Analysis
-
max time kernel
163s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 16:47
Static task
static1
Behavioral task
behavioral1
Sample
ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe
Resource
win10v2004-20221111-en
General
-
Target
ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe
-
Size
72KB
-
MD5
018fbce63f21c3b58a1cb76b16f1bd58
-
SHA1
a9feaf8be6074fe7a1d9d826a7848d7f92f9d66c
-
SHA256
ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c
-
SHA512
53a7a66a6894b3c863f6d7b30856018b5f85ce25bfb0b35e7883635bea8a1028015096c7492f1d95a490a774567178f0b1bb97709de65e0d3f04aa455804c859
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2G:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPy
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4216 backup.exe 856 backup.exe 3632 backup.exe 3932 System Restore.exe 3948 backup.exe 4560 backup.exe 4736 backup.exe 4204 backup.exe 2456 backup.exe 3228 backup.exe 3364 backup.exe 528 backup.exe 4624 backup.exe 4772 backup.exe 2284 backup.exe 2632 backup.exe 4124 backup.exe 3736 backup.exe 1040 backup.exe 4780 backup.exe 3620 backup.exe 4540 backup.exe 3936 backup.exe 4044 backup.exe 2816 backup.exe 3920 backup.exe 424 backup.exe 3136 backup.exe 4196 backup.exe 1684 backup.exe 2104 backup.exe 1508 backup.exe 2932 backup.exe 3476 backup.exe 4792 backup.exe 2032 System Restore.exe 3008 backup.exe 4440 backup.exe 1484 System Restore.exe 4560 backup.exe 1308 backup.exe 4624 backup.exe 1360 backup.exe 1352 backup.exe 1576 backup.exe 2576 backup.exe 4800 backup.exe 3912 backup.exe 4272 backup.exe 856 System Restore.exe 1204 backup.exe 2160 backup.exe 4484 backup.exe 4500 backup.exe 1284 backup.exe 572 backup.exe 4264 backup.exe 732 backup.exe 1812 backup.exe 1328 backup.exe 4708 backup.exe 4784 backup.exe 1960 backup.exe 4292 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\backup.exe data.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe System Restore.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Java\data.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\System Restore.exe System Restore.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe System Restore.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\update.exe backup.exe File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 4216 backup.exe 856 backup.exe 3932 System Restore.exe 3632 backup.exe 3948 backup.exe 4736 backup.exe 4560 backup.exe 4204 backup.exe 2456 backup.exe 3228 backup.exe 3364 backup.exe 528 backup.exe 4624 backup.exe 4772 backup.exe 2284 backup.exe 2632 backup.exe 4124 backup.exe 3736 backup.exe 1040 backup.exe 4780 backup.exe 3620 backup.exe 4540 backup.exe 2816 backup.exe 3936 backup.exe 4044 backup.exe 3920 backup.exe 3136 backup.exe 1684 backup.exe 2104 backup.exe 4196 backup.exe 424 backup.exe 1508 backup.exe 2932 backup.exe 3476 backup.exe 4792 backup.exe 1484 System Restore.exe 4624 backup.exe 1308 backup.exe 2032 System Restore.exe 4440 backup.exe 3008 backup.exe 1360 backup.exe 1576 backup.exe 4560 backup.exe 1352 backup.exe 2576 backup.exe 4800 backup.exe 4272 backup.exe 4484 backup.exe 2160 backup.exe 4500 backup.exe 3912 backup.exe 856 System Restore.exe 1204 backup.exe 4264 backup.exe 572 backup.exe 1284 backup.exe 4708 backup.exe 1812 backup.exe 1328 backup.exe 732 backup.exe 4292 backup.exe 4784 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4216 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 83 PID 1840 wrote to memory of 4216 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 83 PID 1840 wrote to memory of 4216 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 83 PID 1840 wrote to memory of 856 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 84 PID 1840 wrote to memory of 856 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 84 PID 1840 wrote to memory of 856 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 84 PID 4216 wrote to memory of 3932 4216 backup.exe 88 PID 4216 wrote to memory of 3932 4216 backup.exe 88 PID 4216 wrote to memory of 3932 4216 backup.exe 88 PID 1840 wrote to memory of 3632 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 87 PID 1840 wrote to memory of 3632 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 87 PID 1840 wrote to memory of 3632 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 87 PID 3932 wrote to memory of 3948 3932 System Restore.exe 89 PID 3932 wrote to memory of 3948 3932 System Restore.exe 89 PID 3932 wrote to memory of 3948 3932 System Restore.exe 89 PID 1840 wrote to memory of 4560 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 90 PID 1840 wrote to memory of 4560 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 90 PID 1840 wrote to memory of 4560 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 90 PID 3932 wrote to memory of 4736 3932 System Restore.exe 91 PID 3932 wrote to memory of 4736 3932 System Restore.exe 91 PID 3932 wrote to memory of 4736 3932 System Restore.exe 91 PID 1840 wrote to memory of 4204 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 92 PID 1840 wrote to memory of 4204 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 92 PID 1840 wrote to memory of 4204 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 92 PID 3932 wrote to memory of 2456 3932 System Restore.exe 93 PID 3932 wrote to memory of 2456 3932 System Restore.exe 93 PID 3932 wrote to memory of 2456 3932 System Restore.exe 93 PID 1840 wrote to memory of 3228 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 94 PID 1840 wrote to memory of 3228 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 94 PID 1840 wrote to memory of 3228 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 94 PID 2456 wrote to memory of 3364 2456 backup.exe 95 PID 2456 wrote to memory of 3364 2456 backup.exe 95 PID 2456 wrote to memory of 3364 2456 backup.exe 95 PID 1840 wrote to memory of 528 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 96 PID 1840 wrote to memory of 528 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 96 PID 1840 wrote to memory of 528 1840 ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe 96 PID 3364 wrote to memory of 4624 3364 backup.exe 97 PID 3364 wrote to memory of 4624 3364 backup.exe 97 PID 3364 wrote to memory of 4624 3364 backup.exe 97 PID 2456 wrote to memory of 4772 2456 backup.exe 98 PID 2456 wrote to memory of 4772 2456 backup.exe 98 PID 2456 wrote to memory of 4772 2456 backup.exe 98 PID 4772 wrote to memory of 2284 4772 backup.exe 99 PID 4772 wrote to memory of 2284 4772 backup.exe 99 PID 4772 wrote to memory of 2284 4772 backup.exe 99 PID 4772 wrote to memory of 2632 4772 backup.exe 100 PID 4772 wrote to memory of 2632 4772 backup.exe 100 PID 4772 wrote to memory of 2632 4772 backup.exe 100 PID 2632 wrote to memory of 4124 2632 backup.exe 102 PID 2632 wrote to memory of 4124 2632 backup.exe 102 PID 2632 wrote to memory of 4124 2632 backup.exe 102 PID 2632 wrote to memory of 3736 2632 backup.exe 103 PID 2632 wrote to memory of 3736 2632 backup.exe 103 PID 2632 wrote to memory of 3736 2632 backup.exe 103 PID 3736 wrote to memory of 1040 3736 backup.exe 104 PID 3736 wrote to memory of 1040 3736 backup.exe 104 PID 3736 wrote to memory of 1040 3736 backup.exe 104 PID 3736 wrote to memory of 4780 3736 backup.exe 105 PID 3736 wrote to memory of 4780 3736 backup.exe 105 PID 3736 wrote to memory of 4780 3736 backup.exe 105 PID 3736 wrote to memory of 3620 3736 backup.exe 106 PID 3736 wrote to memory of 3620 3736 backup.exe 106 PID 3736 wrote to memory of 3620 3736 backup.exe 106 PID 2456 wrote to memory of 4540 2456 backup.exe 111 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe"C:\Users\Admin\AppData\Local\Temp\ba7dd03043f1584748c40384b3bc6d29ebca6803105f700948a03b0bc45c149c.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\1151817066\backup.exeC:\Users\Admin\AppData\Local\Temp\1151817066\backup.exe C:\Users\Admin\AppData\Local\Temp\1151817066\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\System Restore.exe"\System Restore.exe" \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3948
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4736
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3364 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4772 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2284
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4124
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3736 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4780
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3620
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1684
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4560
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2636
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:728
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3936 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3008
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4264
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4784
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:1320
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3136 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2576
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4800
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵PID:1956
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3920
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:424 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
C:\Program Files\Common Files\System\ado\en-US\update.exe"C:\Program Files\Common Files\System\ado\en-US\update.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1272
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1260
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4224
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4540 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1508 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:1960
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:4168
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1504
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2104 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1308
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1812
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4544
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1352 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4292
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵PID:1684
-
-
-
C:\Program Files\Java\jre1.8.0_66\backup.exe"C:\Program Files\Java\jre1.8.0_66\backup.exe" C:\Program Files\Java\jre1.8.0_66\6⤵PID:4568
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1748
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4044 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3476 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:856
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:4344 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵PID:3612
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵PID:4992
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1360 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3912 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:732
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵PID:4080
-
-
-
C:\Program Files (x86)\Common Files\Java\data.exe"C:\Program Files (x86)\Common Files\Java\data.exe" C:\Program Files (x86)\Common Files\Java\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:388
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1156
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4196 -
C:\Users\Admin\System Restore.exe"C:\Users\Admin\System Restore.exe" C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4272
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1328
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:480
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
PID:2420
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1576 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
C:\Windows\appcompat\update.exeC:\Windows\appcompat\update.exe C:\Windows\appcompat\5⤵
- Drops file in Windows directory
PID:4072 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵PID:1212
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵PID:1732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56a731343d0859624c45b22bc06c75cd0
SHA1f83d1e510892cf642ec44cfef25dbc9820a199bf
SHA2565f7b52f49ae8ac17fb12ed914fedd94c06223db07b6150018d3cd0449840efc2
SHA5125a8bb0ece769099230271810527fdb391399dd113933403f7be2a46edec0c84e8604381fd2010f2f7dc5ed65d24cd6c995e879c48ca1737c9ac4ced1c448743d
-
Filesize
72KB
MD56a731343d0859624c45b22bc06c75cd0
SHA1f83d1e510892cf642ec44cfef25dbc9820a199bf
SHA2565f7b52f49ae8ac17fb12ed914fedd94c06223db07b6150018d3cd0449840efc2
SHA5125a8bb0ece769099230271810527fdb391399dd113933403f7be2a46edec0c84e8604381fd2010f2f7dc5ed65d24cd6c995e879c48ca1737c9ac4ced1c448743d
-
Filesize
72KB
MD5f2eba35f815e9a76a45fc21bc35513c5
SHA1489d881ea06f69c6be9bc5fc9ec8ebbd734fce8e
SHA25698061567146c736293203516b943d3800a41628bb1720c3f7971c65ce3e4532a
SHA5122425b2ff0420645faa5c5ba8b8592720acd46e494bf630f1517250cedfd5d29d3e546136c68f4635ccdfbf50001760823023108d20503f6dc001156b6bf48620
-
Filesize
72KB
MD5f2eba35f815e9a76a45fc21bc35513c5
SHA1489d881ea06f69c6be9bc5fc9ec8ebbd734fce8e
SHA25698061567146c736293203516b943d3800a41628bb1720c3f7971c65ce3e4532a
SHA5122425b2ff0420645faa5c5ba8b8592720acd46e494bf630f1517250cedfd5d29d3e546136c68f4635ccdfbf50001760823023108d20503f6dc001156b6bf48620
-
Filesize
72KB
MD5d5e7b2c98363a0a39094faee2fea019c
SHA1c2ae95489bcbc2f7be8cfe15d8c11dafa8c422da
SHA256b3f2f0c92e60b537bbd588bf4789dafd7e696fec85db2209f55e7808271b938d
SHA51240bf075263074e9337e90400ae3467705a3485d0f4e3a807fe054ac6faadfc5405fbadc7613d3ce1260e7112d3f2278cb931216ccec9ee78cc562f7c99bf858c
-
Filesize
72KB
MD5d5e7b2c98363a0a39094faee2fea019c
SHA1c2ae95489bcbc2f7be8cfe15d8c11dafa8c422da
SHA256b3f2f0c92e60b537bbd588bf4789dafd7e696fec85db2209f55e7808271b938d
SHA51240bf075263074e9337e90400ae3467705a3485d0f4e3a807fe054ac6faadfc5405fbadc7613d3ce1260e7112d3f2278cb931216ccec9ee78cc562f7c99bf858c
-
Filesize
72KB
MD55e02699f0922fddd10105ea512f76840
SHA1302a66d72a7be394dccec4d7b6296e3590cbfa00
SHA256611a4f0b8b64a0b4e836a6fe1eef823c8d057de6fe28ea6f0098ca773bc3c641
SHA512ad8c063e3679af92866751ec8fce2f56d2718e95ae1ffc5bb8031939584862ac96926a490de856edcf050264089e33c600ac1873c97fd0610ed2039b92407c64
-
Filesize
72KB
MD55e02699f0922fddd10105ea512f76840
SHA1302a66d72a7be394dccec4d7b6296e3590cbfa00
SHA256611a4f0b8b64a0b4e836a6fe1eef823c8d057de6fe28ea6f0098ca773bc3c641
SHA512ad8c063e3679af92866751ec8fce2f56d2718e95ae1ffc5bb8031939584862ac96926a490de856edcf050264089e33c600ac1873c97fd0610ed2039b92407c64
-
Filesize
72KB
MD5bdc77feb620bbdb7c3dd7dcf88a11127
SHA184ef851bbf9e84827a722fcc113ca718f29d111c
SHA2560d96c8b3c8988396c64a39c38b33365e866be66cf22e9294283a46024338cb0b
SHA512ffdf7f7b381b5960069b27affbb538c4730843d92e3a538021b0c68cbf23d1bf72144b8e4022f0a8d33f20b7b7da261880734b423e96baca2c2c58419fd50ddb
-
Filesize
72KB
MD5bdc77feb620bbdb7c3dd7dcf88a11127
SHA184ef851bbf9e84827a722fcc113ca718f29d111c
SHA2560d96c8b3c8988396c64a39c38b33365e866be66cf22e9294283a46024338cb0b
SHA512ffdf7f7b381b5960069b27affbb538c4730843d92e3a538021b0c68cbf23d1bf72144b8e4022f0a8d33f20b7b7da261880734b423e96baca2c2c58419fd50ddb
-
Filesize
72KB
MD5e2196c9da7dd18d07ce2add17f4e28f1
SHA1f7827fc71fa1cbddf23f052780bb5827c05fc6b4
SHA25645b97f7bd91d1421d013bffec466293564949093f19ab2bc1960378cb9052837
SHA512cce0b055bea0faead418db0d99985c9f85083d813259ddf16ba7e8e20ca4f275387c6c71e0b308743ef7a04444e7bbd28babcb02cf064d4fd13ab41d48ce7c2e
-
Filesize
72KB
MD5e2196c9da7dd18d07ce2add17f4e28f1
SHA1f7827fc71fa1cbddf23f052780bb5827c05fc6b4
SHA25645b97f7bd91d1421d013bffec466293564949093f19ab2bc1960378cb9052837
SHA512cce0b055bea0faead418db0d99985c9f85083d813259ddf16ba7e8e20ca4f275387c6c71e0b308743ef7a04444e7bbd28babcb02cf064d4fd13ab41d48ce7c2e
-
Filesize
72KB
MD53fe4c94618ecf19836da71ffa6191f65
SHA1da42bfacfd7b07f6a286824469b1ef164ab3be9e
SHA2561e3ebdebf75428a4f88c86eef1649ab4d880fb12b6e549841a4627ff90311203
SHA5123b4a357ba99ec26a05741611b1b3472763cab8320bf635357bca5814fff1130a6a894db1248795868183b6c19519d8babed65f621853475f2ef0c0ac3857848b
-
Filesize
72KB
MD53fe4c94618ecf19836da71ffa6191f65
SHA1da42bfacfd7b07f6a286824469b1ef164ab3be9e
SHA2561e3ebdebf75428a4f88c86eef1649ab4d880fb12b6e549841a4627ff90311203
SHA5123b4a357ba99ec26a05741611b1b3472763cab8320bf635357bca5814fff1130a6a894db1248795868183b6c19519d8babed65f621853475f2ef0c0ac3857848b
-
Filesize
72KB
MD54df0e24afc990af3c86bbdcf7fb80cd4
SHA111cc7c9100dfb004969e5d3e162f0f113aab6f3b
SHA25640167e3aa2f5a67717c2366db089c4ffb2e1fee5a5627ab895325b4b69370866
SHA5123b7853e4f3e08e492aff005b745460731e931bf757df1a1136a11dd27e82548232f655d6d6baf0a8e087f60e6c546d319a1289cb4c7c5f0ee8f7fec5b2403722
-
Filesize
72KB
MD54df0e24afc990af3c86bbdcf7fb80cd4
SHA111cc7c9100dfb004969e5d3e162f0f113aab6f3b
SHA25640167e3aa2f5a67717c2366db089c4ffb2e1fee5a5627ab895325b4b69370866
SHA5123b7853e4f3e08e492aff005b745460731e931bf757df1a1136a11dd27e82548232f655d6d6baf0a8e087f60e6c546d319a1289cb4c7c5f0ee8f7fec5b2403722
-
Filesize
72KB
MD5ede1329359e97e11233b72439429039e
SHA19c09aacc7832a8d76fec76c2c93e6b8a0844ce04
SHA2568a0dbd3945ef7f7922d15060becb470368b4558437c2309b79d5134971ee24c4
SHA512805c514737bb7b581dbb7b95bfac5f93425b44dcb90953aef893e799fb610010f79657bccf11c60d7590723259155013716a890b638c0f198dfab87624b6ccfe
-
Filesize
72KB
MD5ede1329359e97e11233b72439429039e
SHA19c09aacc7832a8d76fec76c2c93e6b8a0844ce04
SHA2568a0dbd3945ef7f7922d15060becb470368b4558437c2309b79d5134971ee24c4
SHA512805c514737bb7b581dbb7b95bfac5f93425b44dcb90953aef893e799fb610010f79657bccf11c60d7590723259155013716a890b638c0f198dfab87624b6ccfe
-
Filesize
72KB
MD5acc58b13986bf3cb0b8f1f689f7d7c82
SHA151411251776546e8722d8b35b407c23a1a465d06
SHA256db88d96007b3aeacdb312f05415945347fb7e11da6c5452e01c1f2819d332a5c
SHA51248cd62a3e1a5ef3dbbe1da100fe45e1705e904601029bc9f052786917726dff3fbff479c9c2cf05b9f6f38ce20eaa622a464a9a076051edb4f30e80b641f89dd
-
Filesize
72KB
MD5acc58b13986bf3cb0b8f1f689f7d7c82
SHA151411251776546e8722d8b35b407c23a1a465d06
SHA256db88d96007b3aeacdb312f05415945347fb7e11da6c5452e01c1f2819d332a5c
SHA51248cd62a3e1a5ef3dbbe1da100fe45e1705e904601029bc9f052786917726dff3fbff479c9c2cf05b9f6f38ce20eaa622a464a9a076051edb4f30e80b641f89dd
-
Filesize
72KB
MD55bbd0987116ac0108c48537052d496db
SHA1a200ce6d192dfb58b5fdd6b9928801da9dcc2d4e
SHA256c526991e379d88296cefc9e1151bbbd23877a201c6eb37a9436c2d6c66078374
SHA512f3a6c5f607e7bea3167593b35d93a3f4d107646ebeb5a96f012c06daf152ee933a2fe352f25b38fca0ebc4eb575cfdfcc1b81d2683a8b697b4add80774e9cb74
-
Filesize
72KB
MD55bbd0987116ac0108c48537052d496db
SHA1a200ce6d192dfb58b5fdd6b9928801da9dcc2d4e
SHA256c526991e379d88296cefc9e1151bbbd23877a201c6eb37a9436c2d6c66078374
SHA512f3a6c5f607e7bea3167593b35d93a3f4d107646ebeb5a96f012c06daf152ee933a2fe352f25b38fca0ebc4eb575cfdfcc1b81d2683a8b697b4add80774e9cb74
-
Filesize
72KB
MD5bdc77feb620bbdb7c3dd7dcf88a11127
SHA184ef851bbf9e84827a722fcc113ca718f29d111c
SHA2560d96c8b3c8988396c64a39c38b33365e866be66cf22e9294283a46024338cb0b
SHA512ffdf7f7b381b5960069b27affbb538c4730843d92e3a538021b0c68cbf23d1bf72144b8e4022f0a8d33f20b7b7da261880734b423e96baca2c2c58419fd50ddb
-
Filesize
72KB
MD5bdc77feb620bbdb7c3dd7dcf88a11127
SHA184ef851bbf9e84827a722fcc113ca718f29d111c
SHA2560d96c8b3c8988396c64a39c38b33365e866be66cf22e9294283a46024338cb0b
SHA512ffdf7f7b381b5960069b27affbb538c4730843d92e3a538021b0c68cbf23d1bf72144b8e4022f0a8d33f20b7b7da261880734b423e96baca2c2c58419fd50ddb
-
Filesize
72KB
MD5fc9f1550491ebc25ec33f2c67a60f715
SHA1b5854879e33d2c1fab8b0104d808733dab5f44fc
SHA256d028851ce4e4bd3e484b8255e16b28c9dec54a3f29cbef9a007305c2496e9292
SHA512ba349103b23f529b49dfe5dc60310621b9e71ee44e3ff9c2d84ec9efe66e0a383f51952cc6469e566256200c3aab06e2decc8ccd00777f3d6999a685fca32d90
-
Filesize
72KB
MD5fc9f1550491ebc25ec33f2c67a60f715
SHA1b5854879e33d2c1fab8b0104d808733dab5f44fc
SHA256d028851ce4e4bd3e484b8255e16b28c9dec54a3f29cbef9a007305c2496e9292
SHA512ba349103b23f529b49dfe5dc60310621b9e71ee44e3ff9c2d84ec9efe66e0a383f51952cc6469e566256200c3aab06e2decc8ccd00777f3d6999a685fca32d90
-
Filesize
72KB
MD5ede1329359e97e11233b72439429039e
SHA19c09aacc7832a8d76fec76c2c93e6b8a0844ce04
SHA2568a0dbd3945ef7f7922d15060becb470368b4558437c2309b79d5134971ee24c4
SHA512805c514737bb7b581dbb7b95bfac5f93425b44dcb90953aef893e799fb610010f79657bccf11c60d7590723259155013716a890b638c0f198dfab87624b6ccfe
-
Filesize
72KB
MD5ede1329359e97e11233b72439429039e
SHA19c09aacc7832a8d76fec76c2c93e6b8a0844ce04
SHA2568a0dbd3945ef7f7922d15060becb470368b4558437c2309b79d5134971ee24c4
SHA512805c514737bb7b581dbb7b95bfac5f93425b44dcb90953aef893e799fb610010f79657bccf11c60d7590723259155013716a890b638c0f198dfab87624b6ccfe
-
Filesize
72KB
MD5cc263de511a1e448baf6c15d6fe8d336
SHA162b9274256f294d293ff2e69036861597f832214
SHA256883f856d78bae58bdf8fccc6ecc7fc729b3901cc9cf81d2a15ffdda1493da9a6
SHA512e2d0f12aeba79372a97ad95b05b0c9789539a6743347a784f80442a163422a0be7a2990e38661a98215b4638ed28b3e2694108d838d7c69f4e63bd9bec17a395
-
Filesize
72KB
MD5cc263de511a1e448baf6c15d6fe8d336
SHA162b9274256f294d293ff2e69036861597f832214
SHA256883f856d78bae58bdf8fccc6ecc7fc729b3901cc9cf81d2a15ffdda1493da9a6
SHA512e2d0f12aeba79372a97ad95b05b0c9789539a6743347a784f80442a163422a0be7a2990e38661a98215b4638ed28b3e2694108d838d7c69f4e63bd9bec17a395
-
Filesize
72KB
MD5cc263de511a1e448baf6c15d6fe8d336
SHA162b9274256f294d293ff2e69036861597f832214
SHA256883f856d78bae58bdf8fccc6ecc7fc729b3901cc9cf81d2a15ffdda1493da9a6
SHA512e2d0f12aeba79372a97ad95b05b0c9789539a6743347a784f80442a163422a0be7a2990e38661a98215b4638ed28b3e2694108d838d7c69f4e63bd9bec17a395
-
Filesize
72KB
MD5cc263de511a1e448baf6c15d6fe8d336
SHA162b9274256f294d293ff2e69036861597f832214
SHA256883f856d78bae58bdf8fccc6ecc7fc729b3901cc9cf81d2a15ffdda1493da9a6
SHA512e2d0f12aeba79372a97ad95b05b0c9789539a6743347a784f80442a163422a0be7a2990e38661a98215b4638ed28b3e2694108d838d7c69f4e63bd9bec17a395
-
Filesize
72KB
MD53e5242d161f02eb8e4bc1dbec455f93b
SHA101ed45fc8b20b8ca8ccfd0985d52519b8299ae5e
SHA2561f3a962f28ba1ba0ab6ab49b7964a514eca7deb5fd8adaec67d2c1d08167a3db
SHA5128c44fc148bb08b52c465d1070dc340552b0a51d8ac2f82713bc910f38e88e03b7df92f9add773438d046bab6b599abfdd71ffa18f7d110f065e3fbf025511d28
-
Filesize
72KB
MD53e5242d161f02eb8e4bc1dbec455f93b
SHA101ed45fc8b20b8ca8ccfd0985d52519b8299ae5e
SHA2561f3a962f28ba1ba0ab6ab49b7964a514eca7deb5fd8adaec67d2c1d08167a3db
SHA5128c44fc148bb08b52c465d1070dc340552b0a51d8ac2f82713bc910f38e88e03b7df92f9add773438d046bab6b599abfdd71ffa18f7d110f065e3fbf025511d28
-
Filesize
72KB
MD52d797fd735649febe8e63fdd5d809f33
SHA1744af7189fa9f83c4a028bab1ad7d28d418d7d9e
SHA256639542bbc452f9916b29ff22990acccb8e387c286936e0f960b80443a88d2fe0
SHA51218619f6b90a8a8f9618915707157e5e9460bc51b95eef868ee4c50df9ab85ad7e0721c973ec0d71c450522f81f922bbd802d008d72026ae0e942c1162482eb7f
-
Filesize
72KB
MD52d797fd735649febe8e63fdd5d809f33
SHA1744af7189fa9f83c4a028bab1ad7d28d418d7d9e
SHA256639542bbc452f9916b29ff22990acccb8e387c286936e0f960b80443a88d2fe0
SHA51218619f6b90a8a8f9618915707157e5e9460bc51b95eef868ee4c50df9ab85ad7e0721c973ec0d71c450522f81f922bbd802d008d72026ae0e942c1162482eb7f
-
Filesize
72KB
MD5ee1b17cfa2d99e3fe8506c7d014f57c3
SHA15b9c2fb3865d0aac8c1b37a4942c57bbc21ef694
SHA2560ee74e03d266891fd29a2594d66f57c2559d92c78e8bbe3af4f3ed5d851d8ab8
SHA5122577ff0fb0dfe06c7d1c72a9d0553d54bc4fc0103b62456bb1f7f4c64b088ab602f3a5f8cf83f9198e3219dbf3c2971570e83759e6180af0d1186b56b92ccac1
-
Filesize
72KB
MD5ee1b17cfa2d99e3fe8506c7d014f57c3
SHA15b9c2fb3865d0aac8c1b37a4942c57bbc21ef694
SHA2560ee74e03d266891fd29a2594d66f57c2559d92c78e8bbe3af4f3ed5d851d8ab8
SHA5122577ff0fb0dfe06c7d1c72a9d0553d54bc4fc0103b62456bb1f7f4c64b088ab602f3a5f8cf83f9198e3219dbf3c2971570e83759e6180af0d1186b56b92ccac1
-
Filesize
72KB
MD5bb0fefe25631ab7a14156d7eb34450a6
SHA1bdac10238cb8eb095818d3d831014e7d335ea27a
SHA256fb738ac13f43f7d0bdbb3e7e3cc4081a6bdf2a41266d934958457b6e7ace937c
SHA512fc20119e8bd32c1c1d59e8eb0e8a8c1ec0f6594727ea4ecac2e2fda3af96e08421b19d5996be16d9fe969ba21ea95f285aa7ebfbfddd1170b6965ef22b0f4df8
-
Filesize
72KB
MD5bb0fefe25631ab7a14156d7eb34450a6
SHA1bdac10238cb8eb095818d3d831014e7d335ea27a
SHA256fb738ac13f43f7d0bdbb3e7e3cc4081a6bdf2a41266d934958457b6e7ace937c
SHA512fc20119e8bd32c1c1d59e8eb0e8a8c1ec0f6594727ea4ecac2e2fda3af96e08421b19d5996be16d9fe969ba21ea95f285aa7ebfbfddd1170b6965ef22b0f4df8
-
Filesize
72KB
MD5d3b55f6f43125b876dbc8b736e8b2fdb
SHA10d53c4af3b55652d5b953aa04087d8f5a9cc7efa
SHA2564a4f04e0fbdec3f07c0fdfc562f31be8ccc2e2c5a424f28b73e60866ae95e6cc
SHA512fbeec654ed5523d03a905a008e8a99094b5946abfcb8e51869dc4fedb125784253b4c963b73e64f6ebd23b7471658506566292018920937940674539e548deeb
-
Filesize
72KB
MD5d3b55f6f43125b876dbc8b736e8b2fdb
SHA10d53c4af3b55652d5b953aa04087d8f5a9cc7efa
SHA2564a4f04e0fbdec3f07c0fdfc562f31be8ccc2e2c5a424f28b73e60866ae95e6cc
SHA512fbeec654ed5523d03a905a008e8a99094b5946abfcb8e51869dc4fedb125784253b4c963b73e64f6ebd23b7471658506566292018920937940674539e548deeb
-
Filesize
72KB
MD5d43aff8f9e6ecfe6378f0c3a37379fc1
SHA1f335483aad0a79cb07e712b117890dc245858788
SHA25651aed45cc353d7fc1f4faf959086efc52fde36fcaffbaf77a21f9ee34a3e79f8
SHA512d45e5042094b7ad8e6cd399e19d0827800c4bd5ed88caf51a02a50bb3484a9a3f10a2d8e6213c70bd8bbc194b8e47f21daa618ed69a7d20d5d52f4da601dd885
-
Filesize
72KB
MD5d43aff8f9e6ecfe6378f0c3a37379fc1
SHA1f335483aad0a79cb07e712b117890dc245858788
SHA25651aed45cc353d7fc1f4faf959086efc52fde36fcaffbaf77a21f9ee34a3e79f8
SHA512d45e5042094b7ad8e6cd399e19d0827800c4bd5ed88caf51a02a50bb3484a9a3f10a2d8e6213c70bd8bbc194b8e47f21daa618ed69a7d20d5d52f4da601dd885
-
Filesize
72KB
MD5da85d643a39155a080b996ab8c9b81e4
SHA15f8b7d1c3e5aecc35500718fed042130209fd88c
SHA2564f9bd780cb435b3f187d5e1372747e49e658b2f9b7b10f9d14c42729907a1a6d
SHA5123b2faa1549e083e6db82c4ca58b61c4db0c487545259f27caa810f5f42e5e6babee1140558f0ecfb115b734e60f77419923a6daf3bbed35b3c489a83b398697d
-
Filesize
72KB
MD5da85d643a39155a080b996ab8c9b81e4
SHA15f8b7d1c3e5aecc35500718fed042130209fd88c
SHA2564f9bd780cb435b3f187d5e1372747e49e658b2f9b7b10f9d14c42729907a1a6d
SHA5123b2faa1549e083e6db82c4ca58b61c4db0c487545259f27caa810f5f42e5e6babee1140558f0ecfb115b734e60f77419923a6daf3bbed35b3c489a83b398697d
-
Filesize
72KB
MD5773bd0cf3f52565700e3f31c928eab5d
SHA16b5e77e5b43b0473aa9ebd2febefdb51ef32a1ce
SHA256f846a1b034651439a9e96cb99b4b671355a47a7fa8a582b18704c471ae011752
SHA5127fd225799206dd964d9b8930ae1e8793895a52c8090787933fcbd2d843976798052525b6af072450723f515e0298dd8097d384c79b796728902a266b29afaf49
-
Filesize
72KB
MD5773bd0cf3f52565700e3f31c928eab5d
SHA16b5e77e5b43b0473aa9ebd2febefdb51ef32a1ce
SHA256f846a1b034651439a9e96cb99b4b671355a47a7fa8a582b18704c471ae011752
SHA5127fd225799206dd964d9b8930ae1e8793895a52c8090787933fcbd2d843976798052525b6af072450723f515e0298dd8097d384c79b796728902a266b29afaf49
-
Filesize
72KB
MD5d5daeb9e1d4175082a2aaa7b77b1bb7b
SHA1adf43395da416389278d9f22fa0ea4b88fa14d44
SHA256fa2d347f2c9f400ba944c07fdb61a3972e9205ef7914fa842323b9199411dfa2
SHA512d5dbd112a4f354d5b96a469f922fc3369c044c8d5e92d195b04f161e7d602c97220fc95bdc8de9be43936b715b9e8f823e5157695e7551cc467262e9ce8ba99f
-
Filesize
72KB
MD5d5daeb9e1d4175082a2aaa7b77b1bb7b
SHA1adf43395da416389278d9f22fa0ea4b88fa14d44
SHA256fa2d347f2c9f400ba944c07fdb61a3972e9205ef7914fa842323b9199411dfa2
SHA512d5dbd112a4f354d5b96a469f922fc3369c044c8d5e92d195b04f161e7d602c97220fc95bdc8de9be43936b715b9e8f823e5157695e7551cc467262e9ce8ba99f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d5daeb9e1d4175082a2aaa7b77b1bb7b
SHA1adf43395da416389278d9f22fa0ea4b88fa14d44
SHA256fa2d347f2c9f400ba944c07fdb61a3972e9205ef7914fa842323b9199411dfa2
SHA512d5dbd112a4f354d5b96a469f922fc3369c044c8d5e92d195b04f161e7d602c97220fc95bdc8de9be43936b715b9e8f823e5157695e7551cc467262e9ce8ba99f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d5daeb9e1d4175082a2aaa7b77b1bb7b
SHA1adf43395da416389278d9f22fa0ea4b88fa14d44
SHA256fa2d347f2c9f400ba944c07fdb61a3972e9205ef7914fa842323b9199411dfa2
SHA512d5dbd112a4f354d5b96a469f922fc3369c044c8d5e92d195b04f161e7d602c97220fc95bdc8de9be43936b715b9e8f823e5157695e7551cc467262e9ce8ba99f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52ee270e5cfc21458b673fc3fe338faac
SHA17dd1fcca6044e3fe85e8de7b221e6638b61ed9fe
SHA25685f6d6aaab74ba3db0a868d0d425c53151135b27c7cb96db4e4225ab2a5fdc8c
SHA5123bcbef4adce6355b3e6be42b5561d29a466ca7c782d17d5392213a7493c33ceb2d848eba0abdbbbd58fa91184cb844902cbda58873e0c777d11fc229682caca0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52ee270e5cfc21458b673fc3fe338faac
SHA17dd1fcca6044e3fe85e8de7b221e6638b61ed9fe
SHA25685f6d6aaab74ba3db0a868d0d425c53151135b27c7cb96db4e4225ab2a5fdc8c
SHA5123bcbef4adce6355b3e6be42b5561d29a466ca7c782d17d5392213a7493c33ceb2d848eba0abdbbbd58fa91184cb844902cbda58873e0c777d11fc229682caca0
-
Filesize
72KB
MD55457cee20c8a7f5b7fe90ed157c34cd4
SHA1c2705a4c4b68980613d7c5efb5879dd146de830c
SHA256f0532f6cb9cdebf50952de11f9540f6537951a350e090ef3e1bf4a63897ba825
SHA512d3c6ae3cdbb151a5ce3bd7504ad5cc58d5dfe1a0ef1335206107a15608337655053a670a5045726694e85a8923758d336274916163596f0e834882e85f022242
-
Filesize
72KB
MD55457cee20c8a7f5b7fe90ed157c34cd4
SHA1c2705a4c4b68980613d7c5efb5879dd146de830c
SHA256f0532f6cb9cdebf50952de11f9540f6537951a350e090ef3e1bf4a63897ba825
SHA512d3c6ae3cdbb151a5ce3bd7504ad5cc58d5dfe1a0ef1335206107a15608337655053a670a5045726694e85a8923758d336274916163596f0e834882e85f022242
-
Filesize
72KB
MD5c9df245424236e907e6b7d0cf9ef9e77
SHA1b46a9aeec73cf2ba0b9582500559aed2c8cec23a
SHA2564950861ff38c8318f556767a2c33678d91d898b765e16b5ff10f9e81e2422a00
SHA5123b025f36bb774bd89c4a093808b0e657b09e2ced772c6f5bdb4b1fd223692231078da10c37a2dbeac203a96882cf309c7a30de0224e2af3f37f611e12bab0ee0
-
Filesize
72KB
MD5c9df245424236e907e6b7d0cf9ef9e77
SHA1b46a9aeec73cf2ba0b9582500559aed2c8cec23a
SHA2564950861ff38c8318f556767a2c33678d91d898b765e16b5ff10f9e81e2422a00
SHA5123b025f36bb774bd89c4a093808b0e657b09e2ced772c6f5bdb4b1fd223692231078da10c37a2dbeac203a96882cf309c7a30de0224e2af3f37f611e12bab0ee0
-
Filesize
72KB
MD54d4aa50fc1563fbefc4b25458d285f88
SHA19597b4e5384183f5a3d1048e4fe898884cd5c2f9
SHA2564a7210056f2d307351e7877c289175de091a44e0503ada6002a33d2722abd4f0
SHA51256d767d3c9acd247460e879dd1f93772d02e54bb707dde04bda7bd10ca2feb79b774b7f0fbbbde824748127e98806ab105c2ec9bd287490ad7d195cfc914fd86
-
Filesize
72KB
MD54d4aa50fc1563fbefc4b25458d285f88
SHA19597b4e5384183f5a3d1048e4fe898884cd5c2f9
SHA2564a7210056f2d307351e7877c289175de091a44e0503ada6002a33d2722abd4f0
SHA51256d767d3c9acd247460e879dd1f93772d02e54bb707dde04bda7bd10ca2feb79b774b7f0fbbbde824748127e98806ab105c2ec9bd287490ad7d195cfc914fd86
-
Filesize
72KB
MD5693a6ed5cf6481096301d8f5eaa92c6c
SHA1b686d1199079ea4a10c4b7f308eaf2809c28e1b4
SHA2561f5eaae6c603820b0f7b909cbbc44a25c2f2f56aab2455b3359a21b52f451e40
SHA512f3f5507d05af20f8a931d3a3e94c4b37f87aa41a3af74c0b612cfef1055a22e1a021316c1ac45e857deec89a2666fc5031f1cd36b82fb85ab5ee0ea78c6c6b55
-
Filesize
72KB
MD5693a6ed5cf6481096301d8f5eaa92c6c
SHA1b686d1199079ea4a10c4b7f308eaf2809c28e1b4
SHA2561f5eaae6c603820b0f7b909cbbc44a25c2f2f56aab2455b3359a21b52f451e40
SHA512f3f5507d05af20f8a931d3a3e94c4b37f87aa41a3af74c0b612cfef1055a22e1a021316c1ac45e857deec89a2666fc5031f1cd36b82fb85ab5ee0ea78c6c6b55
-
Filesize
72KB
MD56a731343d0859624c45b22bc06c75cd0
SHA1f83d1e510892cf642ec44cfef25dbc9820a199bf
SHA2565f7b52f49ae8ac17fb12ed914fedd94c06223db07b6150018d3cd0449840efc2
SHA5125a8bb0ece769099230271810527fdb391399dd113933403f7be2a46edec0c84e8604381fd2010f2f7dc5ed65d24cd6c995e879c48ca1737c9ac4ced1c448743d
-
Filesize
72KB
MD56a731343d0859624c45b22bc06c75cd0
SHA1f83d1e510892cf642ec44cfef25dbc9820a199bf
SHA2565f7b52f49ae8ac17fb12ed914fedd94c06223db07b6150018d3cd0449840efc2
SHA5125a8bb0ece769099230271810527fdb391399dd113933403f7be2a46edec0c84e8604381fd2010f2f7dc5ed65d24cd6c995e879c48ca1737c9ac4ced1c448743d