Analysis
-
max time kernel
154s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 13:37
Static task
static1
Behavioral task
behavioral1
Sample
f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe
Resource
win10v2004-20221111-en
General
-
Target
f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe
-
Size
72KB
-
MD5
042d75e937125f109accc584ca4b3629
-
SHA1
dd85fcecd49976e4b8b4e955b4d8ca94025d0b21
-
SHA256
f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325
-
SHA512
4b327c5f77a5c1b618c1c943340804297f525de4b10e867c89f93f6837cfdb2a2c803be2e9ad627d50637cd158424c0daadded107b3bffb3dd5e67f1bb0ce8cd
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2t:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPZ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 61 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 62 IoCs
pid Process 3632 backup.exe 3604 backup.exe 552 backup.exe 4440 backup.exe 2284 backup.exe 2860 backup.exe 3704 backup.exe 1676 backup.exe 3268 backup.exe 3856 backup.exe 3220 backup.exe 4168 backup.exe 3988 backup.exe 1432 System Restore.exe 712 backup.exe 4640 backup.exe 4752 backup.exe 3192 backup.exe 3212 backup.exe 4208 backup.exe 1504 backup.exe 5064 backup.exe 4540 backup.exe 5080 backup.exe 4052 backup.exe 4884 backup.exe 4800 backup.exe 432 backup.exe 4848 backup.exe 3792 backup.exe 2640 backup.exe 4224 backup.exe 4000 backup.exe 260 backup.exe 884 backup.exe 1352 backup.exe 4708 backup.exe 3320 backup.exe 3512 backup.exe 2908 backup.exe 5100 System Restore.exe 4920 backup.exe 4240 backup.exe 4432 backup.exe 3908 backup.exe 4476 backup.exe 2316 backup.exe 1652 backup.exe 4580 backup.exe 2964 update.exe 1872 System Restore.exe 932 backup.exe 4924 update.exe 5116 backup.exe 1304 backup.exe 448 backup.exe 1344 System Restore.exe 1288 backup.exe 2188 backup.exe 4960 backup.exe 3132 backup.exe 3012 backup.exe -
Drops file in Program Files directory 52 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\System Restore.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\System Restore.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\update.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe -
Suspicious use of SetWindowsHookEx 63 IoCs
pid Process 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 3632 backup.exe 3604 backup.exe 552 backup.exe 4440 backup.exe 2284 backup.exe 2860 backup.exe 3704 backup.exe 1676 backup.exe 3268 backup.exe 3856 backup.exe 3220 backup.exe 4168 backup.exe 3988 backup.exe 1432 System Restore.exe 4640 backup.exe 712 backup.exe 4752 backup.exe 3192 backup.exe 3212 backup.exe 4208 backup.exe 1504 backup.exe 4800 backup.exe 432 backup.exe 4052 backup.exe 5080 backup.exe 4540 backup.exe 4884 backup.exe 5064 backup.exe 4848 backup.exe 3792 backup.exe 260 backup.exe 2640 backup.exe 884 backup.exe 4224 backup.exe 4000 backup.exe 1352 backup.exe 3320 backup.exe 3512 backup.exe 4708 backup.exe 2908 backup.exe 5100 System Restore.exe 4920 backup.exe 4240 backup.exe 4432 backup.exe 2316 backup.exe 1652 backup.exe 3908 backup.exe 4476 backup.exe 1872 System Restore.exe 4580 backup.exe 4924 update.exe 2964 update.exe 5116 backup.exe 932 backup.exe 1304 backup.exe 448 backup.exe 1344 System Restore.exe 3132 backup.exe 1288 backup.exe 4960 backup.exe 3012 backup.exe 2188 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3632 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 85 PID 4500 wrote to memory of 3632 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 85 PID 4500 wrote to memory of 3632 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 85 PID 4500 wrote to memory of 3604 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 86 PID 4500 wrote to memory of 3604 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 86 PID 4500 wrote to memory of 3604 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 86 PID 4500 wrote to memory of 552 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 87 PID 4500 wrote to memory of 552 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 87 PID 4500 wrote to memory of 552 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 87 PID 4500 wrote to memory of 4440 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 88 PID 4500 wrote to memory of 4440 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 88 PID 4500 wrote to memory of 4440 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 88 PID 4500 wrote to memory of 2284 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 90 PID 4500 wrote to memory of 2284 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 90 PID 4500 wrote to memory of 2284 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 90 PID 4500 wrote to memory of 2860 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 91 PID 4500 wrote to memory of 2860 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 91 PID 4500 wrote to memory of 2860 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 91 PID 4500 wrote to memory of 3704 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 92 PID 4500 wrote to memory of 3704 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 92 PID 4500 wrote to memory of 3704 4500 f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe 92 PID 3632 wrote to memory of 1676 3632 backup.exe 93 PID 3632 wrote to memory of 1676 3632 backup.exe 93 PID 3632 wrote to memory of 1676 3632 backup.exe 93 PID 1676 wrote to memory of 3268 1676 backup.exe 94 PID 1676 wrote to memory of 3268 1676 backup.exe 94 PID 1676 wrote to memory of 3268 1676 backup.exe 94 PID 1676 wrote to memory of 3856 1676 backup.exe 95 PID 1676 wrote to memory of 3856 1676 backup.exe 95 PID 1676 wrote to memory of 3856 1676 backup.exe 95 PID 1676 wrote to memory of 3220 1676 backup.exe 96 PID 1676 wrote to memory of 3220 1676 backup.exe 96 PID 1676 wrote to memory of 3220 1676 backup.exe 96 PID 3220 wrote to memory of 4168 3220 backup.exe 97 PID 3220 wrote to memory of 4168 3220 backup.exe 97 PID 3220 wrote to memory of 4168 3220 backup.exe 97 PID 4168 wrote to memory of 3988 4168 backup.exe 98 PID 4168 wrote to memory of 3988 4168 backup.exe 98 PID 4168 wrote to memory of 3988 4168 backup.exe 98 PID 3220 wrote to memory of 1432 3220 backup.exe 99 PID 3220 wrote to memory of 1432 3220 backup.exe 99 PID 3220 wrote to memory of 1432 3220 backup.exe 99 PID 1432 wrote to memory of 712 1432 System Restore.exe 100 PID 1432 wrote to memory of 712 1432 System Restore.exe 100 PID 1432 wrote to memory of 712 1432 System Restore.exe 100 PID 1676 wrote to memory of 4640 1676 backup.exe 102 PID 1676 wrote to memory of 4640 1676 backup.exe 102 PID 1676 wrote to memory of 4640 1676 backup.exe 102 PID 3220 wrote to memory of 4752 3220 backup.exe 101 PID 3220 wrote to memory of 4752 3220 backup.exe 101 PID 3220 wrote to memory of 4752 3220 backup.exe 101 PID 4640 wrote to memory of 3192 4640 backup.exe 103 PID 4640 wrote to memory of 3192 4640 backup.exe 103 PID 4640 wrote to memory of 3192 4640 backup.exe 103 PID 1432 wrote to memory of 4208 1432 System Restore.exe 104 PID 1432 wrote to memory of 4208 1432 System Restore.exe 104 PID 1432 wrote to memory of 4208 1432 System Restore.exe 104 PID 4752 wrote to memory of 3212 4752 backup.exe 105 PID 4752 wrote to memory of 3212 4752 backup.exe 105 PID 4752 wrote to memory of 3212 4752 backup.exe 105 PID 3192 wrote to memory of 1504 3192 backup.exe 106 PID 3192 wrote to memory of 1504 3192 backup.exe 106 PID 3192 wrote to memory of 1504 3192 backup.exe 106 PID 4208 wrote to memory of 4540 4208 backup.exe 108 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe"C:\Users\Admin\AppData\Local\Temp\f2392bd1fba3dbff29e52573df2f50ff856572bcf810cca6547e4129c6a6c325.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\266813471\backup.exeC:\Users\Admin\AppData\Local\Temp\266813471\backup.exe C:\Users\Admin\AppData\Local\Temp\266813471\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3632 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3268
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4168 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3988
-
-
-
C:\Program Files\Common Files\System Restore.exe"C:\Program Files\Common Files\System Restore.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1432 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:712
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4208 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4540
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:432 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3792
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5100
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1652
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\update.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\update.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4924
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:448
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4884
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:884 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2908 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4476
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4580
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2188
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4752 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3212 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5064 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:260 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4240
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2964
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1288
-
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4052 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4224
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3320
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4432
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:932
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3132
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4708 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3908 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1872
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1344
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4800 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2316
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5116 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4960
-
-
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5080 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4000 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3512
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4920
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d6214f19531e695ed2524f7ef80b7d01
SHA1455e114f8909a038f82151c1dbed1a3e7b70605e
SHA256ae2dffec0b0d9744f8a6ef2fb3dc210ba5e7fdb0cc7bc58153359b3a5b85944d
SHA512095724eed1633392b7cc5ac7f345539a2ea82a285ff2853b98421727523a041a3980387a404c17253c1bb92dac08c8bc7e8ae398ce6e7df27010aa24ead2a7d5
-
Filesize
72KB
MD5d6214f19531e695ed2524f7ef80b7d01
SHA1455e114f8909a038f82151c1dbed1a3e7b70605e
SHA256ae2dffec0b0d9744f8a6ef2fb3dc210ba5e7fdb0cc7bc58153359b3a5b85944d
SHA512095724eed1633392b7cc5ac7f345539a2ea82a285ff2853b98421727523a041a3980387a404c17253c1bb92dac08c8bc7e8ae398ce6e7df27010aa24ead2a7d5
-
Filesize
72KB
MD5beaabebcf7d081cb6fa359a59e6703a5
SHA170a335e0423e4a24f5be47dbc572efaa7d019a1d
SHA256ddb491a4c12241d0bc7028ea7bb96ee6660a8b02e11d698b169a03a9b2bb7123
SHA51282293cfe37b37e304f1ac658192afd2c1ff744ecd96d3ca64c9d32c00f5618baebcee1956af6e8d809d3c8eff631a068b8824ee899a476240419f018d20c420d
-
Filesize
72KB
MD5beaabebcf7d081cb6fa359a59e6703a5
SHA170a335e0423e4a24f5be47dbc572efaa7d019a1d
SHA256ddb491a4c12241d0bc7028ea7bb96ee6660a8b02e11d698b169a03a9b2bb7123
SHA51282293cfe37b37e304f1ac658192afd2c1ff744ecd96d3ca64c9d32c00f5618baebcee1956af6e8d809d3c8eff631a068b8824ee899a476240419f018d20c420d
-
Filesize
72KB
MD50e2cd6c10f2bd809298b94e1c97bd684
SHA1502ae7638b86755ab824bf087e9d3d578ecc586a
SHA2565d2b709d253fd20d06a911d0946fbacdad0a4e0c14fe08bac665d1ba5f435db4
SHA512482389677d8006bc46f61b517627262d97c015f7b461c44bc68f861f7fa18bbb493177a1664710296759187c608aa5cd3518e87cb841e8c3560fa4c71ad5f5a7
-
Filesize
72KB
MD50e2cd6c10f2bd809298b94e1c97bd684
SHA1502ae7638b86755ab824bf087e9d3d578ecc586a
SHA2565d2b709d253fd20d06a911d0946fbacdad0a4e0c14fe08bac665d1ba5f435db4
SHA512482389677d8006bc46f61b517627262d97c015f7b461c44bc68f861f7fa18bbb493177a1664710296759187c608aa5cd3518e87cb841e8c3560fa4c71ad5f5a7
-
Filesize
72KB
MD54541a57a7710a16692b34e95c3a9feff
SHA16e4c63cb0eee67a6fbf4ac8b6d30dca06f5211d8
SHA25677be120a1581c14fcedbd26dbd39c7907d9ae21d2bbbf07981733194c331a337
SHA512858bf1a5ddc05ed6170e5ce4248cbc0cbe6ea30cb66670481f22033ad3519feef7dccadaa1ffafd847a45b512cf8da8fe44e9a8f9bdada371e15a1eb27f2edd2
-
Filesize
72KB
MD54541a57a7710a16692b34e95c3a9feff
SHA16e4c63cb0eee67a6fbf4ac8b6d30dca06f5211d8
SHA25677be120a1581c14fcedbd26dbd39c7907d9ae21d2bbbf07981733194c331a337
SHA512858bf1a5ddc05ed6170e5ce4248cbc0cbe6ea30cb66670481f22033ad3519feef7dccadaa1ffafd847a45b512cf8da8fe44e9a8f9bdada371e15a1eb27f2edd2
-
Filesize
72KB
MD510003b2998a43ff1dbbb8ed590f028e3
SHA1fea17b10f7a3be4e741dfe471e7c38acd7ec459e
SHA256d813379da1fda56f643fa2b575b81c6ba8da391bb508ee86da0e9948d8adaac0
SHA512eabc8ba968c09cea8728c5667a7b1842efd40cd7fef78e85b2ce347e997fc090cadbda0b22b789df7f34429354b907e5636ae41b5112ac87a98ba6a3e2a1b2ef
-
Filesize
72KB
MD510003b2998a43ff1dbbb8ed590f028e3
SHA1fea17b10f7a3be4e741dfe471e7c38acd7ec459e
SHA256d813379da1fda56f643fa2b575b81c6ba8da391bb508ee86da0e9948d8adaac0
SHA512eabc8ba968c09cea8728c5667a7b1842efd40cd7fef78e85b2ce347e997fc090cadbda0b22b789df7f34429354b907e5636ae41b5112ac87a98ba6a3e2a1b2ef
-
Filesize
72KB
MD5408deab682222d779cdff7aa7f7187c7
SHA1473d8ec7ae628b1b26b56c8c8e6b79f951dfd251
SHA256ff3487e062787e98ea61510bbdd98ac6ab04a4dd5c331448a937c189a70ed14e
SHA51255c9058fae84298cce7daaa443a4f7bc41814c10028af026acd8c1aa551f1cd27a1a61f12a4df15519157256c9b802921c4f55b012b8c6f5a9939aa4dc0b8ff8
-
Filesize
72KB
MD5408deab682222d779cdff7aa7f7187c7
SHA1473d8ec7ae628b1b26b56c8c8e6b79f951dfd251
SHA256ff3487e062787e98ea61510bbdd98ac6ab04a4dd5c331448a937c189a70ed14e
SHA51255c9058fae84298cce7daaa443a4f7bc41814c10028af026acd8c1aa551f1cd27a1a61f12a4df15519157256c9b802921c4f55b012b8c6f5a9939aa4dc0b8ff8
-
Filesize
72KB
MD5b6640f405d00f3007c0432e1b8649824
SHA1ccc258518100710921e179e2915751f471993bac
SHA2561d72c9d23a5bf3131136098f8c1593ff108172e0c7d1099a29727232f843785c
SHA512a8e6e4facac610cb18af5b1e9c067bb8f1b0ece4c9ff39ab55bcdf522a404b9d1d4a5ebdfc4f62f0dd33ca6a435c3ddcbb705eec8d41ec1145d991b1e4833699
-
Filesize
72KB
MD5b6640f405d00f3007c0432e1b8649824
SHA1ccc258518100710921e179e2915751f471993bac
SHA2561d72c9d23a5bf3131136098f8c1593ff108172e0c7d1099a29727232f843785c
SHA512a8e6e4facac610cb18af5b1e9c067bb8f1b0ece4c9ff39ab55bcdf522a404b9d1d4a5ebdfc4f62f0dd33ca6a435c3ddcbb705eec8d41ec1145d991b1e4833699
-
Filesize
72KB
MD5e4ddddf22659a64830d311efc0505c37
SHA1ad0198ffd5b8e5f2a28ef5081c425c8f13b825fd
SHA256f41d27ca1222a5edb8a4e80d22a932a426080832e4fe0aab57c0367be741cf2e
SHA512bb048bf826779dae105c83781972fc7bd00d0c96e3be09864dacc70a92b7e33227f028a1bcefe590b90877cfb6a92d109f82d30b2fe3e47f114f8f79c2e028ef
-
Filesize
72KB
MD5e4ddddf22659a64830d311efc0505c37
SHA1ad0198ffd5b8e5f2a28ef5081c425c8f13b825fd
SHA256f41d27ca1222a5edb8a4e80d22a932a426080832e4fe0aab57c0367be741cf2e
SHA512bb048bf826779dae105c83781972fc7bd00d0c96e3be09864dacc70a92b7e33227f028a1bcefe590b90877cfb6a92d109f82d30b2fe3e47f114f8f79c2e028ef
-
Filesize
72KB
MD534b6e4e095d413fe0c8bc020b7398d42
SHA13ff3cef1a82ac67b080a0b387a7ee51a665f2f8c
SHA2566c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602
SHA5122c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf
-
Filesize
72KB
MD534b6e4e095d413fe0c8bc020b7398d42
SHA13ff3cef1a82ac67b080a0b387a7ee51a665f2f8c
SHA2566c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602
SHA5122c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf
-
Filesize
72KB
MD54c1f44c028400ca3c3838ed6abc4901e
SHA18e9f17b1beee710815cced32d0723775c012e477
SHA256a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab
SHA51202b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210
-
Filesize
72KB
MD54c1f44c028400ca3c3838ed6abc4901e
SHA18e9f17b1beee710815cced32d0723775c012e477
SHA256a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab
SHA51202b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210
-
Filesize
72KB
MD545784a2a056b40ca974562842986b3c9
SHA1ef0acb880318fec29204a9a0d3e9a84f1360a830
SHA25630f12347f738b92dc6e8df2b35bb4124ea5587f7659a8e70e77598955adff7fb
SHA512caccf3a4d52b94bf681c2df676ec7e47b5c29e1dd5a2dc6d2f0ff274ab5bc931eebbba0292a96eaf34022d0556db32c12e6e2ccb032d673b0033f76a0ec30ea5
-
Filesize
72KB
MD545784a2a056b40ca974562842986b3c9
SHA1ef0acb880318fec29204a9a0d3e9a84f1360a830
SHA25630f12347f738b92dc6e8df2b35bb4124ea5587f7659a8e70e77598955adff7fb
SHA512caccf3a4d52b94bf681c2df676ec7e47b5c29e1dd5a2dc6d2f0ff274ab5bc931eebbba0292a96eaf34022d0556db32c12e6e2ccb032d673b0033f76a0ec30ea5
-
Filesize
72KB
MD534b6e4e095d413fe0c8bc020b7398d42
SHA13ff3cef1a82ac67b080a0b387a7ee51a665f2f8c
SHA2566c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602
SHA5122c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf
-
Filesize
72KB
MD534b6e4e095d413fe0c8bc020b7398d42
SHA13ff3cef1a82ac67b080a0b387a7ee51a665f2f8c
SHA2566c1a7aadf80e8aca588ce702ea765692d6b356854e1600c4cbaca5f96ea5e602
SHA5122c5673f21414cc817bb923a6730e6db1f3c6db1656f2f20f9038dbb5c2c9544e77a10fb7cb421ccd9765021093c80c45811188e42d5c2d8183cb2acd527dfcdf
-
Filesize
72KB
MD5b998713d55365dd0329ad29875f10ae9
SHA12bf71190e902a6f1964def66d96901c0c8f60625
SHA256617af936716f688d11e0f431c02ca53f0f0f1f04d1ff23da6ad09f23ad52a556
SHA512eb03227d1c6d284e56ba73a3dcd44d7aca28191446f4b88dda299da1dbfbce6f7845bedca0a105df6e007cb6b0f697d23978f59257b3a8e81446ea5b15de978b
-
Filesize
72KB
MD5b998713d55365dd0329ad29875f10ae9
SHA12bf71190e902a6f1964def66d96901c0c8f60625
SHA256617af936716f688d11e0f431c02ca53f0f0f1f04d1ff23da6ad09f23ad52a556
SHA512eb03227d1c6d284e56ba73a3dcd44d7aca28191446f4b88dda299da1dbfbce6f7845bedca0a105df6e007cb6b0f697d23978f59257b3a8e81446ea5b15de978b
-
Filesize
72KB
MD54c1f44c028400ca3c3838ed6abc4901e
SHA18e9f17b1beee710815cced32d0723775c012e477
SHA256a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab
SHA51202b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210
-
Filesize
72KB
MD54c1f44c028400ca3c3838ed6abc4901e
SHA18e9f17b1beee710815cced32d0723775c012e477
SHA256a4eea11cb16d7e514430a40cdf6ce6f47960117de6fcea1a372d138002d4ecab
SHA51202b646318dc61891c5efd81943e1b3acfe6cbe71cd322df55086bd20e7670a463fcf67c301e9565fbc32ea569a6796dae538ffe2658361dd7726df7a076ae210
-
Filesize
72KB
MD5aa7a73c81887cba5304279ffdbc1fc46
SHA16ee6bbccc9a0bb025b249ad69cd72f216386214f
SHA25657edc9996bd62d7648173abf70c71efc786d7a6868d7f1e0045ded78192854bf
SHA512b414f3b1afcc311376813338968980ec230ae18961d29550c40ac89da907ce84c179765dcde375a05afe5fd5f19750094e90b2953816d8e589d9f6a1e1661ce8
-
Filesize
72KB
MD5aa7a73c81887cba5304279ffdbc1fc46
SHA16ee6bbccc9a0bb025b249ad69cd72f216386214f
SHA25657edc9996bd62d7648173abf70c71efc786d7a6868d7f1e0045ded78192854bf
SHA512b414f3b1afcc311376813338968980ec230ae18961d29550c40ac89da907ce84c179765dcde375a05afe5fd5f19750094e90b2953816d8e589d9f6a1e1661ce8
-
Filesize
72KB
MD5816064c3556c9784c7cb803c0476ff52
SHA1c336e23799b2141a8902398ffa25a204b224a0ff
SHA2568c771197068301075240e78270be4c00e005548624357b9166929adb28096941
SHA5123cac8201985a769faa86f8a7f0acde1141935b3c4c79a84ab7673f6879c6f8f5bb5227f861f5d41ae28bc22581873f82a932f8dde1d36c349f5e72ac3f201bee
-
Filesize
72KB
MD5816064c3556c9784c7cb803c0476ff52
SHA1c336e23799b2141a8902398ffa25a204b224a0ff
SHA2568c771197068301075240e78270be4c00e005548624357b9166929adb28096941
SHA5123cac8201985a769faa86f8a7f0acde1141935b3c4c79a84ab7673f6879c6f8f5bb5227f861f5d41ae28bc22581873f82a932f8dde1d36c349f5e72ac3f201bee
-
Filesize
72KB
MD51527e0cd45add5c7815e84db19f67409
SHA15bb2cf3883d57b660d109a4a0e5e90c43203b484
SHA2561f7b10ccf3f08f53314e087bfc6efd313cac3f9d537f624110402fc3c30235a3
SHA512f42b1f2800ce47077afd691fa9cf53d610b01ec93082529f0974ea79223a374e257e9109f2b598df283a7b20b0cd65b7878b6ce3eb19fd7a07ee13ca42a48735
-
Filesize
72KB
MD51527e0cd45add5c7815e84db19f67409
SHA15bb2cf3883d57b660d109a4a0e5e90c43203b484
SHA2561f7b10ccf3f08f53314e087bfc6efd313cac3f9d537f624110402fc3c30235a3
SHA512f42b1f2800ce47077afd691fa9cf53d610b01ec93082529f0974ea79223a374e257e9109f2b598df283a7b20b0cd65b7878b6ce3eb19fd7a07ee13ca42a48735
-
Filesize
72KB
MD5442094f51f47dbccfd0cd648f67e9c1c
SHA1280b6eaed15845153a0af6932c7f2346606a5e94
SHA256aa900fe33090424479c24be71d9e2099c0f1e543a0a006aaf2ca8cf78b40258d
SHA512a95b773a7b1b06baf62e905f91a612e34aad52cc84b687e41599bdb01da7d86c3c63d1a36075ea1479e63f2ee600e55b0dd5c8d40f6b2130bcbd865231812061
-
Filesize
72KB
MD5442094f51f47dbccfd0cd648f67e9c1c
SHA1280b6eaed15845153a0af6932c7f2346606a5e94
SHA256aa900fe33090424479c24be71d9e2099c0f1e543a0a006aaf2ca8cf78b40258d
SHA512a95b773a7b1b06baf62e905f91a612e34aad52cc84b687e41599bdb01da7d86c3c63d1a36075ea1479e63f2ee600e55b0dd5c8d40f6b2130bcbd865231812061
-
Filesize
72KB
MD56a0c2d8477abf6e9d843cf98a16db715
SHA18bf1ddbcbe16a6278440e2a0abbef9f191285a68
SHA25609dc84d8733473ab966e9371f33c85e9203e9413b5ca1490095278c1c06052c4
SHA512227f33078d24149e2b6df91b852bf0aa14934c3813b5d8d3f7f0e3419aa10b6e609fa009902e7e09ca9aae500c949b34c6ee35bfb69dfe953fe70cb3ce5ddab7
-
Filesize
72KB
MD56a0c2d8477abf6e9d843cf98a16db715
SHA18bf1ddbcbe16a6278440e2a0abbef9f191285a68
SHA25609dc84d8733473ab966e9371f33c85e9203e9413b5ca1490095278c1c06052c4
SHA512227f33078d24149e2b6df91b852bf0aa14934c3813b5d8d3f7f0e3419aa10b6e609fa009902e7e09ca9aae500c949b34c6ee35bfb69dfe953fe70cb3ce5ddab7
-
Filesize
72KB
MD504d243a82e96a90eca317fa3997742bb
SHA1f5c3c30f8aeec6a2d25ad55a89e2c06bbaa601fe
SHA256b10acdb97f1ab640349ec187651c5237266aa351f012329f80aec1f20a18bc2e
SHA512eef9f1b4d256e504c1d4a6ea658c75e5117cf27353c146bd7bd523453c7ffd2161b2a55cb795dcca8c62db249b05cdea5d598a73b73e274b25a08077435902b4
-
Filesize
72KB
MD504d243a82e96a90eca317fa3997742bb
SHA1f5c3c30f8aeec6a2d25ad55a89e2c06bbaa601fe
SHA256b10acdb97f1ab640349ec187651c5237266aa351f012329f80aec1f20a18bc2e
SHA512eef9f1b4d256e504c1d4a6ea658c75e5117cf27353c146bd7bd523453c7ffd2161b2a55cb795dcca8c62db249b05cdea5d598a73b73e274b25a08077435902b4
-
Filesize
72KB
MD5f8456e1e1c119f0fb17045134911d7f3
SHA1d6f343bfe4362a62744f697e2fcb9764d1a8e7bf
SHA25625385e01ae9bc45bf64a10485e280cc7feb77500de0c2b382fa8266b062fc601
SHA5120be32d2a783628e671661ea157fbb87e22920443f3b9d8d46d3ceca5b35eb157e98d3d89eccb9579584d647142992293b71bd4242b976461097732fb716deedd
-
Filesize
72KB
MD5f8456e1e1c119f0fb17045134911d7f3
SHA1d6f343bfe4362a62744f697e2fcb9764d1a8e7bf
SHA25625385e01ae9bc45bf64a10485e280cc7feb77500de0c2b382fa8266b062fc601
SHA5120be32d2a783628e671661ea157fbb87e22920443f3b9d8d46d3ceca5b35eb157e98d3d89eccb9579584d647142992293b71bd4242b976461097732fb716deedd
-
Filesize
72KB
MD512430884284cce6c27e27e088415fbbe
SHA1f98e1ebed0dd64289dffac4aa39507c190f3577b
SHA2567abe2ede0e51c207536eb999e8f772ec64597bca8f515364253833fe79e33491
SHA5120dc053d4172380e47a6336e55ece2db51947cf59e777afe17fd3f8704586d43c5e69858effd9339c56c6cab62ec0aae450e49767eb81a8514be0413b8f6a063d
-
Filesize
72KB
MD512430884284cce6c27e27e088415fbbe
SHA1f98e1ebed0dd64289dffac4aa39507c190f3577b
SHA2567abe2ede0e51c207536eb999e8f772ec64597bca8f515364253833fe79e33491
SHA5120dc053d4172380e47a6336e55ece2db51947cf59e777afe17fd3f8704586d43c5e69858effd9339c56c6cab62ec0aae450e49767eb81a8514be0413b8f6a063d
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD5e2d3b229c005f8c0841d45aa3fc33d46
SHA10ef7f71c5932dd0f85761fff488783c7eaec18ce
SHA25640f67a93e24fdd883ac9c9f48a75a66bc1b0c5f45291128f72c65bb1d7df98d7
SHA5127bd8a8220c5f0e5c808a72246031fe39335b8d345847fe9ec6fedbcbf47f3bb1cb6f43c8745db2043a7834f51da1f348ae406a98d883efaa3a46a1f150f525df
-
Filesize
72KB
MD57f97c5c95ac8659a53123eb9f8735131
SHA142a40434ccb0a37c66640f01bb7dd7ee3a2a177c
SHA2566b92162e4b1c11a83a9b74c1fac0b68838170258f68bba4e711d8ed17b711d89
SHA512b490da395ba98d5db580c5f1e75cf0caab3a621c575a8cd2993b27b74993088d14a033a26ebf25e32a569aa26e34a99e7a4decae81b09568feb78af1e520d1cc
-
Filesize
72KB
MD57f97c5c95ac8659a53123eb9f8735131
SHA142a40434ccb0a37c66640f01bb7dd7ee3a2a177c
SHA2566b92162e4b1c11a83a9b74c1fac0b68838170258f68bba4e711d8ed17b711d89
SHA512b490da395ba98d5db580c5f1e75cf0caab3a621c575a8cd2993b27b74993088d14a033a26ebf25e32a569aa26e34a99e7a4decae81b09568feb78af1e520d1cc
-
Filesize
72KB
MD50429a4034e185729e7410c7cf85cd2b1
SHA1a9cb619e5a3cb14df24833a95927880a83db474c
SHA256d302f8561609a228f795554c0f8a113c875be85d5b0cffc5ae4ffe758f85a14c
SHA51275b6fd1e17a7f5eef8e58f1cdc608b0b92554a560055653d2f9c1678b4181607e2804c8c2567efdcf60ff0ae0de6fc0b7e457e72200187593a7f36f43abd6c8a
-
Filesize
72KB
MD50429a4034e185729e7410c7cf85cd2b1
SHA1a9cb619e5a3cb14df24833a95927880a83db474c
SHA256d302f8561609a228f795554c0f8a113c875be85d5b0cffc5ae4ffe758f85a14c
SHA51275b6fd1e17a7f5eef8e58f1cdc608b0b92554a560055653d2f9c1678b4181607e2804c8c2567efdcf60ff0ae0de6fc0b7e457e72200187593a7f36f43abd6c8a
-
Filesize
72KB
MD5b9466e5befc8f75abd32a6ae3af65754
SHA1cf5d6b1a20d47ced65665042491028fb145f5cbc
SHA256c48b8478e83bdd1e8ca8d1e63953412e731d53c25a5f5d57680769b0bf2f6ae3
SHA512a2daa1d8798546869f48249eba38995988771bcab80c2231c04293b9eb55493afacddd10666f4c04a4ee23ef315703ed844c6262643d62d048fa759ffb80b83b
-
Filesize
72KB
MD5b9466e5befc8f75abd32a6ae3af65754
SHA1cf5d6b1a20d47ced65665042491028fb145f5cbc
SHA256c48b8478e83bdd1e8ca8d1e63953412e731d53c25a5f5d57680769b0bf2f6ae3
SHA512a2daa1d8798546869f48249eba38995988771bcab80c2231c04293b9eb55493afacddd10666f4c04a4ee23ef315703ed844c6262643d62d048fa759ffb80b83b
-
Filesize
72KB
MD536cd0c9b232f7af9c8fb5fe19c92f67b
SHA1789abd9e395b4f243b9f6cea8dba8dc2000b571a
SHA25637698666725bd0812a8c69c48753aaf5ada96c61d6348074d233aca89f832f72
SHA5125bd0a7e190f35758c2f2531e548e91f60bd919cc309014ead4213f8ae7ca0bb59bae92ea2701740b55a1c9e9517a0939eb19e9e5af40b2d363e75d08f82fc2bc
-
Filesize
72KB
MD536cd0c9b232f7af9c8fb5fe19c92f67b
SHA1789abd9e395b4f243b9f6cea8dba8dc2000b571a
SHA25637698666725bd0812a8c69c48753aaf5ada96c61d6348074d233aca89f832f72
SHA5125bd0a7e190f35758c2f2531e548e91f60bd919cc309014ead4213f8ae7ca0bb59bae92ea2701740b55a1c9e9517a0939eb19e9e5af40b2d363e75d08f82fc2bc