Analysis
-
max time kernel
120s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe
Resource
win10v2004-20220812-en
General
-
Target
8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe
-
Size
72KB
-
MD5
04d2131c9cbf0cf1a940828771551075
-
SHA1
cd141cc56dc429ea6360ead1556036c090640205
-
SHA256
8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10
-
SHA512
7214a6e28404f7c1e394783ed8ecf6458c23d315ef46fab3978fe7e88464b3d0734b6514e294b7346fe26682d4774aa95b26ca3bac623e3c53cc2998814fd30f
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2s:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrA
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 56 IoCs
pid Process 1608 backup.exe 1560 backup.exe 1396 backup.exe 1228 backup.exe 1320 backup.exe 636 backup.exe 1880 backup.exe 1244 backup.exe 1708 backup.exe 1944 backup.exe 1612 data.exe 676 backup.exe 1192 backup.exe 1972 backup.exe 640 backup.exe 1248 backup.exe 1780 backup.exe 2000 backup.exe 1544 backup.exe 1624 backup.exe 1632 backup.exe 1424 backup.exe 1116 backup.exe 1228 backup.exe 1264 backup.exe 1924 backup.exe 392 backup.exe 1704 backup.exe 432 backup.exe 1328 backup.exe 1084 backup.exe 324 backup.exe 1936 backup.exe 2036 backup.exe 1744 data.exe 1820 System Restore.exe 1788 backup.exe 1292 backup.exe 1400 data.exe 1192 backup.exe 1148 backup.exe 584 backup.exe 988 backup.exe 1384 backup.exe 1796 backup.exe 956 backup.exe 972 backup.exe 1376 backup.exe 1200 backup.exe 960 backup.exe 1424 backup.exe 1932 backup.exe 1276 backup.exe 1928 backup.exe 840 backup.exe 580 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 636 backup.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 636 backup.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 1244 backup.exe 1244 backup.exe 636 backup.exe 636 backup.exe 1612 data.exe 1612 data.exe 676 backup.exe 676 backup.exe 1612 data.exe 1612 data.exe 1972 backup.exe 1972 backup.exe 640 backup.exe 640 backup.exe 640 backup.exe 640 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 636 backup.exe 1612 data.exe 636 backup.exe 640 backup.exe 640 backup.exe 1972 backup.exe 1972 backup.exe 1612 data.exe 1780 backup.exe 1780 backup.exe 1612 data.exe 1972 backup.exe 1972 backup.exe 1612 data.exe 640 backup.exe 640 backup.exe -
Drops file in Program Files directory 44 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe data.exe File opened for modification C:\Program Files\7-Zip\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\data.exe backup.exe File opened for modification C:\Program Files\data.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe -
Suspicious use of SetWindowsHookEx 55 IoCs
pid Process 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 1608 backup.exe 1560 backup.exe 1396 backup.exe 1228 backup.exe 1320 backup.exe 636 backup.exe 1880 backup.exe 1244 backup.exe 1708 backup.exe 1944 backup.exe 1612 data.exe 676 backup.exe 1192 backup.exe 1972 backup.exe 640 backup.exe 1248 backup.exe 1780 backup.exe 2000 backup.exe 1544 backup.exe 1624 backup.exe 1632 backup.exe 1424 backup.exe 1116 backup.exe 1228 backup.exe 1264 backup.exe 1924 backup.exe 1704 backup.exe 432 backup.exe 392 backup.exe 1328 backup.exe 324 backup.exe 1936 backup.exe 1084 backup.exe 2036 backup.exe 1400 data.exe 1820 System Restore.exe 1744 data.exe 584 backup.exe 1788 backup.exe 1292 backup.exe 1192 backup.exe 1148 backup.exe 956 backup.exe 960 backup.exe 1796 backup.exe 972 backup.exe 988 backup.exe 1200 backup.exe 1376 backup.exe 1424 backup.exe 840 backup.exe 1932 backup.exe 1276 backup.exe 580 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 916 wrote to memory of 1608 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 27 PID 916 wrote to memory of 1608 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 27 PID 916 wrote to memory of 1608 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 27 PID 916 wrote to memory of 1608 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 27 PID 916 wrote to memory of 1560 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 28 PID 916 wrote to memory of 1560 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 28 PID 916 wrote to memory of 1560 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 28 PID 916 wrote to memory of 1560 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 28 PID 916 wrote to memory of 1396 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 29 PID 916 wrote to memory of 1396 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 29 PID 916 wrote to memory of 1396 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 29 PID 916 wrote to memory of 1396 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 29 PID 916 wrote to memory of 1228 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 30 PID 916 wrote to memory of 1228 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 30 PID 916 wrote to memory of 1228 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 30 PID 916 wrote to memory of 1228 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 30 PID 916 wrote to memory of 1320 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 31 PID 916 wrote to memory of 1320 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 31 PID 916 wrote to memory of 1320 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 31 PID 916 wrote to memory of 1320 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 31 PID 1608 wrote to memory of 636 1608 backup.exe 32 PID 1608 wrote to memory of 636 1608 backup.exe 32 PID 1608 wrote to memory of 636 1608 backup.exe 32 PID 1608 wrote to memory of 636 1608 backup.exe 32 PID 916 wrote to memory of 1880 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 34 PID 916 wrote to memory of 1880 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 34 PID 916 wrote to memory of 1880 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 34 PID 916 wrote to memory of 1880 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 34 PID 636 wrote to memory of 1244 636 backup.exe 33 PID 636 wrote to memory of 1244 636 backup.exe 33 PID 636 wrote to memory of 1244 636 backup.exe 33 PID 636 wrote to memory of 1244 636 backup.exe 33 PID 916 wrote to memory of 1708 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 35 PID 916 wrote to memory of 1708 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 35 PID 916 wrote to memory of 1708 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 35 PID 916 wrote to memory of 1708 916 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe 35 PID 1244 wrote to memory of 1944 1244 backup.exe 36 PID 1244 wrote to memory of 1944 1244 backup.exe 36 PID 1244 wrote to memory of 1944 1244 backup.exe 36 PID 1244 wrote to memory of 1944 1244 backup.exe 36 PID 636 wrote to memory of 1612 636 backup.exe 37 PID 636 wrote to memory of 1612 636 backup.exe 37 PID 636 wrote to memory of 1612 636 backup.exe 37 PID 636 wrote to memory of 1612 636 backup.exe 37 PID 1612 wrote to memory of 676 1612 data.exe 38 PID 1612 wrote to memory of 676 1612 data.exe 38 PID 1612 wrote to memory of 676 1612 data.exe 38 PID 1612 wrote to memory of 676 1612 data.exe 38 PID 676 wrote to memory of 1192 676 backup.exe 39 PID 676 wrote to memory of 1192 676 backup.exe 39 PID 676 wrote to memory of 1192 676 backup.exe 39 PID 676 wrote to memory of 1192 676 backup.exe 39 PID 1612 wrote to memory of 1972 1612 data.exe 40 PID 1612 wrote to memory of 1972 1612 data.exe 40 PID 1612 wrote to memory of 1972 1612 data.exe 40 PID 1612 wrote to memory of 1972 1612 data.exe 40 PID 1972 wrote to memory of 640 1972 backup.exe 41 PID 1972 wrote to memory of 640 1972 backup.exe 41 PID 1972 wrote to memory of 640 1972 backup.exe 41 PID 1972 wrote to memory of 640 1972 backup.exe 41 PID 640 wrote to memory of 1248 640 backup.exe 42 PID 640 wrote to memory of 1248 640 backup.exe 42 PID 640 wrote to memory of 1248 640 backup.exe 42 PID 640 wrote to memory of 1248 640 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe"C:\Users\Admin\AppData\Local\Temp\8e392f08293fc8ea249545b62fa48f77ec46dedf8002dfb97c3c2f7102e77e10.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:916 -
C:\Users\Admin\AppData\Local\Temp\3958211657\backup.exeC:\Users\Admin\AppData\Local\Temp\3958211657\backup.exe C:\Users\Admin\AppData\Local\Temp\3958211657\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:636 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1244 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944
-
-
-
C:\Program Files\data.exe"C:\Program Files\data.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1612 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:676 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1972 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:640 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1248
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1780 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1424
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1116
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1228
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1328
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1796
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Executes dropped EXE
PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:2044
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1760
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:392 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1424
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:868
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1084
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1996
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1936 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:692
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:1192
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:1708
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1636
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1560
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1084 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1148
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:1732
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1600
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:428
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1292
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1116
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:988
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1144
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:844
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:324 -
C:\Program Files\Google\Chrome\data.exe"C:\Program Files\Google\Chrome\data.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1744 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:972 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:880
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\update.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\update.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\System Restore.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\System Restore.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1724
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:2008
-
C:\Program Files\Internet Explorer\de-DE\update.exe"C:\Program Files\Internet Explorer\de-DE\update.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1552
-
-
C:\Program Files\Internet Explorer\en-US\update.exe"C:\Program Files\Internet Explorer\en-US\update.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:2028
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1820
-
-
C:\Program Files\Microsoft Games\System Restore.exe"C:\Program Files\Microsoft Games\System Restore.exe" C:\Program Files\Microsoft Games\5⤵PID:1364
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:432 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:584 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1740
-
-
C:\Program Files (x86)\Google\data.exe"C:\Program Files (x86)\Google\data.exe" C:\Program Files (x86)\Google\5⤵PID:1880
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1788 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:1036
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:1400
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1524
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1028
-
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:1432
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:1312
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5108d69c82101a71c1d1c77f2112d8a32
SHA1ed11bda35ca9e2db975cb00d4e1e3dcd8af7d85e
SHA25679c691918a458f4d67b0a4656dbe00f1a8fb89c1246148e0f6df5901c6bd3abb
SHA512dfc17d80b5cc724e635132d376eaab943c818277d8f019c052960e2f48b093f86a271876a39fc9f9c1ffea6a7199848cda45880404708433f08811cb6f951074
-
Filesize
72KB
MD5728993a442b26131cb19d5ccd27777fa
SHA1482675e50a916ebdd74f107e9c2e46f56a37a41e
SHA256433c3d80f59d520eacd522760e4df01220012f6a73ce41615dd7b31ef137f90d
SHA512535c7b9cf6de6a0c10673d5a99ad5af7999a521d6319ca5d7acb98cdc95cb99f974f6ef4854ae78784224af85e5c04d2e21507e7661e70582b621ec961425821
-
Filesize
72KB
MD5728993a442b26131cb19d5ccd27777fa
SHA1482675e50a916ebdd74f107e9c2e46f56a37a41e
SHA256433c3d80f59d520eacd522760e4df01220012f6a73ce41615dd7b31ef137f90d
SHA512535c7b9cf6de6a0c10673d5a99ad5af7999a521d6319ca5d7acb98cdc95cb99f974f6ef4854ae78784224af85e5c04d2e21507e7661e70582b621ec961425821
-
Filesize
72KB
MD58804f4aa19513f7c3cb683dc848e2bf5
SHA1378656a386b2e8252de2322fc70158a248e3fef0
SHA2562566c4bb5ffa98dbc53d66fd3181b515d565f4c83e3c5d05e4b272a26cfd1c7f
SHA5124f11177e8e4091084e3d4cc4586762263e5e7c8e986cfd3aeecf5688588e0964cd2ab02b1ccb9b348014924cf3f0f4363174c7c70c51ddce2196070ff3b27544
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD50b0ecbefaee171bf680768d2b8c6b5ac
SHA1bdf402d6911c88b941cc87e002f6f27d8d631d33
SHA256365246902f0985712ad85e14d043504944d416ded84430b098dee0bfc30318f4
SHA512e51016f27ef664a7cd1918272e6714b8d8d834db1651c1637506432dc61cb1392d4da85605dc27978e7b0845e4b6801fb3a8496128ca3c3ec62f28ca168a3d32
-
Filesize
72KB
MD58804f4aa19513f7c3cb683dc848e2bf5
SHA1378656a386b2e8252de2322fc70158a248e3fef0
SHA2562566c4bb5ffa98dbc53d66fd3181b515d565f4c83e3c5d05e4b272a26cfd1c7f
SHA5124f11177e8e4091084e3d4cc4586762263e5e7c8e986cfd3aeecf5688588e0964cd2ab02b1ccb9b348014924cf3f0f4363174c7c70c51ddce2196070ff3b27544
-
Filesize
72KB
MD58804f4aa19513f7c3cb683dc848e2bf5
SHA1378656a386b2e8252de2322fc70158a248e3fef0
SHA2562566c4bb5ffa98dbc53d66fd3181b515d565f4c83e3c5d05e4b272a26cfd1c7f
SHA5124f11177e8e4091084e3d4cc4586762263e5e7c8e986cfd3aeecf5688588e0964cd2ab02b1ccb9b348014924cf3f0f4363174c7c70c51ddce2196070ff3b27544
-
Filesize
72KB
MD5951b3cf6393cdf37485ad84c0a20bb93
SHA1993c5f1030be3ada7b1307fb228b521f6d438119
SHA25647c25e615004780149b162fa616454f0c8420622d411f5916bdaa40580eb7c5d
SHA512ef4b426edaf463cdc144d9b1b869cc800f571de4e539080af3ec32b37db60d13722928f0db4d933e38b7eef0512fdd80276ac7408631400a61fb0ac0532735ac
-
Filesize
72KB
MD50b0ecbefaee171bf680768d2b8c6b5ac
SHA1bdf402d6911c88b941cc87e002f6f27d8d631d33
SHA256365246902f0985712ad85e14d043504944d416ded84430b098dee0bfc30318f4
SHA512e51016f27ef664a7cd1918272e6714b8d8d834db1651c1637506432dc61cb1392d4da85605dc27978e7b0845e4b6801fb3a8496128ca3c3ec62f28ca168a3d32
-
Filesize
72KB
MD50b0ecbefaee171bf680768d2b8c6b5ac
SHA1bdf402d6911c88b941cc87e002f6f27d8d631d33
SHA256365246902f0985712ad85e14d043504944d416ded84430b098dee0bfc30318f4
SHA512e51016f27ef664a7cd1918272e6714b8d8d834db1651c1637506432dc61cb1392d4da85605dc27978e7b0845e4b6801fb3a8496128ca3c3ec62f28ca168a3d32
-
Filesize
72KB
MD5951b3cf6393cdf37485ad84c0a20bb93
SHA1993c5f1030be3ada7b1307fb228b521f6d438119
SHA25647c25e615004780149b162fa616454f0c8420622d411f5916bdaa40580eb7c5d
SHA512ef4b426edaf463cdc144d9b1b869cc800f571de4e539080af3ec32b37db60d13722928f0db4d933e38b7eef0512fdd80276ac7408631400a61fb0ac0532735ac
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD54893ccb752f2d61037a25630e9de7a59
SHA1b1406ad67a025cdda47e4b239c9e117e8250c7c8
SHA256685d68e8196c9e6e9818a36e60842d4cb28ac67ce147a48d5a1539c6f89e590a
SHA5123cea261d1ab7954df0c4eb3168d96d23ea74dbf170fcba59a82cfa00a4eeed1f6da6c5dec6eb7cdb55bebd8b324c967ebd40226f0620079720095d6bd8794e4b
-
Filesize
72KB
MD54893ccb752f2d61037a25630e9de7a59
SHA1b1406ad67a025cdda47e4b239c9e117e8250c7c8
SHA256685d68e8196c9e6e9818a36e60842d4cb28ac67ce147a48d5a1539c6f89e590a
SHA5123cea261d1ab7954df0c4eb3168d96d23ea74dbf170fcba59a82cfa00a4eeed1f6da6c5dec6eb7cdb55bebd8b324c967ebd40226f0620079720095d6bd8794e4b
-
Filesize
72KB
MD581c64067cf9259fcd3d28bac1caadf3a
SHA1db19e031e9474159a38d093bca33a9e2602bc7f5
SHA2567006d02a8f44eeaf9b42d0823083ed187ebb059fffaa570c17733718ee0af7ff
SHA512fa3f808db823dead494fa9e1a4b925b82af81f06b867d3f50445aa17b0b763cc8ae579eec614b4dc5b5283e344600cd3913bca0c7f33421223f24480477cac6d
-
Filesize
72KB
MD581c64067cf9259fcd3d28bac1caadf3a
SHA1db19e031e9474159a38d093bca33a9e2602bc7f5
SHA2567006d02a8f44eeaf9b42d0823083ed187ebb059fffaa570c17733718ee0af7ff
SHA512fa3f808db823dead494fa9e1a4b925b82af81f06b867d3f50445aa17b0b763cc8ae579eec614b4dc5b5283e344600cd3913bca0c7f33421223f24480477cac6d
-
Filesize
72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
Filesize
72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
Filesize
72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
Filesize
72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
Filesize
72KB
MD5764a8ec0420590e392173a29799aa110
SHA1ed26c9dca7ded5f1b276c3accc81bac92293e147
SHA25627b096af94adcff0753e87fdc31f8641095651a2517798fb09b5486dc8ac583b
SHA5129c981d167088e16e628dd245cfe308cc599cfd52f8b4298351d5c7566d35521300e6d2bebcb01a5b167b31870173a08ecf1864295910d81c103229bd6ad39a9a
-
Filesize
72KB
MD5764a8ec0420590e392173a29799aa110
SHA1ed26c9dca7ded5f1b276c3accc81bac92293e147
SHA25627b096af94adcff0753e87fdc31f8641095651a2517798fb09b5486dc8ac583b
SHA5129c981d167088e16e628dd245cfe308cc599cfd52f8b4298351d5c7566d35521300e6d2bebcb01a5b167b31870173a08ecf1864295910d81c103229bd6ad39a9a
-
Filesize
72KB
MD5108d69c82101a71c1d1c77f2112d8a32
SHA1ed11bda35ca9e2db975cb00d4e1e3dcd8af7d85e
SHA25679c691918a458f4d67b0a4656dbe00f1a8fb89c1246148e0f6df5901c6bd3abb
SHA512dfc17d80b5cc724e635132d376eaab943c818277d8f019c052960e2f48b093f86a271876a39fc9f9c1ffea6a7199848cda45880404708433f08811cb6f951074
-
Filesize
72KB
MD5108d69c82101a71c1d1c77f2112d8a32
SHA1ed11bda35ca9e2db975cb00d4e1e3dcd8af7d85e
SHA25679c691918a458f4d67b0a4656dbe00f1a8fb89c1246148e0f6df5901c6bd3abb
SHA512dfc17d80b5cc724e635132d376eaab943c818277d8f019c052960e2f48b093f86a271876a39fc9f9c1ffea6a7199848cda45880404708433f08811cb6f951074
-
Filesize
72KB
MD5728993a442b26131cb19d5ccd27777fa
SHA1482675e50a916ebdd74f107e9c2e46f56a37a41e
SHA256433c3d80f59d520eacd522760e4df01220012f6a73ce41615dd7b31ef137f90d
SHA512535c7b9cf6de6a0c10673d5a99ad5af7999a521d6319ca5d7acb98cdc95cb99f974f6ef4854ae78784224af85e5c04d2e21507e7661e70582b621ec961425821
-
Filesize
72KB
MD5728993a442b26131cb19d5ccd27777fa
SHA1482675e50a916ebdd74f107e9c2e46f56a37a41e
SHA256433c3d80f59d520eacd522760e4df01220012f6a73ce41615dd7b31ef137f90d
SHA512535c7b9cf6de6a0c10673d5a99ad5af7999a521d6319ca5d7acb98cdc95cb99f974f6ef4854ae78784224af85e5c04d2e21507e7661e70582b621ec961425821
-
Filesize
72KB
MD58804f4aa19513f7c3cb683dc848e2bf5
SHA1378656a386b2e8252de2322fc70158a248e3fef0
SHA2562566c4bb5ffa98dbc53d66fd3181b515d565f4c83e3c5d05e4b272a26cfd1c7f
SHA5124f11177e8e4091084e3d4cc4586762263e5e7c8e986cfd3aeecf5688588e0964cd2ab02b1ccb9b348014924cf3f0f4363174c7c70c51ddce2196070ff3b27544
-
Filesize
72KB
MD58804f4aa19513f7c3cb683dc848e2bf5
SHA1378656a386b2e8252de2322fc70158a248e3fef0
SHA2562566c4bb5ffa98dbc53d66fd3181b515d565f4c83e3c5d05e4b272a26cfd1c7f
SHA5124f11177e8e4091084e3d4cc4586762263e5e7c8e986cfd3aeecf5688588e0964cd2ab02b1ccb9b348014924cf3f0f4363174c7c70c51ddce2196070ff3b27544
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD50b0ecbefaee171bf680768d2b8c6b5ac
SHA1bdf402d6911c88b941cc87e002f6f27d8d631d33
SHA256365246902f0985712ad85e14d043504944d416ded84430b098dee0bfc30318f4
SHA512e51016f27ef664a7cd1918272e6714b8d8d834db1651c1637506432dc61cb1392d4da85605dc27978e7b0845e4b6801fb3a8496128ca3c3ec62f28ca168a3d32
-
Filesize
72KB
MD50b0ecbefaee171bf680768d2b8c6b5ac
SHA1bdf402d6911c88b941cc87e002f6f27d8d631d33
SHA256365246902f0985712ad85e14d043504944d416ded84430b098dee0bfc30318f4
SHA512e51016f27ef664a7cd1918272e6714b8d8d834db1651c1637506432dc61cb1392d4da85605dc27978e7b0845e4b6801fb3a8496128ca3c3ec62f28ca168a3d32
-
Filesize
72KB
MD58804f4aa19513f7c3cb683dc848e2bf5
SHA1378656a386b2e8252de2322fc70158a248e3fef0
SHA2562566c4bb5ffa98dbc53d66fd3181b515d565f4c83e3c5d05e4b272a26cfd1c7f
SHA5124f11177e8e4091084e3d4cc4586762263e5e7c8e986cfd3aeecf5688588e0964cd2ab02b1ccb9b348014924cf3f0f4363174c7c70c51ddce2196070ff3b27544
-
Filesize
72KB
MD58804f4aa19513f7c3cb683dc848e2bf5
SHA1378656a386b2e8252de2322fc70158a248e3fef0
SHA2562566c4bb5ffa98dbc53d66fd3181b515d565f4c83e3c5d05e4b272a26cfd1c7f
SHA5124f11177e8e4091084e3d4cc4586762263e5e7c8e986cfd3aeecf5688588e0964cd2ab02b1ccb9b348014924cf3f0f4363174c7c70c51ddce2196070ff3b27544
-
Filesize
72KB
MD5951b3cf6393cdf37485ad84c0a20bb93
SHA1993c5f1030be3ada7b1307fb228b521f6d438119
SHA25647c25e615004780149b162fa616454f0c8420622d411f5916bdaa40580eb7c5d
SHA512ef4b426edaf463cdc144d9b1b869cc800f571de4e539080af3ec32b37db60d13722928f0db4d933e38b7eef0512fdd80276ac7408631400a61fb0ac0532735ac
-
Filesize
72KB
MD5951b3cf6393cdf37485ad84c0a20bb93
SHA1993c5f1030be3ada7b1307fb228b521f6d438119
SHA25647c25e615004780149b162fa616454f0c8420622d411f5916bdaa40580eb7c5d
SHA512ef4b426edaf463cdc144d9b1b869cc800f571de4e539080af3ec32b37db60d13722928f0db4d933e38b7eef0512fdd80276ac7408631400a61fb0ac0532735ac
-
Filesize
72KB
MD50b0ecbefaee171bf680768d2b8c6b5ac
SHA1bdf402d6911c88b941cc87e002f6f27d8d631d33
SHA256365246902f0985712ad85e14d043504944d416ded84430b098dee0bfc30318f4
SHA512e51016f27ef664a7cd1918272e6714b8d8d834db1651c1637506432dc61cb1392d4da85605dc27978e7b0845e4b6801fb3a8496128ca3c3ec62f28ca168a3d32
-
Filesize
72KB
MD50b0ecbefaee171bf680768d2b8c6b5ac
SHA1bdf402d6911c88b941cc87e002f6f27d8d631d33
SHA256365246902f0985712ad85e14d043504944d416ded84430b098dee0bfc30318f4
SHA512e51016f27ef664a7cd1918272e6714b8d8d834db1651c1637506432dc61cb1392d4da85605dc27978e7b0845e4b6801fb3a8496128ca3c3ec62f28ca168a3d32
-
Filesize
72KB
MD5951b3cf6393cdf37485ad84c0a20bb93
SHA1993c5f1030be3ada7b1307fb228b521f6d438119
SHA25647c25e615004780149b162fa616454f0c8420622d411f5916bdaa40580eb7c5d
SHA512ef4b426edaf463cdc144d9b1b869cc800f571de4e539080af3ec32b37db60d13722928f0db4d933e38b7eef0512fdd80276ac7408631400a61fb0ac0532735ac
-
Filesize
72KB
MD5951b3cf6393cdf37485ad84c0a20bb93
SHA1993c5f1030be3ada7b1307fb228b521f6d438119
SHA25647c25e615004780149b162fa616454f0c8420622d411f5916bdaa40580eb7c5d
SHA512ef4b426edaf463cdc144d9b1b869cc800f571de4e539080af3ec32b37db60d13722928f0db4d933e38b7eef0512fdd80276ac7408631400a61fb0ac0532735ac
-
Filesize
72KB
MD5951b3cf6393cdf37485ad84c0a20bb93
SHA1993c5f1030be3ada7b1307fb228b521f6d438119
SHA25647c25e615004780149b162fa616454f0c8420622d411f5916bdaa40580eb7c5d
SHA512ef4b426edaf463cdc144d9b1b869cc800f571de4e539080af3ec32b37db60d13722928f0db4d933e38b7eef0512fdd80276ac7408631400a61fb0ac0532735ac
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD5b380846f8ff12ce92fa0f9122025390a
SHA12bd208b3436a76b377e9b5ea26d4dcdb0831903d
SHA25683de85b8cec695702ce0b12d8885d273f2f4ec830faaf71b102cc2ae1d30504f
SHA5123c6c59d1be5150af680ffb233b347371dac4abb17863e53f31b75a1f092076217f2327815aa71fa28ccb65f0e9510d62530203539fefeb58086c05027764dc69
-
Filesize
72KB
MD54893ccb752f2d61037a25630e9de7a59
SHA1b1406ad67a025cdda47e4b239c9e117e8250c7c8
SHA256685d68e8196c9e6e9818a36e60842d4cb28ac67ce147a48d5a1539c6f89e590a
SHA5123cea261d1ab7954df0c4eb3168d96d23ea74dbf170fcba59a82cfa00a4eeed1f6da6c5dec6eb7cdb55bebd8b324c967ebd40226f0620079720095d6bd8794e4b
-
Filesize
72KB
MD54893ccb752f2d61037a25630e9de7a59
SHA1b1406ad67a025cdda47e4b239c9e117e8250c7c8
SHA256685d68e8196c9e6e9818a36e60842d4cb28ac67ce147a48d5a1539c6f89e590a
SHA5123cea261d1ab7954df0c4eb3168d96d23ea74dbf170fcba59a82cfa00a4eeed1f6da6c5dec6eb7cdb55bebd8b324c967ebd40226f0620079720095d6bd8794e4b
-
Filesize
72KB
MD581c64067cf9259fcd3d28bac1caadf3a
SHA1db19e031e9474159a38d093bca33a9e2602bc7f5
SHA2567006d02a8f44eeaf9b42d0823083ed187ebb059fffaa570c17733718ee0af7ff
SHA512fa3f808db823dead494fa9e1a4b925b82af81f06b867d3f50445aa17b0b763cc8ae579eec614b4dc5b5283e344600cd3913bca0c7f33421223f24480477cac6d
-
Filesize
72KB
MD581c64067cf9259fcd3d28bac1caadf3a
SHA1db19e031e9474159a38d093bca33a9e2602bc7f5
SHA2567006d02a8f44eeaf9b42d0823083ed187ebb059fffaa570c17733718ee0af7ff
SHA512fa3f808db823dead494fa9e1a4b925b82af81f06b867d3f50445aa17b0b763cc8ae579eec614b4dc5b5283e344600cd3913bca0c7f33421223f24480477cac6d
-
Filesize
72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
Filesize
72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
Filesize
72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
Filesize
72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
Filesize
72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
Filesize
72KB
MD5ebc20def3dbc506e3ad071f59c562999
SHA193a4c65212c69abdd82cb4ab4b2a31b633315f9c
SHA2566f7619c2f136656a106798be9f21ab75fdc654e3ad3d0bed7ef4aff418d7e791
SHA51206e3c067d1f5be9833359bfd793bfb7f4e3f7a9124dfbd86262a393cbb7e05d3d70ee9b9c17bf8abb4972a40fdf281365a9331f2f1b49283044450acb5cfd3a5
-
Filesize
72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3
-
Filesize
72KB
MD5b7de143bf2b0639a4e8066f9ef26bef6
SHA1b13be60e156f9683fb4dcea37fba80ef0b6e0392
SHA2565182287328cc85cb7bcf9e44fe5fde63772760ac7dbb2369db959cb9ac1ac0a7
SHA512d76bb0447bc821a32441224f796d0034939e503275f7c7e17f0db4218246b95eec9b0f1b228d6ee3fd71df5412139a99f06b0bb37145bee6980a952b0e5800f3