Analysis
-
max time kernel
235s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe
Resource
win10v2004-20220812-en
General
-
Target
f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe
-
Size
72KB
-
MD5
b46e5793d693b1b039c58b85b4f34231
-
SHA1
04f294dd5cc8d2198c50b8e72fb32c38d8213373
-
SHA256
f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525
-
SHA512
45c27d2465435ca40dbdcd2b2377c71986e6b83ca7342f4d5e6d0fab09476769d63f68881703d14b45ec3f656d660c5be8c4cd72c09f3b5a5c9bee7ef29321c1
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2v:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrz
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 55 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 560 backup.exe 1960 backup.exe 680 backup.exe 108 System Restore.exe 304 backup.exe 1524 backup.exe 1148 backup.exe 884 data.exe 1444 backup.exe 452 backup.exe 1644 backup.exe 1832 backup.exe 1628 backup.exe 2008 backup.exe 556 backup.exe 1776 backup.exe 1616 backup.exe 580 backup.exe 784 data.exe 1968 backup.exe 1212 backup.exe 1692 backup.exe 304 backup.exe 1604 backup.exe 1224 backup.exe 1668 backup.exe 632 backup.exe 2016 backup.exe 1572 backup.exe 452 backup.exe 624 backup.exe 1852 backup.exe 1992 backup.exe 1988 backup.exe 1940 backup.exe 1076 backup.exe 952 backup.exe 2028 backup.exe 1612 backup.exe 188 backup.exe 588 backup.exe 1676 backup.exe 1720 backup.exe 1556 backup.exe 1788 backup.exe 1704 backup.exe 480 backup.exe 1212 backup.exe 1540 backup.exe 108 backup.exe 1684 backup.exe 848 backup.exe 1648 backup.exe 1752 update.exe 1444 backup.exe 1420 backup.exe 1180 backup.exe 852 backup.exe 1228 backup.exe 1832 data.exe 904 backup.exe 784 backup.exe 268 backup.exe 1732 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 884 data.exe 884 data.exe 1444 backup.exe 1444 backup.exe 884 data.exe 884 data.exe 1644 backup.exe 1644 backup.exe 1832 backup.exe 1832 backup.exe 1644 backup.exe 1644 backup.exe 2008 backup.exe 2008 backup.exe 556 backup.exe 556 backup.exe 556 backup.exe 556 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1616 backup.exe 1644 backup.exe 1644 backup.exe 884 data.exe 884 data.exe 556 backup.exe 2008 backup.exe 556 backup.exe 2008 backup.exe 1616 backup.exe 1616 backup.exe 2008 backup.exe 556 backup.exe 2008 backup.exe 556 backup.exe 1644 backup.exe 1644 backup.exe 884 data.exe 1644 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\data.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre7\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe data.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 560 backup.exe 1960 backup.exe 680 backup.exe 108 System Restore.exe 304 backup.exe 1524 backup.exe 1148 backup.exe 884 data.exe 1444 backup.exe 452 backup.exe 1644 backup.exe 1832 backup.exe 1628 backup.exe 2008 backup.exe 556 backup.exe 1616 backup.exe 580 backup.exe 784 data.exe 1968 backup.exe 1212 backup.exe 1692 backup.exe 304 backup.exe 1604 backup.exe 1224 backup.exe 1668 backup.exe 2016 backup.exe 632 backup.exe 1572 backup.exe 452 backup.exe 1852 backup.exe 624 backup.exe 1940 backup.exe 1992 backup.exe 1076 backup.exe 952 backup.exe 2028 backup.exe 188 backup.exe 1720 backup.exe 588 backup.exe 1612 backup.exe 1556 backup.exe 1676 backup.exe 1704 backup.exe 480 backup.exe 1212 backup.exe 848 backup.exe 1788 backup.exe 108 backup.exe 1648 backup.exe 1752 update.exe 1684 backup.exe 1540 backup.exe 1420 backup.exe 1180 backup.exe 1832 data.exe 852 backup.exe 1444 backup.exe 1228 backup.exe 904 backup.exe 1164 backup.exe 1732 backup.exe 784 backup.exe 268 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 560 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 28 PID 860 wrote to memory of 560 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 28 PID 860 wrote to memory of 560 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 28 PID 860 wrote to memory of 560 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 28 PID 860 wrote to memory of 1960 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 29 PID 860 wrote to memory of 1960 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 29 PID 860 wrote to memory of 1960 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 29 PID 860 wrote to memory of 1960 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 29 PID 860 wrote to memory of 680 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 30 PID 860 wrote to memory of 680 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 30 PID 860 wrote to memory of 680 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 30 PID 860 wrote to memory of 680 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 30 PID 860 wrote to memory of 108 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 31 PID 860 wrote to memory of 108 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 31 PID 860 wrote to memory of 108 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 31 PID 860 wrote to memory of 108 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 31 PID 860 wrote to memory of 304 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 32 PID 860 wrote to memory of 304 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 32 PID 860 wrote to memory of 304 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 32 PID 860 wrote to memory of 304 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 32 PID 860 wrote to memory of 1524 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 33 PID 860 wrote to memory of 1524 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 33 PID 860 wrote to memory of 1524 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 33 PID 860 wrote to memory of 1524 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 33 PID 860 wrote to memory of 1148 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 34 PID 860 wrote to memory of 1148 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 34 PID 860 wrote to memory of 1148 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 34 PID 860 wrote to memory of 1148 860 f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe 34 PID 560 wrote to memory of 884 560 backup.exe 35 PID 560 wrote to memory of 884 560 backup.exe 35 PID 560 wrote to memory of 884 560 backup.exe 35 PID 560 wrote to memory of 884 560 backup.exe 35 PID 884 wrote to memory of 1444 884 data.exe 36 PID 884 wrote to memory of 1444 884 data.exe 36 PID 884 wrote to memory of 1444 884 data.exe 36 PID 884 wrote to memory of 1444 884 data.exe 36 PID 1444 wrote to memory of 452 1444 backup.exe 37 PID 1444 wrote to memory of 452 1444 backup.exe 37 PID 1444 wrote to memory of 452 1444 backup.exe 37 PID 1444 wrote to memory of 452 1444 backup.exe 37 PID 884 wrote to memory of 1644 884 data.exe 38 PID 884 wrote to memory of 1644 884 data.exe 38 PID 884 wrote to memory of 1644 884 data.exe 38 PID 884 wrote to memory of 1644 884 data.exe 38 PID 1644 wrote to memory of 1832 1644 backup.exe 39 PID 1644 wrote to memory of 1832 1644 backup.exe 39 PID 1644 wrote to memory of 1832 1644 backup.exe 39 PID 1644 wrote to memory of 1832 1644 backup.exe 39 PID 1832 wrote to memory of 1628 1832 backup.exe 40 PID 1832 wrote to memory of 1628 1832 backup.exe 40 PID 1832 wrote to memory of 1628 1832 backup.exe 40 PID 1832 wrote to memory of 1628 1832 backup.exe 40 PID 1644 wrote to memory of 2008 1644 backup.exe 41 PID 1644 wrote to memory of 2008 1644 backup.exe 41 PID 1644 wrote to memory of 2008 1644 backup.exe 41 PID 1644 wrote to memory of 2008 1644 backup.exe 41 PID 2008 wrote to memory of 556 2008 backup.exe 42 PID 2008 wrote to memory of 556 2008 backup.exe 42 PID 2008 wrote to memory of 556 2008 backup.exe 42 PID 2008 wrote to memory of 556 2008 backup.exe 42 PID 556 wrote to memory of 1776 556 backup.exe 43 PID 556 wrote to memory of 1776 556 backup.exe 43 PID 556 wrote to memory of 1776 556 backup.exe 43 PID 556 wrote to memory of 1776 556 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe"C:\Users\Admin\AppData\Local\Temp\f1841b68d34e872adb2ce83e98d12067946da0ad836f282d6cab2d37183b7525.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:860 -
C:\Users\Admin\AppData\Local\Temp\1670681770\backup.exeC:\Users\Admin\AppData\Local\Temp\1670681770\backup.exe C:\Users\Admin\AppData\Local\Temp\1670681770\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:560 -
C:\data.exe\data.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:884 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1444 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:452
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1644 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1628
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2008 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:556 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1776
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:784
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1692
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:304
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1604
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Executes dropped EXE
PID:1988
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:188
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:852
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1984
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:684
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1584
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1180
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:304
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:604
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:2064
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:452 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1704
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:588
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1684 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:1948
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:624
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:2056
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1772
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1704
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2028
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1852 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1556
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:952 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1952
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:2020
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1580
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1692
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1356
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1564
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1224 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
C:\Program Files\DVD Maker\en-US\update.exe"C:\Program Files\DVD Maker\en-US\update.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1752
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1228
-
-
C:\Program Files\DVD Maker\fr-FR\data.exe"C:\Program Files\DVD Maker\fr-FR\data.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:2012
-
-
C:\Program Files\DVD Maker\it-IT\data.exe"C:\Program Files\DVD Maker\it-IT\data.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:812
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:2004
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1720 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:480 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:932
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:904
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1096
-
-
C:\Program Files\Internet Explorer\fr-FR\data.exe"C:\Program Files\Internet Explorer\fr-FR\data.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:1672
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1420 -
C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe"C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe" C:\Program Files\Java\jdk1.7.0_80\bin\7⤵PID:1312
-
-
C:\Program Files\Java\jdk1.7.0_80\db\backup.exe"C:\Program Files\Java\jdk1.7.0_80\db\backup.exe" C:\Program Files\Java\jdk1.7.0_80\db\7⤵PID:1728
-
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:2024
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:944
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1236
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1512
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:632 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:848 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:784
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1300
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1232
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2072
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:108 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:188
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:336
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1800
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1604
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1660
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1524
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:968
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:108
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50e62a8fc9b998ec4c278c6eb6e360b7a
SHA1b22285440c90f32d73b6fe4105c9a8c56bbac799
SHA256321fa5114416e1b3e492728336dc8b7debc84fbf6fc89538eac43172af2a21c7
SHA512c82098516df2b7b96a01836b7e40985939b49a3fe381c136eb0c6b707340c9018af1d3538939e82c1eb0e4f6498d80652cfa9c6d7098cce6f550b4c8ba881b9b
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD5e16e75760ca12446014fe4e9390dd228
SHA17a2a5868788733209b544393d329c0a703849335
SHA2569e1f201e7371355611a17e26bfb2f9ed2e3ab5c7e6ce5e786cdea4ae40bf8e1f
SHA51247ca2ada81ffa56ae29b381a124c18b60bc82dba95e102452bc5f551b236836fcad9f306a27f9b0c3463c2130af857f8719bc62d2c7165c68e581ab0a9b812f9
-
Filesize
72KB
MD50e62a8fc9b998ec4c278c6eb6e360b7a
SHA1b22285440c90f32d73b6fe4105c9a8c56bbac799
SHA256321fa5114416e1b3e492728336dc8b7debc84fbf6fc89538eac43172af2a21c7
SHA512c82098516df2b7b96a01836b7e40985939b49a3fe381c136eb0c6b707340c9018af1d3538939e82c1eb0e4f6498d80652cfa9c6d7098cce6f550b4c8ba881b9b
-
Filesize
72KB
MD50e62a8fc9b998ec4c278c6eb6e360b7a
SHA1b22285440c90f32d73b6fe4105c9a8c56bbac799
SHA256321fa5114416e1b3e492728336dc8b7debc84fbf6fc89538eac43172af2a21c7
SHA512c82098516df2b7b96a01836b7e40985939b49a3fe381c136eb0c6b707340c9018af1d3538939e82c1eb0e4f6498d80652cfa9c6d7098cce6f550b4c8ba881b9b
-
Filesize
72KB
MD5eeb3d649934ca0f568c4a8eec6ff6b8e
SHA1dabbea0ce6af883f77b9e5fe2b54c85d01cc325b
SHA2562ca82edd00ddadeb8f57078830ff37bb388bb7a32760e6e7566c0d22cdb812d1
SHA512259aba1fc0f3df5ab78aaaf776330af911de85394187b483a4bcabbb56f369cfb269646a9ea85b6e13846c48da8d35e8650ce84d20653781ec2972522411161c
-
Filesize
72KB
MD53db43e80bab94dc5ba67ae3f591d4a78
SHA1aaa1f1e386b8fb9831eec7918b8ba1d6b2f2b992
SHA256e3d17412e76b5feeb54b2ccb59ee9ad1fd6ba845db6fc29ebdebabd7d24a8246
SHA512def86b2ebd9fb7cd9aac7d4fec7beb16ed3e84d70dce9bae8c0ecbf8de69bd08776f2c699d49139c82c2f0d8e91e71237773b1c3c2ebac0dcd6cd38325007f9e
-
Filesize
72KB
MD53db43e80bab94dc5ba67ae3f591d4a78
SHA1aaa1f1e386b8fb9831eec7918b8ba1d6b2f2b992
SHA256e3d17412e76b5feeb54b2ccb59ee9ad1fd6ba845db6fc29ebdebabd7d24a8246
SHA512def86b2ebd9fb7cd9aac7d4fec7beb16ed3e84d70dce9bae8c0ecbf8de69bd08776f2c699d49139c82c2f0d8e91e71237773b1c3c2ebac0dcd6cd38325007f9e
-
Filesize
72KB
MD5eece3fe8cbabe2f23c56cfd084f3952f
SHA1703ba46b5efd903f8b26baf5a10a408e7a959a39
SHA256868cd6ee23cd482e10c475cf0a9e1921ba0d45e5e805d12162bb42532e535df1
SHA5123d591e0fafa7d95fa4384808f99fbbcf64479f94434984c76563d0efdeb5f4d2094cbf0dfcbb9126c03ad454873882c0e2bf5c86b49639cdd09af549b1966454
-
Filesize
72KB
MD541a9c0e021f4b92eb80f96bc21f82136
SHA1478f6d040bba3047785e9f5577979ae6871e7062
SHA2566e3930b5135458f60b51f373b12671436a8fb5ea46da9fa32f01266023b54285
SHA512b1ad4e85366835109a40707553081ce49d258b124206999a687fa10633ebab05ead4b5ce9ada1b0e1eef307359dfb5ebd1956e81ee7dec37639c384123aa0850
-
Filesize
72KB
MD541a9c0e021f4b92eb80f96bc21f82136
SHA1478f6d040bba3047785e9f5577979ae6871e7062
SHA2566e3930b5135458f60b51f373b12671436a8fb5ea46da9fa32f01266023b54285
SHA512b1ad4e85366835109a40707553081ce49d258b124206999a687fa10633ebab05ead4b5ce9ada1b0e1eef307359dfb5ebd1956e81ee7dec37639c384123aa0850
-
Filesize
72KB
MD5eece3fe8cbabe2f23c56cfd084f3952f
SHA1703ba46b5efd903f8b26baf5a10a408e7a959a39
SHA256868cd6ee23cd482e10c475cf0a9e1921ba0d45e5e805d12162bb42532e535df1
SHA5123d591e0fafa7d95fa4384808f99fbbcf64479f94434984c76563d0efdeb5f4d2094cbf0dfcbb9126c03ad454873882c0e2bf5c86b49639cdd09af549b1966454
-
Filesize
72KB
MD5c0b22d1d59397a0e668c16fec2b52d42
SHA162fd29328d90af3e5a165643667a2acf4f53bd29
SHA256d5759a5983e9e57d2edd07d08b2d33bdd38d718873f2000d9f2eb69740f697e9
SHA5122e2eeb1f376287339d9e1b63f81eec94edbbe166cb5d8953d94b3ff3e39b63595ea921c228b95ee017c77f359c37a151ab717537824ae6f583f0f6b5e5ddf2a3
-
Filesize
72KB
MD5c0b22d1d59397a0e668c16fec2b52d42
SHA162fd29328d90af3e5a165643667a2acf4f53bd29
SHA256d5759a5983e9e57d2edd07d08b2d33bdd38d718873f2000d9f2eb69740f697e9
SHA5122e2eeb1f376287339d9e1b63f81eec94edbbe166cb5d8953d94b3ff3e39b63595ea921c228b95ee017c77f359c37a151ab717537824ae6f583f0f6b5e5ddf2a3
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD59df47b15c6574eaa563fb0b1828e2493
SHA13f5daa3e9854851853c2d789258f1499f0934203
SHA256620f201f43b6e435729d546e1de9d4671f9c5e692ff32eee8fe14e16e786dbd0
SHA51266c6d9b1c3b7787d737915c1b75e5f6b0081a3bcf7a835155d8b3aee004209a1656703b49089f5d7d9e1b757105973e5a97fb309ce0e5126bbf1d04dcd8bd522
-
Filesize
72KB
MD59df47b15c6574eaa563fb0b1828e2493
SHA13f5daa3e9854851853c2d789258f1499f0934203
SHA256620f201f43b6e435729d546e1de9d4671f9c5e692ff32eee8fe14e16e786dbd0
SHA51266c6d9b1c3b7787d737915c1b75e5f6b0081a3bcf7a835155d8b3aee004209a1656703b49089f5d7d9e1b757105973e5a97fb309ce0e5126bbf1d04dcd8bd522
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD5168ff30ca6fd384a12aad0f0a285abda
SHA1de62aa1e7d4f351653c5987ff1af173fa5ecd6c1
SHA25632d3b38deb95080b255a775099cbc0315c0ad01a06646e0a685ac095515772eb
SHA5121ac7b22e2b031664836f2f429a368df5e0fdcaf031b83564384dbb5fa16cd0180d0d8c76a0db34b35c2e9f97c59c9c68eb394d1de9bdc70bd759869dd0d60c55
-
Filesize
72KB
MD5168ff30ca6fd384a12aad0f0a285abda
SHA1de62aa1e7d4f351653c5987ff1af173fa5ecd6c1
SHA25632d3b38deb95080b255a775099cbc0315c0ad01a06646e0a685ac095515772eb
SHA5121ac7b22e2b031664836f2f429a368df5e0fdcaf031b83564384dbb5fa16cd0180d0d8c76a0db34b35c2e9f97c59c9c68eb394d1de9bdc70bd759869dd0d60c55
-
Filesize
72KB
MD50e62a8fc9b998ec4c278c6eb6e360b7a
SHA1b22285440c90f32d73b6fe4105c9a8c56bbac799
SHA256321fa5114416e1b3e492728336dc8b7debc84fbf6fc89538eac43172af2a21c7
SHA512c82098516df2b7b96a01836b7e40985939b49a3fe381c136eb0c6b707340c9018af1d3538939e82c1eb0e4f6498d80652cfa9c6d7098cce6f550b4c8ba881b9b
-
Filesize
72KB
MD50e62a8fc9b998ec4c278c6eb6e360b7a
SHA1b22285440c90f32d73b6fe4105c9a8c56bbac799
SHA256321fa5114416e1b3e492728336dc8b7debc84fbf6fc89538eac43172af2a21c7
SHA512c82098516df2b7b96a01836b7e40985939b49a3fe381c136eb0c6b707340c9018af1d3538939e82c1eb0e4f6498d80652cfa9c6d7098cce6f550b4c8ba881b9b
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD5e16e75760ca12446014fe4e9390dd228
SHA17a2a5868788733209b544393d329c0a703849335
SHA2569e1f201e7371355611a17e26bfb2f9ed2e3ab5c7e6ce5e786cdea4ae40bf8e1f
SHA51247ca2ada81ffa56ae29b381a124c18b60bc82dba95e102452bc5f551b236836fcad9f306a27f9b0c3463c2130af857f8719bc62d2c7165c68e581ab0a9b812f9
-
Filesize
72KB
MD5e16e75760ca12446014fe4e9390dd228
SHA17a2a5868788733209b544393d329c0a703849335
SHA2569e1f201e7371355611a17e26bfb2f9ed2e3ab5c7e6ce5e786cdea4ae40bf8e1f
SHA51247ca2ada81ffa56ae29b381a124c18b60bc82dba95e102452bc5f551b236836fcad9f306a27f9b0c3463c2130af857f8719bc62d2c7165c68e581ab0a9b812f9
-
Filesize
72KB
MD50e62a8fc9b998ec4c278c6eb6e360b7a
SHA1b22285440c90f32d73b6fe4105c9a8c56bbac799
SHA256321fa5114416e1b3e492728336dc8b7debc84fbf6fc89538eac43172af2a21c7
SHA512c82098516df2b7b96a01836b7e40985939b49a3fe381c136eb0c6b707340c9018af1d3538939e82c1eb0e4f6498d80652cfa9c6d7098cce6f550b4c8ba881b9b
-
Filesize
72KB
MD50e62a8fc9b998ec4c278c6eb6e360b7a
SHA1b22285440c90f32d73b6fe4105c9a8c56bbac799
SHA256321fa5114416e1b3e492728336dc8b7debc84fbf6fc89538eac43172af2a21c7
SHA512c82098516df2b7b96a01836b7e40985939b49a3fe381c136eb0c6b707340c9018af1d3538939e82c1eb0e4f6498d80652cfa9c6d7098cce6f550b4c8ba881b9b
-
Filesize
72KB
MD5eeb3d649934ca0f568c4a8eec6ff6b8e
SHA1dabbea0ce6af883f77b9e5fe2b54c85d01cc325b
SHA2562ca82edd00ddadeb8f57078830ff37bb388bb7a32760e6e7566c0d22cdb812d1
SHA512259aba1fc0f3df5ab78aaaf776330af911de85394187b483a4bcabbb56f369cfb269646a9ea85b6e13846c48da8d35e8650ce84d20653781ec2972522411161c
-
Filesize
72KB
MD5eeb3d649934ca0f568c4a8eec6ff6b8e
SHA1dabbea0ce6af883f77b9e5fe2b54c85d01cc325b
SHA2562ca82edd00ddadeb8f57078830ff37bb388bb7a32760e6e7566c0d22cdb812d1
SHA512259aba1fc0f3df5ab78aaaf776330af911de85394187b483a4bcabbb56f369cfb269646a9ea85b6e13846c48da8d35e8650ce84d20653781ec2972522411161c
-
Filesize
72KB
MD53db43e80bab94dc5ba67ae3f591d4a78
SHA1aaa1f1e386b8fb9831eec7918b8ba1d6b2f2b992
SHA256e3d17412e76b5feeb54b2ccb59ee9ad1fd6ba845db6fc29ebdebabd7d24a8246
SHA512def86b2ebd9fb7cd9aac7d4fec7beb16ed3e84d70dce9bae8c0ecbf8de69bd08776f2c699d49139c82c2f0d8e91e71237773b1c3c2ebac0dcd6cd38325007f9e
-
Filesize
72KB
MD53db43e80bab94dc5ba67ae3f591d4a78
SHA1aaa1f1e386b8fb9831eec7918b8ba1d6b2f2b992
SHA256e3d17412e76b5feeb54b2ccb59ee9ad1fd6ba845db6fc29ebdebabd7d24a8246
SHA512def86b2ebd9fb7cd9aac7d4fec7beb16ed3e84d70dce9bae8c0ecbf8de69bd08776f2c699d49139c82c2f0d8e91e71237773b1c3c2ebac0dcd6cd38325007f9e
-
Filesize
72KB
MD5eece3fe8cbabe2f23c56cfd084f3952f
SHA1703ba46b5efd903f8b26baf5a10a408e7a959a39
SHA256868cd6ee23cd482e10c475cf0a9e1921ba0d45e5e805d12162bb42532e535df1
SHA5123d591e0fafa7d95fa4384808f99fbbcf64479f94434984c76563d0efdeb5f4d2094cbf0dfcbb9126c03ad454873882c0e2bf5c86b49639cdd09af549b1966454
-
Filesize
72KB
MD5eece3fe8cbabe2f23c56cfd084f3952f
SHA1703ba46b5efd903f8b26baf5a10a408e7a959a39
SHA256868cd6ee23cd482e10c475cf0a9e1921ba0d45e5e805d12162bb42532e535df1
SHA5123d591e0fafa7d95fa4384808f99fbbcf64479f94434984c76563d0efdeb5f4d2094cbf0dfcbb9126c03ad454873882c0e2bf5c86b49639cdd09af549b1966454
-
Filesize
72KB
MD541a9c0e021f4b92eb80f96bc21f82136
SHA1478f6d040bba3047785e9f5577979ae6871e7062
SHA2566e3930b5135458f60b51f373b12671436a8fb5ea46da9fa32f01266023b54285
SHA512b1ad4e85366835109a40707553081ce49d258b124206999a687fa10633ebab05ead4b5ce9ada1b0e1eef307359dfb5ebd1956e81ee7dec37639c384123aa0850
-
Filesize
72KB
MD541a9c0e021f4b92eb80f96bc21f82136
SHA1478f6d040bba3047785e9f5577979ae6871e7062
SHA2566e3930b5135458f60b51f373b12671436a8fb5ea46da9fa32f01266023b54285
SHA512b1ad4e85366835109a40707553081ce49d258b124206999a687fa10633ebab05ead4b5ce9ada1b0e1eef307359dfb5ebd1956e81ee7dec37639c384123aa0850
-
Filesize
72KB
MD5eece3fe8cbabe2f23c56cfd084f3952f
SHA1703ba46b5efd903f8b26baf5a10a408e7a959a39
SHA256868cd6ee23cd482e10c475cf0a9e1921ba0d45e5e805d12162bb42532e535df1
SHA5123d591e0fafa7d95fa4384808f99fbbcf64479f94434984c76563d0efdeb5f4d2094cbf0dfcbb9126c03ad454873882c0e2bf5c86b49639cdd09af549b1966454
-
Filesize
72KB
MD5eece3fe8cbabe2f23c56cfd084f3952f
SHA1703ba46b5efd903f8b26baf5a10a408e7a959a39
SHA256868cd6ee23cd482e10c475cf0a9e1921ba0d45e5e805d12162bb42532e535df1
SHA5123d591e0fafa7d95fa4384808f99fbbcf64479f94434984c76563d0efdeb5f4d2094cbf0dfcbb9126c03ad454873882c0e2bf5c86b49639cdd09af549b1966454
-
Filesize
72KB
MD5eece3fe8cbabe2f23c56cfd084f3952f
SHA1703ba46b5efd903f8b26baf5a10a408e7a959a39
SHA256868cd6ee23cd482e10c475cf0a9e1921ba0d45e5e805d12162bb42532e535df1
SHA5123d591e0fafa7d95fa4384808f99fbbcf64479f94434984c76563d0efdeb5f4d2094cbf0dfcbb9126c03ad454873882c0e2bf5c86b49639cdd09af549b1966454
-
Filesize
72KB
MD5c0b22d1d59397a0e668c16fec2b52d42
SHA162fd29328d90af3e5a165643667a2acf4f53bd29
SHA256d5759a5983e9e57d2edd07d08b2d33bdd38d718873f2000d9f2eb69740f697e9
SHA5122e2eeb1f376287339d9e1b63f81eec94edbbe166cb5d8953d94b3ff3e39b63595ea921c228b95ee017c77f359c37a151ab717537824ae6f583f0f6b5e5ddf2a3
-
Filesize
72KB
MD5c0b22d1d59397a0e668c16fec2b52d42
SHA162fd29328d90af3e5a165643667a2acf4f53bd29
SHA256d5759a5983e9e57d2edd07d08b2d33bdd38d718873f2000d9f2eb69740f697e9
SHA5122e2eeb1f376287339d9e1b63f81eec94edbbe166cb5d8953d94b3ff3e39b63595ea921c228b95ee017c77f359c37a151ab717537824ae6f583f0f6b5e5ddf2a3
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD5570879861e4e56cdfc5482701199e1a6
SHA1a01ffa12da1ef38abd631ccc2b557731fad35762
SHA25638b0a393c273d9e921f6295ac0b67cd5893b70ee5c35407e33c2a700685add05
SHA5126aaa95da4ea4a002056b9a90f067ac9191aa1da503dcd3e8ac7eb702babef9877b3caa8af4a0e339b75b4d76ff3e7697863a28191bad0eefd87c09d79b21ce69
-
Filesize
72KB
MD59df47b15c6574eaa563fb0b1828e2493
SHA13f5daa3e9854851853c2d789258f1499f0934203
SHA256620f201f43b6e435729d546e1de9d4671f9c5e692ff32eee8fe14e16e786dbd0
SHA51266c6d9b1c3b7787d737915c1b75e5f6b0081a3bcf7a835155d8b3aee004209a1656703b49089f5d7d9e1b757105973e5a97fb309ce0e5126bbf1d04dcd8bd522
-
Filesize
72KB
MD59df47b15c6574eaa563fb0b1828e2493
SHA13f5daa3e9854851853c2d789258f1499f0934203
SHA256620f201f43b6e435729d546e1de9d4671f9c5e692ff32eee8fe14e16e786dbd0
SHA51266c6d9b1c3b7787d737915c1b75e5f6b0081a3bcf7a835155d8b3aee004209a1656703b49089f5d7d9e1b757105973e5a97fb309ce0e5126bbf1d04dcd8bd522
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c
-
Filesize
72KB
MD56cc08fbd20dc52fc778065e396129037
SHA11094b832d99101a0950329712af3b5cbfefbbbb1
SHA25609a3d54c7c0b56e6b258ee9235a143c5ccf77981dd872cd7012812c134224d51
SHA5120372ffa3e210e2918e50abd601d96001aca1259fc775c838b79b1eb2030f0f08b80f986f5e4f8f3147ad1e81b0c234aeb8286efbf88fc09883196722ed1d354c