Analysis
-
max time kernel
209s -
max time network
253s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 19:20
Static task
static1
Behavioral task
behavioral1
Sample
5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe
Resource
win10v2004-20221111-en
General
-
Target
5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe
-
Size
72KB
-
MD5
096009cb30433f7dbb2a6672da0c70eb
-
SHA1
8be37669475ce4f3b4f4fabaf927413e165086e2
-
SHA256
5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a
-
SHA512
5f6131b6e80dfff56d14e9b8a125e7d0db0703ee643882397e3cc4412c343b4c01664b84009fbbd7d332d04d1de0fdc0113870d46962ddd62870f21efb4a21e8
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2p:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 4768 data.exe 3004 backup.exe 4136 backup.exe 1664 backup.exe 380 backup.exe 3016 backup.exe 4104 backup.exe 4420 backup.exe 792 backup.exe 440 backup.exe 4988 System Restore.exe 3532 backup.exe 2880 backup.exe 2280 backup.exe 3180 backup.exe 4572 backup.exe 4920 System Restore.exe 2348 backup.exe 4584 backup.exe 4280 backup.exe 4356 backup.exe 1388 backup.exe 372 backup.exe 2724 update.exe 4680 backup.exe 4892 backup.exe 240 backup.exe 4960 backup.exe 4360 backup.exe 2656 backup.exe 2664 backup.exe 1160 backup.exe 3964 backup.exe 2624 backup.exe 4472 backup.exe 3676 backup.exe 4964 backup.exe 4848 backup.exe 3576 backup.exe 2044 backup.exe 640 backup.exe 4240 backup.exe 1528 backup.exe 3592 backup.exe 2560 backup.exe 2076 backup.exe 2472 backup.exe 2372 backup.exe 2564 backup.exe 3192 backup.exe 5044 backup.exe 4076 backup.exe 4084 backup.exe 3492 backup.exe 3624 update.exe 4888 backup.exe 3324 backup.exe 4640 backup.exe 1532 backup.exe 4456 backup.exe 552 backup.exe 2240 backup.exe 2712 backup.exe 4364 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\System Restore.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe update.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\System Restore.exe update.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 4768 data.exe 4136 backup.exe 3004 backup.exe 1664 backup.exe 380 backup.exe 3016 backup.exe 4104 backup.exe 4420 backup.exe 792 backup.exe 440 backup.exe 3532 backup.exe 4988 System Restore.exe 2880 backup.exe 2280 backup.exe 3180 backup.exe 4572 backup.exe 4920 System Restore.exe 2348 backup.exe 4584 backup.exe 4280 backup.exe 4356 backup.exe 1388 backup.exe 372 backup.exe 2724 update.exe 4680 backup.exe 4892 backup.exe 240 backup.exe 4960 backup.exe 4360 backup.exe 1160 backup.exe 2656 backup.exe 2664 backup.exe 3964 backup.exe 2624 backup.exe 4472 backup.exe 4964 backup.exe 4848 backup.exe 3676 backup.exe 2044 backup.exe 3576 backup.exe 640 backup.exe 3592 backup.exe 4240 backup.exe 1528 backup.exe 2472 backup.exe 2560 backup.exe 2076 backup.exe 2372 backup.exe 2564 backup.exe 3192 backup.exe 5044 backup.exe 4076 backup.exe 4084 backup.exe 3492 backup.exe 3624 update.exe 4888 backup.exe 3324 backup.exe 4640 backup.exe 1532 backup.exe 4456 backup.exe 552 backup.exe 2240 backup.exe 2712 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4768 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 81 PID 4708 wrote to memory of 4768 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 81 PID 4708 wrote to memory of 4768 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 81 PID 4708 wrote to memory of 3004 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 82 PID 4708 wrote to memory of 3004 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 82 PID 4708 wrote to memory of 3004 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 82 PID 4768 wrote to memory of 4136 4768 data.exe 83 PID 4768 wrote to memory of 4136 4768 data.exe 83 PID 4768 wrote to memory of 4136 4768 data.exe 83 PID 4708 wrote to memory of 1664 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 86 PID 4708 wrote to memory of 1664 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 86 PID 4708 wrote to memory of 1664 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 86 PID 4136 wrote to memory of 380 4136 backup.exe 85 PID 4136 wrote to memory of 380 4136 backup.exe 85 PID 4136 wrote to memory of 380 4136 backup.exe 85 PID 4708 wrote to memory of 3016 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 87 PID 4708 wrote to memory of 3016 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 87 PID 4708 wrote to memory of 3016 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 87 PID 4136 wrote to memory of 4420 4136 backup.exe 89 PID 4136 wrote to memory of 4420 4136 backup.exe 89 PID 4136 wrote to memory of 4420 4136 backup.exe 89 PID 4708 wrote to memory of 4104 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 88 PID 4708 wrote to memory of 4104 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 88 PID 4708 wrote to memory of 4104 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 88 PID 4136 wrote to memory of 792 4136 backup.exe 90 PID 4136 wrote to memory of 792 4136 backup.exe 90 PID 4136 wrote to memory of 792 4136 backup.exe 90 PID 4708 wrote to memory of 440 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 91 PID 4708 wrote to memory of 440 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 91 PID 4708 wrote to memory of 440 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 91 PID 4708 wrote to memory of 4988 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 93 PID 4708 wrote to memory of 4988 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 93 PID 4708 wrote to memory of 4988 4708 5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe 93 PID 792 wrote to memory of 3532 792 backup.exe 92 PID 792 wrote to memory of 3532 792 backup.exe 92 PID 792 wrote to memory of 3532 792 backup.exe 92 PID 3532 wrote to memory of 2880 3532 backup.exe 94 PID 3532 wrote to memory of 2880 3532 backup.exe 94 PID 3532 wrote to memory of 2880 3532 backup.exe 94 PID 792 wrote to memory of 2280 792 backup.exe 95 PID 792 wrote to memory of 2280 792 backup.exe 95 PID 792 wrote to memory of 2280 792 backup.exe 95 PID 2280 wrote to memory of 3180 2280 backup.exe 96 PID 2280 wrote to memory of 3180 2280 backup.exe 96 PID 2280 wrote to memory of 3180 2280 backup.exe 96 PID 2280 wrote to memory of 4572 2280 backup.exe 97 PID 2280 wrote to memory of 4572 2280 backup.exe 97 PID 2280 wrote to memory of 4572 2280 backup.exe 97 PID 4572 wrote to memory of 4920 4572 backup.exe 98 PID 4572 wrote to memory of 4920 4572 backup.exe 98 PID 4572 wrote to memory of 4920 4572 backup.exe 98 PID 4572 wrote to memory of 2348 4572 backup.exe 99 PID 4572 wrote to memory of 2348 4572 backup.exe 99 PID 4572 wrote to memory of 2348 4572 backup.exe 99 PID 2348 wrote to memory of 4584 2348 backup.exe 100 PID 2348 wrote to memory of 4584 2348 backup.exe 100 PID 2348 wrote to memory of 4584 2348 backup.exe 100 PID 2348 wrote to memory of 4280 2348 backup.exe 101 PID 2348 wrote to memory of 4280 2348 backup.exe 101 PID 2348 wrote to memory of 4280 2348 backup.exe 101 PID 2348 wrote to memory of 4356 2348 backup.exe 102 PID 2348 wrote to memory of 4356 2348 backup.exe 102 PID 2348 wrote to memory of 4356 2348 backup.exe 102 PID 2348 wrote to memory of 1388 2348 backup.exe 103 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe"C:\Users\Admin\AppData\Local\Temp\5b97df9d68c639e9dde5ff2873cde3a60341752bfaf472054aa367f54bac1d0a.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\1355086882\data.exeC:\Users\Admin\AppData\Local\Temp\1355086882\data.exe C:\Users\Admin\AppData\Local\Temp\1355086882\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4136 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:380
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4420
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:792 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3532 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2880
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2280 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3180
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4920
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2348 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4584
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4280
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4356
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:372
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\update.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4680
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4892
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4960
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2624
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2076
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\update.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\update.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3624
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
PID:4980
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\update.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\update.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:4840 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:376
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵PID:532
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:4764
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:3964
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4952
-
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:240 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3964
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4964
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4084
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:4364
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2656 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4848
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2560
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\backup.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5044
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe"C:\Program Files\Common Files\microsoft shared\Stationery\backup.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3356
-
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:360 -
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1488
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
PID:828
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4360
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4472 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3576 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2472
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4888
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2240
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Disables RegEdit via registry modification
PID:4100
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4520
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4756
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1912
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3676 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4240 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3192 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3492
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1532
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4936
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3316
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:4956
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3076
-
-
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2664 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:640 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2564
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4076 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3324 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:552
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Drops file in Program Files directory
- System policy modification
PID:4724 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1044
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Disables RegEdit via registry modification
PID:4692
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1404
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:800
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵PID:5056
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:2660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5bb409f7753bac42c55ef8a1d50046a42
SHA1d3a0ce40a12408510bfc1b7cab69386e1be49828
SHA256f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501
SHA512d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c
-
Filesize
72KB
MD5bb409f7753bac42c55ef8a1d50046a42
SHA1d3a0ce40a12408510bfc1b7cab69386e1be49828
SHA256f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501
SHA512d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c
-
Filesize
72KB
MD5f7a31a6793cfd301229842b51e516795
SHA12a8c891612006dc845202cf7924e83e0927ba37e
SHA2560398ca71459c8071a9f54a745cbae864cc6805b0a28890a20f9dda7ac4596f64
SHA51293084c0eb0ea1b5fe4b98f7b8a47b35f82be40f5bcfabe07e65fd88dbe9bddcd755004d56091fd315cde7c31f0cfe8bc3a5f910d849a816edba090b1add45259
-
Filesize
72KB
MD5f7a31a6793cfd301229842b51e516795
SHA12a8c891612006dc845202cf7924e83e0927ba37e
SHA2560398ca71459c8071a9f54a745cbae864cc6805b0a28890a20f9dda7ac4596f64
SHA51293084c0eb0ea1b5fe4b98f7b8a47b35f82be40f5bcfabe07e65fd88dbe9bddcd755004d56091fd315cde7c31f0cfe8bc3a5f910d849a816edba090b1add45259
-
Filesize
72KB
MD59f3f0a8330ee6e58d6a0d208c4e61d14
SHA126511392ad81298085e4e11efafcacd3987dbdae
SHA25624adda736374003a94980ff22cc680310f1a9b448c576fca869fe6c0f46d7245
SHA512d335c1e889658f67a09e1066264b07886c17ecdca73c8ecc89bddf03aa94675cbc28832816951994db0a143426cb3fbb762796afb2824027a392f057fbd163d7
-
Filesize
72KB
MD59f3f0a8330ee6e58d6a0d208c4e61d14
SHA126511392ad81298085e4e11efafcacd3987dbdae
SHA25624adda736374003a94980ff22cc680310f1a9b448c576fca869fe6c0f46d7245
SHA512d335c1e889658f67a09e1066264b07886c17ecdca73c8ecc89bddf03aa94675cbc28832816951994db0a143426cb3fbb762796afb2824027a392f057fbd163d7
-
Filesize
72KB
MD5f32ce34baaa22f0d544a5d960b27598e
SHA1b792f025e1606256dc80b22580a727c578969c61
SHA25636983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8
SHA51275d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf
-
Filesize
72KB
MD5f32ce34baaa22f0d544a5d960b27598e
SHA1b792f025e1606256dc80b22580a727c578969c61
SHA25636983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8
SHA51275d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf
-
Filesize
72KB
MD52c19fb68f60f68de7eb81300fb04507d
SHA19ce1dacf8b7403e6f7701fa72e40f10930c5be68
SHA25642d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5
SHA51270d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92
-
Filesize
72KB
MD52c19fb68f60f68de7eb81300fb04507d
SHA19ce1dacf8b7403e6f7701fa72e40f10930c5be68
SHA25642d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5
SHA51270d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92
-
Filesize
72KB
MD5a0037f9382c1c5e49649a53b478cd5cc
SHA1602c30a50489f653030bf9358889f81d8b172c09
SHA256041496d45403eeba7088060b872fb633fdae092aafeff8a748919c7812581f13
SHA5122b61d2e00d467d7b4aa7f066ffd655b56eebd8b7c5de4940cbab2eab80feaed3c50dee3a7d666c1b333498ef3749a63b763dc5f3e90c7efa50ab54a1ffd95ee1
-
Filesize
72KB
MD5a0037f9382c1c5e49649a53b478cd5cc
SHA1602c30a50489f653030bf9358889f81d8b172c09
SHA256041496d45403eeba7088060b872fb633fdae092aafeff8a748919c7812581f13
SHA5122b61d2e00d467d7b4aa7f066ffd655b56eebd8b7c5de4940cbab2eab80feaed3c50dee3a7d666c1b333498ef3749a63b763dc5f3e90c7efa50ab54a1ffd95ee1
-
Filesize
72KB
MD5f32ce34baaa22f0d544a5d960b27598e
SHA1b792f025e1606256dc80b22580a727c578969c61
SHA25636983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8
SHA51275d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf
-
Filesize
72KB
MD5f32ce34baaa22f0d544a5d960b27598e
SHA1b792f025e1606256dc80b22580a727c578969c61
SHA25636983e835e654095b009d67869e1798d52c71c1452e6f176c6139de02f87b9d8
SHA51275d821fa9928689e8587730959d577b161538ea0fa8b87f7aba0a07c4983061013b3ae2ff6773f513fc648d3f6509e40d48ad97938af71d25cfd7dd421c6bccf
-
Filesize
72KB
MD531d23da84839990c0c719803c3475f03
SHA1f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d
SHA25689b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e
SHA512e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89
-
Filesize
72KB
MD531d23da84839990c0c719803c3475f03
SHA1f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d
SHA25689b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e
SHA512e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89
-
Filesize
72KB
MD5f3e288c47cb7762f170a7a6ca8175fc9
SHA13e04f6ec935cf30f9fbbc624052527a2feade8ad
SHA25692d69c55013c5f648e7f57aafde833f82632e66df46d8579f6e179848cebda5f
SHA51271b8342349344530dcc3303d2b466bc74dd30aaee77f9c6fd8182b3150c43fd77faf8c79c460695d7a2b8f9a05118a29243893463e73f9afdb5180e1e95554b4
-
Filesize
72KB
MD5f3e288c47cb7762f170a7a6ca8175fc9
SHA13e04f6ec935cf30f9fbbc624052527a2feade8ad
SHA25692d69c55013c5f648e7f57aafde833f82632e66df46d8579f6e179848cebda5f
SHA51271b8342349344530dcc3303d2b466bc74dd30aaee77f9c6fd8182b3150c43fd77faf8c79c460695d7a2b8f9a05118a29243893463e73f9afdb5180e1e95554b4
-
Filesize
72KB
MD544423bb43353b84ce10c4133852d0be8
SHA1338ea74c28a12c34f1e0552089a6642aacb8aef0
SHA256c6e73136856a72f5a4e0a815f33e501eca6e43230e7e8b76b3ff23bd462d8f42
SHA512c651ce7706320e461eb01f5d89665292d63777c496dccb67915fbcd9eb1cd812816306e360613e9f8783154d5e576ed7189e27c5134db235818e4d29d430b774
-
Filesize
72KB
MD544423bb43353b84ce10c4133852d0be8
SHA1338ea74c28a12c34f1e0552089a6642aacb8aef0
SHA256c6e73136856a72f5a4e0a815f33e501eca6e43230e7e8b76b3ff23bd462d8f42
SHA512c651ce7706320e461eb01f5d89665292d63777c496dccb67915fbcd9eb1cd812816306e360613e9f8783154d5e576ed7189e27c5134db235818e4d29d430b774
-
Filesize
72KB
MD52c19fb68f60f68de7eb81300fb04507d
SHA19ce1dacf8b7403e6f7701fa72e40f10930c5be68
SHA25642d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5
SHA51270d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92
-
Filesize
72KB
MD52c19fb68f60f68de7eb81300fb04507d
SHA19ce1dacf8b7403e6f7701fa72e40f10930c5be68
SHA25642d712dfa2e972f50546cdc11d1c04242f946530dd9e019ddec1033a803537d5
SHA51270d482c55997380d90c7700aec6793d269af3f43377887a42f75b9e0507e19a5cb0a19cce0841fb996fd3ee4516fd0cae2bc9d184d2b8b15913fd7daf09f5c92
-
Filesize
72KB
MD59eab4596ae886094eb0c564637927480
SHA1afb418a9a7d6f8faa90a85d69072e9faee504f20
SHA256c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293
SHA51206baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d
-
Filesize
72KB
MD59eab4596ae886094eb0c564637927480
SHA1afb418a9a7d6f8faa90a85d69072e9faee504f20
SHA256c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293
SHA51206baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d
-
Filesize
72KB
MD531d23da84839990c0c719803c3475f03
SHA1f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d
SHA25689b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e
SHA512e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89
-
Filesize
72KB
MD531d23da84839990c0c719803c3475f03
SHA1f8ce0c59e92e80eda14b1a83ffdcf55f9c9c717d
SHA25689b96e07d7b012603e74fbd13e04877a97bfe5c1fbb6984043f98b3e9411655e
SHA512e321fb4db5e0609bfb02f37c0ac14e68679e9dce363c8d5a62b52b4cf05507ffc27e9f6eff26c655d5ff417cfa98e43f74c09d926d60bde3b9186dcbb2cf0b89
-
Filesize
72KB
MD59eab4596ae886094eb0c564637927480
SHA1afb418a9a7d6f8faa90a85d69072e9faee504f20
SHA256c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293
SHA51206baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d
-
Filesize
72KB
MD59eab4596ae886094eb0c564637927480
SHA1afb418a9a7d6f8faa90a85d69072e9faee504f20
SHA256c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293
SHA51206baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d
-
Filesize
72KB
MD59eab4596ae886094eb0c564637927480
SHA1afb418a9a7d6f8faa90a85d69072e9faee504f20
SHA256c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293
SHA51206baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d
-
Filesize
72KB
MD59eab4596ae886094eb0c564637927480
SHA1afb418a9a7d6f8faa90a85d69072e9faee504f20
SHA256c6e181b3785d04bab069c565f98cf16c11199d1fb0f369f44f566f11f3617293
SHA51206baf3b72fad9f9d8e2187f04ddd92d4bd507c54a8656fa800ba3684b22fac0b7c3ef116865caaeed4721a6d807111c1a376d47fb0dee530a61ea5dca1d6e84d
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD5b4e27c202fd9eec80d49a67e046065f0
SHA112cfab560e9f6b97442e8e940b5ea406125d241b
SHA25605e365dc540cec15849c8a6434211df4915d1bbe9c2b00542bf055250e663b75
SHA512862ea5822eb3edd4e6141a8683984323d2da9d6d0d058180b6d4603e58c7973f1acb90b32994fcdfdbd57848c9e138780afdb0856abb2fcbbedb5ffa0a26454b
-
Filesize
72KB
MD506fa3cf2e3240dbbdd28e3fe49a49962
SHA1e870690b4ffb50a13cc8f57e0bfa87726e5ee6e8
SHA256eb88d4ea86f95861381e0e3410daca2c97fa6922be763f46ddc75701b20cc376
SHA51202e41f82f878735bc12c36d95f4ffddb0d630230da5cb704285cba131679ddcb6e56499b48a46b4b544a4d89fbd0abccd99a433bcb677cef34f2eaa063103f78
-
Filesize
72KB
MD506fa3cf2e3240dbbdd28e3fe49a49962
SHA1e870690b4ffb50a13cc8f57e0bfa87726e5ee6e8
SHA256eb88d4ea86f95861381e0e3410daca2c97fa6922be763f46ddc75701b20cc376
SHA51202e41f82f878735bc12c36d95f4ffddb0d630230da5cb704285cba131679ddcb6e56499b48a46b4b544a4d89fbd0abccd99a433bcb677cef34f2eaa063103f78
-
Filesize
72KB
MD570bdcf625a9406af56f8b059c62ef7aa
SHA1c4fcd41edf2f88bbe7e4bd06169285904f97dfc9
SHA25623ba39e3e2c69352f3635327fe9cf4e0e36288e056dcd5dc317e908322ab8981
SHA512a0847a35c24a5677df4135eb47c31b421e3c6249a94cd31446a7b31bedba7a50497af60a4a6ff25280f8c1b4b79fe76ebc9f7c71aa4bdff0ad5eef93d1d28fbf
-
Filesize
72KB
MD570bdcf625a9406af56f8b059c62ef7aa
SHA1c4fcd41edf2f88bbe7e4bd06169285904f97dfc9
SHA25623ba39e3e2c69352f3635327fe9cf4e0e36288e056dcd5dc317e908322ab8981
SHA512a0847a35c24a5677df4135eb47c31b421e3c6249a94cd31446a7b31bedba7a50497af60a4a6ff25280f8c1b4b79fe76ebc9f7c71aa4bdff0ad5eef93d1d28fbf
-
Filesize
72KB
MD5bb409f7753bac42c55ef8a1d50046a42
SHA1d3a0ce40a12408510bfc1b7cab69386e1be49828
SHA256f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501
SHA512d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c
-
Filesize
72KB
MD5bb409f7753bac42c55ef8a1d50046a42
SHA1d3a0ce40a12408510bfc1b7cab69386e1be49828
SHA256f6d20fb2ccf6651483e24e72c155e2873211dfe55bbb2e4909d444fd224c9501
SHA512d16743287bdaa76d9314e760cac260df8f88e2eebc9472ded064c1fbe21028cd9017f7b70cd92dc50a84b1297821c2499f4b2e87b208b76f8c23e6b80c50f20c
-
Filesize
72KB
MD5f78452217bd112442ed2a1973d553be4
SHA1c8a2d872d6f99451e5d55165bd1f41ce9c284010
SHA2561dd803d09d25a6a12928e498c787084b13c0bc4dd0be0cbe2a67b7abc41178c7
SHA5128637b373828e7345cf1746bc390fa093f0eec363df3dc0f881157028a8ff67fa7b49ef1e7f0298b84bda25b00604cc1e8f03d6d76eeb52640515f79b041537bc
-
Filesize
72KB
MD5f78452217bd112442ed2a1973d553be4
SHA1c8a2d872d6f99451e5d55165bd1f41ce9c284010
SHA2561dd803d09d25a6a12928e498c787084b13c0bc4dd0be0cbe2a67b7abc41178c7
SHA5128637b373828e7345cf1746bc390fa093f0eec363df3dc0f881157028a8ff67fa7b49ef1e7f0298b84bda25b00604cc1e8f03d6d76eeb52640515f79b041537bc
-
Filesize
72KB
MD560f4ba0aaf1903ccaa229ac88427d9eb
SHA1363db1e9efa9df3ba49e7c0a6369091b01974496
SHA256cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0
SHA5121c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e
-
Filesize
72KB
MD560f4ba0aaf1903ccaa229ac88427d9eb
SHA1363db1e9efa9df3ba49e7c0a6369091b01974496
SHA256cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0
SHA5121c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD560f4ba0aaf1903ccaa229ac88427d9eb
SHA1363db1e9efa9df3ba49e7c0a6369091b01974496
SHA256cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0
SHA5121c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD560f4ba0aaf1903ccaa229ac88427d9eb
SHA1363db1e9efa9df3ba49e7c0a6369091b01974496
SHA256cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0
SHA5121c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD560f4ba0aaf1903ccaa229ac88427d9eb
SHA1363db1e9efa9df3ba49e7c0a6369091b01974496
SHA256cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0
SHA5121c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD560f4ba0aaf1903ccaa229ac88427d9eb
SHA1363db1e9efa9df3ba49e7c0a6369091b01974496
SHA256cdf9ea60bf4ab77ef980df5c4ff10d6a7622df6d9f5b4baf8e24518b480995b0
SHA5121c59ce97b1f52ab6382694aa0f352436ed8435d5141c55849993766ea6bd03f8c36a1dddc4c01fb349cb72a3f695c9bf1ef4db89af740ed1b3f4b15633f6137e
-
Filesize
72KB
MD572e31d083ab7a60d4443d376778b1732
SHA150fea985088cbdc1a2e5a85bc5ce8dc58126941e
SHA2563869f6101d4964ae8e13890cf24846f120ac311a3810f57f7fb65c598742ce53
SHA512d8d2bbc912f98a8b9e3aebfbbab1a35f1c34979a8e88c5cf204e9ea3573fe8a8c91e2a2c72f88222c8103e4b4bc65eb275291778681172a9046855f75e503368
-
Filesize
72KB
MD572e31d083ab7a60d4443d376778b1732
SHA150fea985088cbdc1a2e5a85bc5ce8dc58126941e
SHA2563869f6101d4964ae8e13890cf24846f120ac311a3810f57f7fb65c598742ce53
SHA512d8d2bbc912f98a8b9e3aebfbbab1a35f1c34979a8e88c5cf204e9ea3573fe8a8c91e2a2c72f88222c8103e4b4bc65eb275291778681172a9046855f75e503368
-
Filesize
72KB
MD513e0e4a5b891daaa5250cc8325ae09fb
SHA1a127d46bcec183bf1bf416026b6f2319d0cbe6db
SHA2565930bc2b8ef9befddf50ef8ca1a46b7a66332660f91811df96943fa171f8150b
SHA512f5db5c8656ca5176acbe91393773d6c4aac9766748a2748088cf76f0afcdf360075ba7039fb51702e022933d0983f04127022091c1f01f544835891d52b2b37b
-
Filesize
72KB
MD513e0e4a5b891daaa5250cc8325ae09fb
SHA1a127d46bcec183bf1bf416026b6f2319d0cbe6db
SHA2565930bc2b8ef9befddf50ef8ca1a46b7a66332660f91811df96943fa171f8150b
SHA512f5db5c8656ca5176acbe91393773d6c4aac9766748a2748088cf76f0afcdf360075ba7039fb51702e022933d0983f04127022091c1f01f544835891d52b2b37b
-
Filesize
72KB
MD5dd0ca1f37823fe9ff4c14dd6e8cf6106
SHA1a836a55497583cc1834529f61be699cb24972b60
SHA256b5c53327506d7fe97f4d97595646f7ec3cb7d3b955a04f664e514b0291f988ad
SHA51209cf4f2ec99f6838db3f682c1b2d2256ad12c1b1d3e019d566e2820a228ce9aeebcfd6872ec52af3e28f7d98aacfb5571a9379afbce19490d7cbf45146a5864f
-
Filesize
72KB
MD5dd0ca1f37823fe9ff4c14dd6e8cf6106
SHA1a836a55497583cc1834529f61be699cb24972b60
SHA256b5c53327506d7fe97f4d97595646f7ec3cb7d3b955a04f664e514b0291f988ad
SHA51209cf4f2ec99f6838db3f682c1b2d2256ad12c1b1d3e019d566e2820a228ce9aeebcfd6872ec52af3e28f7d98aacfb5571a9379afbce19490d7cbf45146a5864f
-
Filesize
72KB
MD59ff7c9655bfef56dd860633013e4b992
SHA1c33fe5f113c2512ec72d411334b07779643a7d07
SHA25669ca74954d52e7be9ef555966e755763abdf326bfeeecd1968d0300dcf500993
SHA51297311e6583f35f79a2abec5365e5e76025b472d0d47feb173e3f287146bf7fe37fe78728117b56f096ee7f34ca618374ab8ddcf5d17116866c4e5ab1ddda2902
-
Filesize
72KB
MD59ff7c9655bfef56dd860633013e4b992
SHA1c33fe5f113c2512ec72d411334b07779643a7d07
SHA25669ca74954d52e7be9ef555966e755763abdf326bfeeecd1968d0300dcf500993
SHA51297311e6583f35f79a2abec5365e5e76025b472d0d47feb173e3f287146bf7fe37fe78728117b56f096ee7f34ca618374ab8ddcf5d17116866c4e5ab1ddda2902
-
Filesize
72KB
MD532ba406ad38b8381b4d43aa7c5656282
SHA1bfa87689bf4200e8c260785f183f6d4903cd8ab7
SHA256a3cef1bcde78785cc6c52ac815c8089b0c8a9047db22bfb9f616c8c5815a0aae
SHA512276778d7a35dbe1d69e212123ecf0a15ed558c2cd31f20600e847c92c506d7c997bce2bd49b1319be7872535bd0be68a6e89d15e2d0665801533699a0e8590a0
-
Filesize
72KB
MD532ba406ad38b8381b4d43aa7c5656282
SHA1bfa87689bf4200e8c260785f183f6d4903cd8ab7
SHA256a3cef1bcde78785cc6c52ac815c8089b0c8a9047db22bfb9f616c8c5815a0aae
SHA512276778d7a35dbe1d69e212123ecf0a15ed558c2cd31f20600e847c92c506d7c997bce2bd49b1319be7872535bd0be68a6e89d15e2d0665801533699a0e8590a0