12025b4a19603e7b22d83870caea8466b04dd2407136c279eb3fbb31133b386dd0d74c4c41a79778a27d753de469e44ba135f52507c8e0c682
-
Filesize
72KB
MD584c295b46e5175ec228dcfc90b512938
SHA15a6e140c0f1dc3162d188f709ffbd3d1c9096781
SHA25699f8e1158175fdaf5afa563ff3bc4989e3b186b9430d83889441f86d69493483
SHA512531d5b1d2adc7eaa2d1f6729d68fba5dae3897489234b56c9699cc9ed7aaf6389db067bd93cbcfad3d014e42131e72f83ae36701db134ab008bf7c1e8c85ce01
-
Filesize
72KB
MD584c295b46e5175ec228dcfc90b512938
SHA15a6e140c0f1dc3162d188f709ffbd3d1c9096781
SHA25699f8e1158175fdaf5afa563ff3bc4989e3b186b9430d83889441f86d69493483
SHA512531d5b1d2adc7eaa2d1f6729d68fba5dae3897489234b56c9699cc9ed7aaf6389db067bd93cbcfad3d014e42131e72f83ae36701db134ab008bf7c1e8c85ce01
-
Filesize
72KB
MD5819c2d18b109d92cbe321bc323e98fa9
SHA1fb8e64e6c99eb749e34d2c7ad01b3c4f37f48940
SHA2567463cd4cb1577fd99e40f5f9be1bf442819d80df5e8cd656e589746d43849e62
SHA512944ea5bf8236ce12025b4a19603e7b22d83870caea8466b04dd2407136c279eb3fbb31133b386dd0d74c4c41a79778a27d753de469e44ba135f52507c8e0c682
-
Filesize
72KB
MD5819c2d18b109d92cbe321bc323e98fa9
SHA1fb8e64e6c99eb749e34d2c7ad01b3c4f37f48940
SHA2567463cd4cb1577fd99e40f5f9be1bf442819d80df5e8cd656e589746d43849e62
SHA512944ea5bf8236ce12025b4a19603e7b22d83870caea8466b04dd2407136c279eb3fbb31133b386dd0d74c4c41a79778a27d753de469e44ba135f52507c8e0c682
-
Filesize
72KB
MD5819c2d18b109d92cbe321bc323e98fa9
SHA1fb8e64e6c99eb749e34d2c7ad01b3c4f37f48940
SHA2567463cd4cb1577fd99e40f5f9be1bf442819d80df5e8cd656e589746d43849e62
SHA512944ea5bf8236ce12025b4a19603e7b22d83870caea8466b04dd2407136c279eb3fbb31133b386dd0d74c4c41a79778a27d753de469e44ba135f52507c8e0c682
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD56294f12227cd4354c36f16770e1a2ce5
SHA1e0b7f740478bd48aa62a72f3eec38e1592181c52
SHA256ac56f03fff0c881167604f8420b5ecbd8bec47e986ef430196f41aa96c8aafd4
SHA512f25ed6fff43fe9d42845cf7c349b7bb0d0f032939c84236784b732dc6038daeb3dd8910ce9be0058b9ab9266a80e398cc0ff81030d76986724b03d2b1d4eb467
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD51550be3147b310fc40d4daa0ee754c96
SHA180ee5bace602f21ee5d1152d24465e8b743c68a9
SHA2567bb9459ab283d8a912f56dab5bb9ea733d5ab3ce4df949f7fe918c9457799817
SHA512c89d35416ffe3ce8775fbf340b7f74b9af78136b6d0f0e03a9e5873023403efaf963ec75e27f7941b54fff86552fb41220facdf60e8e2bb507836ecec70b0092
-
Filesize
72KB
MD50705f86cc7b7fd69f75fc45736c9b3fc
SHA1df108c021877f0b7e1a3d3aa322b9862d1f3424d
SHA25642bd1dd21396051783c15c212b8cc28978d03e67848295af63d9b60ba2baea1b
SHA5122061bdf4325a8212f35467e72aecf76ac62e8b230bcba39ce9b58d89974b0841392b80c693ea63720438fbe0fc6f206752418598090fb3adad1a5b1fa9ea79eb
-
Filesize
72KB
MD50705f86cc7b7fd69f75fc45736c9b3fc
SHA1df108c021877f0b7e1a3d3aa322b9862d1f3424d
SHA25642bd1dd21396051783c15c212b8cc28978d03e67848295af63d9b60ba2baea1b
SHA5122061bdf4325a8212f35467e72aecf76ac62e8b230bcba39ce9b58d89974b0841392b80c693ea63720438fbe0fc6f206752418598090fb3adad1a5b1fa9ea79eb
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5f7de6ef03b03f750369928d285e14d81
SHA1978b9cb9d6fbd0f9388ddf60bf17a36e20e7628f
SHA25600f0b81cf1c91bc999d72352c5f21ad46828782a46202f0699b9a0a5706bd440
SHA512fbbe3168998fefe0ac8d9416a61f1afd674d459f52272f47ea34e051a0068631b2371c65ac4ca4cba6f9f0af111c84b2061b50866c007f3a7a104cc0712b7fb5
-
Filesize
72KB
MD5f7de6ef03b03f750369928d285e14d81
SHA1978b9cb9d6fbd0f9388ddf60bf17a36e20e7628f
SHA25600f0b81cf1c91bc999d72352c5f21ad46828782a46202f0699b9a0a5706bd440
SHA512fbbe3168998fefe0ac8d9416a61f1afd674d459f52272f47ea34e051a0068631b2371c65ac4ca4cba6f9f0af111c84b2061b50866c007f3a7a104cc0712b7fb5
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b
-
Filesize
72KB
MD5b11ac99f313d17310d3b6843f4dcdd03
SHA15d3dafa97317179fda6a53461fbc53e7dff47d23
SHA25642034aa33666d5859c69033ebf540da09c5e4fc1e0558616d17ae8b033cf0d51
SHA5129afd3241a7d73fe8de40c3683a4f81457927d20a4ed88fde0a3e280cf27d0faf29991b444f6dbc6d0e0e20f42a819da779379c22501bd6b689dbd2a9aa28012b