Analysis
-
max time kernel
100s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 12:33
Static task
static1
Behavioral task
behavioral1
Sample
7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe
Resource
win10v2004-20220901-en
General
-
Target
7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe
-
Size
72KB
-
MD5
0817b4857a4cabcb092ef09ea7bc8f6b
-
SHA1
70570b5598c6227f8659eac920daad82fdb2bc93
-
SHA256
7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0
-
SHA512
a21d3ca61f5826d9b0187320b91cec9e44ea579e9cd2c7bf399151693b6f13ddcb5dbd751776ced4b8648a916dc5d6d8f4f2811fcd96432165bf4ac730698d4b
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2t:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 60 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 59 IoCs
pid Process 904 backup.exe 948 backup.exe 1756 backup.exe 1436 backup.exe 1320 backup.exe 376 backup.exe 740 backup.exe 1640 data.exe 604 backup.exe 1544 backup.exe 1960 backup.exe 2024 backup.exe 1064 backup.exe 1456 backup.exe 1252 backup.exe 760 backup.exe 1376 backup.exe 1832 backup.exe 1764 backup.exe 1236 backup.exe 692 backup.exe 1264 backup.exe 576 backup.exe 540 backup.exe 548 backup.exe 1064 update.exe 1952 backup.exe 1032 backup.exe 1000 backup.exe 992 backup.exe 1656 backup.exe 1540 backup.exe 1504 backup.exe 1492 backup.exe 848 backup.exe 944 backup.exe 1320 backup.exe 1580 backup.exe 660 backup.exe 1396 backup.exe 1764 backup.exe 1100 backup.exe 1408 backup.exe 1828 backup.exe 1304 update.exe 364 backup.exe 1816 backup.exe 1568 update.exe 548 backup.exe 576 backup.exe 1052 backup.exe 1740 backup.exe 1880 backup.exe 1596 backup.exe 992 backup.exe 1656 backup.exe 1204 backup.exe 1328 data.exe 1712 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 1640 data.exe 1640 data.exe 604 backup.exe 604 backup.exe 1640 data.exe 1640 data.exe 1960 backup.exe 1960 backup.exe 2024 backup.exe 2024 backup.exe 1960 backup.exe 1960 backup.exe 1456 backup.exe 1456 backup.exe 1252 backup.exe 1252 backup.exe 1252 backup.exe 1252 backup.exe 1152 backup.exe 1152 backup.exe 1152 backup.exe 1152 backup.exe 1152 backup.exe 1152 backup.exe 1456 backup.exe 1640 data.exe 1640 data.exe 1960 backup.exe 1960 backup.exe 1456 backup.exe 1252 backup.exe 1252 backup.exe 1152 backup.exe 1152 backup.exe 540 backup.exe 1064 update.exe 1064 update.exe 1064 update.exe 1264 backup.exe 1264 backup.exe 692 backup.exe 692 backup.exe 1456 backup.exe 1456 backup.exe 540 backup.exe 540 backup.exe 1152 backup.exe 1152 backup.exe 1152 backup.exe 1152 backup.exe -
Drops file in Program Files directory 49 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\data.exe backup.exe File opened for modification C:\Program Files\backup.exe data.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\update.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 904 backup.exe 948 backup.exe 1756 backup.exe 1436 backup.exe 1320 backup.exe 376 backup.exe 740 backup.exe 1640 data.exe 604 backup.exe 1544 backup.exe 1960 backup.exe 2024 backup.exe 1064 backup.exe 1456 backup.exe 1252 backup.exe 760 backup.exe 1740 backup.exe 1624 backup.exe 1984 data.exe 1492 backup.exe 944 backup.exe 1328 backup.exe 1292 backup.exe 1332 backup.exe 1924 backup.exe 464 backup.exe 1324 update.exe 1152 backup.exe 1832 backup.exe 1764 backup.exe 1236 backup.exe 692 backup.exe 576 backup.exe 1532 backup.exe 1264 backup.exe 540 backup.exe 548 backup.exe 1064 update.exe 1880 backup.exe 1032 backup.exe 1000 backup.exe 1952 backup.exe 992 backup.exe 1656 backup.exe 1620 backup.exe 1540 backup.exe 1492 backup.exe 848 backup.exe 944 backup.exe 1504 backup.exe 1156 backup.exe 1320 backup.exe 1580 backup.exe 660 backup.exe 1396 backup.exe 1100 backup.exe 1408 backup.exe 1764 backup.exe 772 backup.exe 1828 backup.exe 364 backup.exe 1816 backup.exe 1568 update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 904 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 28 PID 1988 wrote to memory of 904 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 28 PID 1988 wrote to memory of 904 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 28 PID 1988 wrote to memory of 904 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 28 PID 1988 wrote to memory of 948 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 29 PID 1988 wrote to memory of 948 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 29 PID 1988 wrote to memory of 948 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 29 PID 1988 wrote to memory of 948 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 29 PID 1988 wrote to memory of 1756 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 30 PID 1988 wrote to memory of 1756 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 30 PID 1988 wrote to memory of 1756 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 30 PID 1988 wrote to memory of 1756 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 30 PID 1988 wrote to memory of 1436 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 31 PID 1988 wrote to memory of 1436 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 31 PID 1988 wrote to memory of 1436 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 31 PID 1988 wrote to memory of 1436 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 31 PID 1988 wrote to memory of 1320 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 32 PID 1988 wrote to memory of 1320 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 32 PID 1988 wrote to memory of 1320 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 32 PID 1988 wrote to memory of 1320 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 32 PID 1988 wrote to memory of 376 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 33 PID 1988 wrote to memory of 376 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 33 PID 1988 wrote to memory of 376 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 33 PID 1988 wrote to memory of 376 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 33 PID 1988 wrote to memory of 740 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 34 PID 1988 wrote to memory of 740 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 34 PID 1988 wrote to memory of 740 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 34 PID 1988 wrote to memory of 740 1988 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe 34 PID 904 wrote to memory of 1640 904 backup.exe 35 PID 904 wrote to memory of 1640 904 backup.exe 35 PID 904 wrote to memory of 1640 904 backup.exe 35 PID 904 wrote to memory of 1640 904 backup.exe 35 PID 1640 wrote to memory of 604 1640 data.exe 36 PID 1640 wrote to memory of 604 1640 data.exe 36 PID 1640 wrote to memory of 604 1640 data.exe 36 PID 1640 wrote to memory of 604 1640 data.exe 36 PID 604 wrote to memory of 1544 604 backup.exe 37 PID 604 wrote to memory of 1544 604 backup.exe 37 PID 604 wrote to memory of 1544 604 backup.exe 37 PID 604 wrote to memory of 1544 604 backup.exe 37 PID 1640 wrote to memory of 1960 1640 data.exe 38 PID 1640 wrote to memory of 1960 1640 data.exe 38 PID 1640 wrote to memory of 1960 1640 data.exe 38 PID 1640 wrote to memory of 1960 1640 data.exe 38 PID 1960 wrote to memory of 2024 1960 backup.exe 39 PID 1960 wrote to memory of 2024 1960 backup.exe 39 PID 1960 wrote to memory of 2024 1960 backup.exe 39 PID 1960 wrote to memory of 2024 1960 backup.exe 39 PID 2024 wrote to memory of 1064 2024 backup.exe 40 PID 2024 wrote to memory of 1064 2024 backup.exe 40 PID 2024 wrote to memory of 1064 2024 backup.exe 40 PID 2024 wrote to memory of 1064 2024 backup.exe 40 PID 1960 wrote to memory of 1456 1960 backup.exe 41 PID 1960 wrote to memory of 1456 1960 backup.exe 41 PID 1960 wrote to memory of 1456 1960 backup.exe 41 PID 1960 wrote to memory of 1456 1960 backup.exe 41 PID 1456 wrote to memory of 1252 1456 backup.exe 42 PID 1456 wrote to memory of 1252 1456 backup.exe 42 PID 1456 wrote to memory of 1252 1456 backup.exe 42 PID 1456 wrote to memory of 1252 1456 backup.exe 42 PID 1252 wrote to memory of 760 1252 backup.exe 43 PID 1252 wrote to memory of 760 1252 backup.exe 43 PID 1252 wrote to memory of 760 1252 backup.exe 43 PID 1252 wrote to memory of 760 1252 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe"C:\Users\Admin\AppData\Local\Temp\7812d81fef73a156c0044bc858436ea0aaa7e3bad7680304ef952ac84aa9dfc0.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\2492480939\backup.exeC:\Users\Admin\AppData\Local\Temp\2492480939\backup.exe C:\Users\Admin\AppData\Local\Temp\2492480939\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\data.exe\data.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1640 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:604 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1960 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2024 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1064
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1456 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1252 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1376 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:464
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1236
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1656
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1320
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Executes dropped EXE
PID:548
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:772
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:1012
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:1276
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Disables RegEdit via registry modification
PID:1320
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:1236
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵PID:432
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵PID:772
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵PID:1488
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:540 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\update.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1064
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\update.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Executes dropped EXE
PID:1596
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:572
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1636
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1520
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1492
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1264 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1952
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:848
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:660
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1408
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Executes dropped EXE
PID:1052
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Executes dropped EXE
PID:1204
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1156
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:364
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
PID:992
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:360
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:660
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1532
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1268
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:480
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:692 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1396
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1828 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Executes dropped EXE
PID:576
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
PID:1328
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:564
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1688
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1444
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
PID:1712
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1644
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
PID:1656
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1964
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:108
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:760
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1288
-
-
-
C:\Users\update.exeC:\Users\update.exe C:\Users\4⤵
- Executes dropped EXE
PID:1304
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
PID:1880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD5b2bcd13a7da6caaaf0f22f0c16103a80
SHA1bfc78630c2a181393883d8f24c365a66a90d3406
SHA2565d04439a7044573d57df5a03242d65b5df69abb9225bc7bffe12bb0b10998420
SHA512ba07e8a47c2b3ad99a0085563f268da95efe2b66be48261e1001831a2c4f0508660d573fa8a487c8c6de52690508707c6f97c8b0fb16e11be2e3a27bcd286f4d
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD571beb0554ed1f66d520f0572e25ed1b0
SHA1549725279103d310e45b3cf24a8256b4f58f07c7
SHA256b8d5310fd2c5c23b11634a35dea7e55a724e087d1050d17e481d6af4350d514c
SHA512ad0e37e8dcf6d9a99256fbe8bd940ac5cddba5acd9bba11983d88c44cf3d8a626ec1e748217922f676f39a5a963c3742042505b4458493bf82522c3abb6c42cd
-
Filesize
72KB
MD5b2bcd13a7da6caaaf0f22f0c16103a80
SHA1bfc78630c2a181393883d8f24c365a66a90d3406
SHA2565d04439a7044573d57df5a03242d65b5df69abb9225bc7bffe12bb0b10998420
SHA512ba07e8a47c2b3ad99a0085563f268da95efe2b66be48261e1001831a2c4f0508660d573fa8a487c8c6de52690508707c6f97c8b0fb16e11be2e3a27bcd286f4d
-
Filesize
72KB
MD5b2bcd13a7da6caaaf0f22f0c16103a80
SHA1bfc78630c2a181393883d8f24c365a66a90d3406
SHA2565d04439a7044573d57df5a03242d65b5df69abb9225bc7bffe12bb0b10998420
SHA512ba07e8a47c2b3ad99a0085563f268da95efe2b66be48261e1001831a2c4f0508660d573fa8a487c8c6de52690508707c6f97c8b0fb16e11be2e3a27bcd286f4d
-
Filesize
72KB
MD563b76b54cee4c1e82d7d415485692a94
SHA17a8301d7732cf55f43b52a0eda90c9d9a8634629
SHA2563c044aa3ebe8d5f8e5bcc61837e889ed50b00b6e8725b8c6280b4868255aad86
SHA512a908c80bd80a8085534ac082c992b1d0297b3af2a39d1dd0a5a7ed6d9fe82d6912da6b5cc8905662b57a0246af0723c4632f67d4fc1be5c74fb60308415625db
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD52f4abf2ad1c9f594651f2507a8604aa7
SHA17c6dbbae50d2c06099d84271102a81d1d6399ef3
SHA2561a485801f159e4eeecae941ed6873c649733e1c3d2fa4f51838431c55ebea709
SHA5126742769310596177c992d65ede7b46bead070a6b1f5e106237212da6b6f62bd5d762d3ba84dcd8d088442e228b05a5fbefdace05eed321707d87d2de17176654
-
Filesize
72KB
MD52f4abf2ad1c9f594651f2507a8604aa7
SHA17c6dbbae50d2c06099d84271102a81d1d6399ef3
SHA2561a485801f159e4eeecae941ed6873c649733e1c3d2fa4f51838431c55ebea709
SHA5126742769310596177c992d65ede7b46bead070a6b1f5e106237212da6b6f62bd5d762d3ba84dcd8d088442e228b05a5fbefdace05eed321707d87d2de17176654
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD52f4abf2ad1c9f594651f2507a8604aa7
SHA17c6dbbae50d2c06099d84271102a81d1d6399ef3
SHA2561a485801f159e4eeecae941ed6873c649733e1c3d2fa4f51838431c55ebea709
SHA5126742769310596177c992d65ede7b46bead070a6b1f5e106237212da6b6f62bd5d762d3ba84dcd8d088442e228b05a5fbefdace05eed321707d87d2de17176654
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD51ccd574ae7d0de17db914a96e80e979b
SHA1a858b084eccc5346f17a1e15139b29f277ae427d
SHA256c54363bb4b3c4dd5fb61d83f514ae50ba834b883f7421bc9e7a65e62cb07aaa2
SHA5122d69b660d6811a5a268ec3058c99475894eb91a130381fc0f235cd23ae74166e44bc757f1e31733aa91c20b62c46900ec5e804ab4995ffe1f3706f168795525e
-
Filesize
72KB
MD51ccd574ae7d0de17db914a96e80e979b
SHA1a858b084eccc5346f17a1e15139b29f277ae427d
SHA256c54363bb4b3c4dd5fb61d83f514ae50ba834b883f7421bc9e7a65e62cb07aaa2
SHA5122d69b660d6811a5a268ec3058c99475894eb91a130381fc0f235cd23ae74166e44bc757f1e31733aa91c20b62c46900ec5e804ab4995ffe1f3706f168795525e
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD5b2bcd13a7da6caaaf0f22f0c16103a80
SHA1bfc78630c2a181393883d8f24c365a66a90d3406
SHA2565d04439a7044573d57df5a03242d65b5df69abb9225bc7bffe12bb0b10998420
SHA512ba07e8a47c2b3ad99a0085563f268da95efe2b66be48261e1001831a2c4f0508660d573fa8a487c8c6de52690508707c6f97c8b0fb16e11be2e3a27bcd286f4d
-
Filesize
72KB
MD5b2bcd13a7da6caaaf0f22f0c16103a80
SHA1bfc78630c2a181393883d8f24c365a66a90d3406
SHA2565d04439a7044573d57df5a03242d65b5df69abb9225bc7bffe12bb0b10998420
SHA512ba07e8a47c2b3ad99a0085563f268da95efe2b66be48261e1001831a2c4f0508660d573fa8a487c8c6de52690508707c6f97c8b0fb16e11be2e3a27bcd286f4d
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD571beb0554ed1f66d520f0572e25ed1b0
SHA1549725279103d310e45b3cf24a8256b4f58f07c7
SHA256b8d5310fd2c5c23b11634a35dea7e55a724e087d1050d17e481d6af4350d514c
SHA512ad0e37e8dcf6d9a99256fbe8bd940ac5cddba5acd9bba11983d88c44cf3d8a626ec1e748217922f676f39a5a963c3742042505b4458493bf82522c3abb6c42cd
-
Filesize
72KB
MD571beb0554ed1f66d520f0572e25ed1b0
SHA1549725279103d310e45b3cf24a8256b4f58f07c7
SHA256b8d5310fd2c5c23b11634a35dea7e55a724e087d1050d17e481d6af4350d514c
SHA512ad0e37e8dcf6d9a99256fbe8bd940ac5cddba5acd9bba11983d88c44cf3d8a626ec1e748217922f676f39a5a963c3742042505b4458493bf82522c3abb6c42cd
-
Filesize
72KB
MD5b2bcd13a7da6caaaf0f22f0c16103a80
SHA1bfc78630c2a181393883d8f24c365a66a90d3406
SHA2565d04439a7044573d57df5a03242d65b5df69abb9225bc7bffe12bb0b10998420
SHA512ba07e8a47c2b3ad99a0085563f268da95efe2b66be48261e1001831a2c4f0508660d573fa8a487c8c6de52690508707c6f97c8b0fb16e11be2e3a27bcd286f4d
-
Filesize
72KB
MD5b2bcd13a7da6caaaf0f22f0c16103a80
SHA1bfc78630c2a181393883d8f24c365a66a90d3406
SHA2565d04439a7044573d57df5a03242d65b5df69abb9225bc7bffe12bb0b10998420
SHA512ba07e8a47c2b3ad99a0085563f268da95efe2b66be48261e1001831a2c4f0508660d573fa8a487c8c6de52690508707c6f97c8b0fb16e11be2e3a27bcd286f4d
-
Filesize
72KB
MD563b76b54cee4c1e82d7d415485692a94
SHA17a8301d7732cf55f43b52a0eda90c9d9a8634629
SHA2563c044aa3ebe8d5f8e5bcc61837e889ed50b00b6e8725b8c6280b4868255aad86
SHA512a908c80bd80a8085534ac082c992b1d0297b3af2a39d1dd0a5a7ed6d9fe82d6912da6b5cc8905662b57a0246af0723c4632f67d4fc1be5c74fb60308415625db
-
Filesize
72KB
MD563b76b54cee4c1e82d7d415485692a94
SHA17a8301d7732cf55f43b52a0eda90c9d9a8634629
SHA2563c044aa3ebe8d5f8e5bcc61837e889ed50b00b6e8725b8c6280b4868255aad86
SHA512a908c80bd80a8085534ac082c992b1d0297b3af2a39d1dd0a5a7ed6d9fe82d6912da6b5cc8905662b57a0246af0723c4632f67d4fc1be5c74fb60308415625db
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD5e6099e75a6414e0426eff71de72be536
SHA1cb3183ec247a94a7d0f9970887bebafb7998edcd
SHA2561a40d314ccf655eb1b5cd1d7179b85e8ed171628f89c5b85d4a71bef05dc94b0
SHA512a1f06b64e311a37c94221bab8106f1fd5b4c5f6009b43f6b50395068d72900a0f33e206586d0e84c981135de885101341bbbdf8792b0cbb5ca9a7ab72b1c2852
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD517e218d50c8bed461004da032e361278
SHA1ab40d033e6eca6a6eaca263050326888c25ce132
SHA2563690a6dce435489e3295d40098c307b1213ae49c2d9b9109645a73fcb123ff13
SHA512565e1e65db56662434c265b56bb580b0fe6df8fbc8681160ab21a0f9405950f12e41f4f15661ea54723a153c61bb035f363de52e6f09f18eb78c72c81a00c005
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD50924e116d83c57b0b7fb3ba0c329a2b9
SHA1ef7a48d9abbfc9c43890cc34b36a9293325e2e7e
SHA25609983f8a7e8fab4a3c5ca9506fa42e519d1ae1a0e68228902b5fc2bcbeeba2ef
SHA51239f603367e0df7d8d86b297a5932c4f24e920c9dba0c8cb80de0d6971128b7c26a9b745f9b95881113c5ae79a4e818b1cfad7d76a222fb4d55fa974ff4a77bff
-
Filesize
72KB
MD52f4abf2ad1c9f594651f2507a8604aa7
SHA17c6dbbae50d2c06099d84271102a81d1d6399ef3
SHA2561a485801f159e4eeecae941ed6873c649733e1c3d2fa4f51838431c55ebea709
SHA5126742769310596177c992d65ede7b46bead070a6b1f5e106237212da6b6f62bd5d762d3ba84dcd8d088442e228b05a5fbefdace05eed321707d87d2de17176654
-
Filesize
72KB
MD52f4abf2ad1c9f594651f2507a8604aa7
SHA17c6dbbae50d2c06099d84271102a81d1d6399ef3
SHA2561a485801f159e4eeecae941ed6873c649733e1c3d2fa4f51838431c55ebea709
SHA5126742769310596177c992d65ede7b46bead070a6b1f5e106237212da6b6f62bd5d762d3ba84dcd8d088442e228b05a5fbefdace05eed321707d87d2de17176654
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD52f4abf2ad1c9f594651f2507a8604aa7
SHA17c6dbbae50d2c06099d84271102a81d1d6399ef3
SHA2561a485801f159e4eeecae941ed6873c649733e1c3d2fa4f51838431c55ebea709
SHA5126742769310596177c992d65ede7b46bead070a6b1f5e106237212da6b6f62bd5d762d3ba84dcd8d088442e228b05a5fbefdace05eed321707d87d2de17176654
-
Filesize
72KB
MD52f4abf2ad1c9f594651f2507a8604aa7
SHA17c6dbbae50d2c06099d84271102a81d1d6399ef3
SHA2561a485801f159e4eeecae941ed6873c649733e1c3d2fa4f51838431c55ebea709
SHA5126742769310596177c992d65ede7b46bead070a6b1f5e106237212da6b6f62bd5d762d3ba84dcd8d088442e228b05a5fbefdace05eed321707d87d2de17176654
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107
-
Filesize
72KB
MD5fe2e08d796d8b8535f2c670a76ab9436
SHA1001f0e78d10e0e2c2aa5e2a806bceef175fc57c2
SHA256d2f408dba004f4f4fb673abd9501a3c9a5f0b6a27fa00137283d56b474fe0109
SHA51244e7ad55501af92d00b340116013880592cbeab67fc83f42c030d5ac1c554d4d7df611012a6a17761e773988288842993de74853c13523fc293c1d874eee1107