Analysis
-
max time kernel
175s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe
Resource
win10v2004-20220812-en
General
-
Target
3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe
-
Size
72KB
-
MD5
04455d9467ba87cfc36653b3033a02e5
-
SHA1
91c8683f473571c6431b31f117397a774c3ec7c4
-
SHA256
3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69
-
SHA512
add9a89c6f016ed5bd11ce46f36dbfbd62757ab020b62ebffee0cdeee47fb43a1c102cf1a2accdc39de09a1bb2e136dcb0ae417b322636762219dbed29a1c22b
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2N:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP5
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 62 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1320 backup.exe 2040 backup.exe 1812 backup.exe 948 backup.exe 1984 backup.exe 556 System Restore.exe 628 backup.exe 1336 backup.exe 1260 backup.exe 1996 backup.exe 1400 backup.exe 1884 backup.exe 2008 backup.exe 1752 data.exe 1496 backup.exe 940 data.exe 1600 backup.exe 952 backup.exe 1128 backup.exe 992 backup.exe 972 backup.exe 1692 backup.exe 272 backup.exe 1164 backup.exe 576 backup.exe 1160 backup.exe 844 backup.exe 980 backup.exe 804 backup.exe 1480 System Restore.exe 1804 backup.exe 1156 backup.exe 1968 backup.exe 1528 System Restore.exe 436 backup.exe 1884 backup.exe 1420 backup.exe 2008 data.exe 1520 backup.exe 1948 data.exe 752 backup.exe 840 backup.exe 904 backup.exe 940 backup.exe 2032 backup.exe 1800 backup.exe 1564 backup.exe 908 backup.exe 992 backup.exe 1128 update.exe 1172 update.exe 1560 backup.exe 1664 backup.exe 1740 backup.exe 1572 backup.exe 1192 backup.exe 440 backup.exe 1728 backup.exe 664 backup.exe 1100 backup.exe 568 backup.exe 1744 backup.exe 1304 backup.exe 2020 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 628 backup.exe 628 backup.exe 1260 backup.exe 1260 backup.exe 628 backup.exe 628 backup.exe 1400 backup.exe 1400 backup.exe 1884 backup.exe 1884 backup.exe 1400 backup.exe 1400 backup.exe 1752 data.exe 1752 data.exe 1496 backup.exe 1496 backup.exe 1496 backup.exe 1496 backup.exe 1600 backup.exe 1600 backup.exe 1600 backup.exe 1600 backup.exe 1600 backup.exe 1600 backup.exe 1600 backup.exe 1600 backup.exe 1752 data.exe 1752 data.exe 628 backup.exe 628 backup.exe 1496 backup.exe 1496 backup.exe 1600 backup.exe 1600 backup.exe 1400 backup.exe 1400 backup.exe 1752 data.exe 1752 data.exe 1496 backup.exe 1496 backup.exe 1600 backup.exe 1600 backup.exe 1400 backup.exe 1400 backup.exe 628 backup.exe 628 backup.exe 1600 backup.exe 1600 backup.exe 1400 backup.exe 1400 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\Chess\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe data.exe File opened for modification C:\Program Files\Java\jre7\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\data.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\update.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\data.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 1320 backup.exe 2040 backup.exe 1812 backup.exe 948 backup.exe 1984 backup.exe 556 System Restore.exe 628 backup.exe 1336 backup.exe 1260 backup.exe 1996 backup.exe 1400 backup.exe 1884 backup.exe 2008 backup.exe 1752 data.exe 1496 backup.exe 940 data.exe 1600 backup.exe 952 backup.exe 1128 backup.exe 992 backup.exe 972 backup.exe 1692 backup.exe 272 backup.exe 1160 backup.exe 576 backup.exe 1164 backup.exe 844 backup.exe 980 backup.exe 804 backup.exe 1480 System Restore.exe 1804 backup.exe 1156 backup.exe 1528 System Restore.exe 1968 backup.exe 436 backup.exe 1420 backup.exe 904 backup.exe 1520 backup.exe 2008 data.exe 1884 backup.exe 752 backup.exe 840 backup.exe 940 backup.exe 1948 data.exe 2032 backup.exe 1800 backup.exe 1564 backup.exe 908 backup.exe 992 backup.exe 1664 backup.exe 1128 update.exe 1560 backup.exe 1172 update.exe 1740 backup.exe 1728 backup.exe 1572 backup.exe 440 backup.exe 1100 backup.exe 1744 backup.exe 1304 backup.exe 568 backup.exe 1192 backup.exe 1108 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 1320 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 27 PID 860 wrote to memory of 1320 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 27 PID 860 wrote to memory of 1320 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 27 PID 860 wrote to memory of 1320 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 27 PID 860 wrote to memory of 2040 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 28 PID 860 wrote to memory of 2040 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 28 PID 860 wrote to memory of 2040 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 28 PID 860 wrote to memory of 2040 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 28 PID 860 wrote to memory of 1812 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 29 PID 860 wrote to memory of 1812 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 29 PID 860 wrote to memory of 1812 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 29 PID 860 wrote to memory of 1812 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 29 PID 860 wrote to memory of 948 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 30 PID 860 wrote to memory of 948 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 30 PID 860 wrote to memory of 948 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 30 PID 860 wrote to memory of 948 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 30 PID 860 wrote to memory of 1984 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 31 PID 860 wrote to memory of 1984 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 31 PID 860 wrote to memory of 1984 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 31 PID 860 wrote to memory of 1984 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 31 PID 860 wrote to memory of 556 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 32 PID 860 wrote to memory of 556 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 32 PID 860 wrote to memory of 556 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 32 PID 860 wrote to memory of 556 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 32 PID 1320 wrote to memory of 628 1320 backup.exe 33 PID 1320 wrote to memory of 628 1320 backup.exe 33 PID 1320 wrote to memory of 628 1320 backup.exe 33 PID 1320 wrote to memory of 628 1320 backup.exe 33 PID 860 wrote to memory of 1336 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 34 PID 860 wrote to memory of 1336 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 34 PID 860 wrote to memory of 1336 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 34 PID 860 wrote to memory of 1336 860 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe 34 PID 628 wrote to memory of 1260 628 backup.exe 35 PID 628 wrote to memory of 1260 628 backup.exe 35 PID 628 wrote to memory of 1260 628 backup.exe 35 PID 628 wrote to memory of 1260 628 backup.exe 35 PID 1260 wrote to memory of 1996 1260 backup.exe 36 PID 1260 wrote to memory of 1996 1260 backup.exe 36 PID 1260 wrote to memory of 1996 1260 backup.exe 36 PID 1260 wrote to memory of 1996 1260 backup.exe 36 PID 628 wrote to memory of 1400 628 backup.exe 37 PID 628 wrote to memory of 1400 628 backup.exe 37 PID 628 wrote to memory of 1400 628 backup.exe 37 PID 628 wrote to memory of 1400 628 backup.exe 37 PID 1400 wrote to memory of 1884 1400 backup.exe 38 PID 1400 wrote to memory of 1884 1400 backup.exe 38 PID 1400 wrote to memory of 1884 1400 backup.exe 38 PID 1400 wrote to memory of 1884 1400 backup.exe 38 PID 1884 wrote to memory of 2008 1884 backup.exe 39 PID 1884 wrote to memory of 2008 1884 backup.exe 39 PID 1884 wrote to memory of 2008 1884 backup.exe 39 PID 1884 wrote to memory of 2008 1884 backup.exe 39 PID 1400 wrote to memory of 1752 1400 backup.exe 40 PID 1400 wrote to memory of 1752 1400 backup.exe 40 PID 1400 wrote to memory of 1752 1400 backup.exe 40 PID 1400 wrote to memory of 1752 1400 backup.exe 40 PID 1752 wrote to memory of 1496 1752 data.exe 41 PID 1752 wrote to memory of 1496 1752 data.exe 41 PID 1752 wrote to memory of 1496 1752 data.exe 41 PID 1752 wrote to memory of 1496 1752 data.exe 41 PID 1496 wrote to memory of 940 1496 backup.exe 42 PID 1496 wrote to memory of 940 1496 backup.exe 42 PID 1496 wrote to memory of 940 1496 backup.exe 42 PID 1496 wrote to memory of 940 1496 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe"C:\Users\Admin\AppData\Local\Temp\3d12b44cdf6d37ec06e0df79bba3f16ab5c97ab47a6f81e4f4cc4bfac93a4a69.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:860 -
C:\Users\Admin\AppData\Local\Temp\547146436\backup.exeC:\Users\Admin\AppData\Local\Temp\547146436\backup.exe C:\Users\Admin\AppData\Local\Temp\547146436\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:628 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1400 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2008
-
-
-
C:\Program Files\Common Files\data.exe"C:\Program Files\Common Files\data.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1496 -
C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1600 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:992
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1480
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1304
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:1324
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:1852
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:272 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:908
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:1836
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:980 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\update.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\update.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1172
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:1232
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:108
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:844 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1520
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:436 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1832
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164 -
C:\Program Files\DVD Maker\de-DE\update.exe"C:\Program Files\DVD Maker\de-DE\update.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1128
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
PID:2020
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1572
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
PID:664
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1420
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1112
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:836
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Program Files\Java\jdk1.7.0_80\bin\data.exe"C:\Program Files\Java\jdk1.7.0_80\bin\data.exe" C:\Program Files\Java\jdk1.7.0_80\bin\7⤵PID:1972
-
-
C:\Program Files\Java\jdk1.7.0_80\db\backup.exe"C:\Program Files\Java\jdk1.7.0_80\db\backup.exe" C:\Program Files\Java\jdk1.7.0_80\db\7⤵PID:1240
-
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:1804
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800 -
C:\Program Files\Microsoft Games\Chess\backup.exe"C:\Program Files\Microsoft Games\Chess\backup.exe" C:\Program Files\Microsoft Games\Chess\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1100 -
C:\Program Files\Microsoft Games\Chess\de-DE\update.exe"C:\Program Files\Microsoft Games\Chess\de-DE\update.exe" C:\Program Files\Microsoft Games\Chess\de-DE\7⤵PID:1340
-
-
C:\Program Files\Microsoft Games\Chess\en-US\backup.exe"C:\Program Files\Microsoft Games\Chess\en-US\backup.exe" C:\Program Files\Microsoft Games\Chess\en-US\7⤵PID:1352
-
-
-
C:\Program Files\Microsoft Games\FreeCell\backup.exe"C:\Program Files\Microsoft Games\FreeCell\backup.exe" C:\Program Files\Microsoft Games\FreeCell\6⤵PID:1828
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1772
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Program Files (x86)\Adobe\data.exe"C:\Program Files (x86)\Adobe\data.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2008 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:112
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵PID:1348
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1564 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:1428
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵PID:1696
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1544
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1368
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:468
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\data.exeC:\Users\Admin\data.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1948 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:440
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:1624
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:1540
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1664 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:952
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:828
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:980
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:752 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD534699835e26bbbe59c83ee9226722570
SHA1b9b68f4c0a47a6545f8bef662c6026478f3c642f
SHA256097a6d7ed8635466a6b13bcae71ebda4745cc69e12894463b263aa959675b1f3
SHA512605ed3f7560df5993d2bdc1bd01e1e6b2a249eae5db145f72d727d53adfabdde851889d5cb948b0d742d576ad39ef919eb964d9891ccd426638c02c61295aa4b
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD50318096fc357ba7446aac3c94de671f5
SHA12abc96f1fe5f1da246c3a89aee4d591185b0ba4b
SHA256888a2f9a115d46e93fd5cb39f73cd8b7dbc7471806b5c8c64fc5b81ccc8c586b
SHA512f71c53de1858daefbec0b82ce7ee2a46f786195433e494ad8536a998502772eb33979eaae225373e19deb64554b05e2abba8f084f7be6905db7bf00c0535b2a8
-
Filesize
72KB
MD534699835e26bbbe59c83ee9226722570
SHA1b9b68f4c0a47a6545f8bef662c6026478f3c642f
SHA256097a6d7ed8635466a6b13bcae71ebda4745cc69e12894463b263aa959675b1f3
SHA512605ed3f7560df5993d2bdc1bd01e1e6b2a249eae5db145f72d727d53adfabdde851889d5cb948b0d742d576ad39ef919eb964d9891ccd426638c02c61295aa4b
-
Filesize
72KB
MD534699835e26bbbe59c83ee9226722570
SHA1b9b68f4c0a47a6545f8bef662c6026478f3c642f
SHA256097a6d7ed8635466a6b13bcae71ebda4745cc69e12894463b263aa959675b1f3
SHA512605ed3f7560df5993d2bdc1bd01e1e6b2a249eae5db145f72d727d53adfabdde851889d5cb948b0d742d576ad39ef919eb964d9891ccd426638c02c61295aa4b
-
Filesize
72KB
MD573a5779a142c3f0c262511f09bbc618f
SHA11a22fd7b85e4e49a84948bb7916a350ffe9e1e37
SHA2562c41393d0489992c6f058eed216acda2fb8dcaddf275ca93e6fde769e103fbcf
SHA5122f49694b7c067b83f37e1d69bd8d53baaebfe92d390e707c9eef877adcb870104d34ffa3df6a3817041bb06bc877acec4c419b42fbf5aad474501f70c978884f
-
Filesize
72KB
MD5ec061be13d23dc4906aa9f6bf92612ad
SHA1c6c8b9289e2c1b204d66a9bb7c6738323a4a6bd0
SHA2569780a4fb3e075d165397bf6a44bae0b4b8309926a1708b0246f713e1b86b8038
SHA5125d42903a936e12676e4d6b8a786060e8a877d56dea50f8513aa8294d03d33559f7c7cc3efa90f4d60f813e06a683db80b25255bc0644a2ec3c29cd8df35ae328
-
Filesize
72KB
MD5ec061be13d23dc4906aa9f6bf92612ad
SHA1c6c8b9289e2c1b204d66a9bb7c6738323a4a6bd0
SHA2569780a4fb3e075d165397bf6a44bae0b4b8309926a1708b0246f713e1b86b8038
SHA5125d42903a936e12676e4d6b8a786060e8a877d56dea50f8513aa8294d03d33559f7c7cc3efa90f4d60f813e06a683db80b25255bc0644a2ec3c29cd8df35ae328
-
Filesize
72KB
MD50c88643f2ce01a68cc3d76ff51801f0b
SHA1320971e667219661a40f5164bebfa3fa1820968b
SHA2560750831ed7f437fb7cf07f6c846c72fee2d24effbdfda1c76e036498154144ca
SHA5121087a7ad2ba57c00d3cebd528b31ef1cc2379d69ec6aa21dabd1aa83f65a84109ef9a2c7774c0f4bf0da1c96864242b25de916e9c5488723fec585f196fa607c
-
Filesize
72KB
MD573a5779a142c3f0c262511f09bbc618f
SHA11a22fd7b85e4e49a84948bb7916a350ffe9e1e37
SHA2562c41393d0489992c6f058eed216acda2fb8dcaddf275ca93e6fde769e103fbcf
SHA5122f49694b7c067b83f37e1d69bd8d53baaebfe92d390e707c9eef877adcb870104d34ffa3df6a3817041bb06bc877acec4c419b42fbf5aad474501f70c978884f
-
Filesize
72KB
MD573a5779a142c3f0c262511f09bbc618f
SHA11a22fd7b85e4e49a84948bb7916a350ffe9e1e37
SHA2562c41393d0489992c6f058eed216acda2fb8dcaddf275ca93e6fde769e103fbcf
SHA5122f49694b7c067b83f37e1d69bd8d53baaebfe92d390e707c9eef877adcb870104d34ffa3df6a3817041bb06bc877acec4c419b42fbf5aad474501f70c978884f
-
Filesize
72KB
MD50c88643f2ce01a68cc3d76ff51801f0b
SHA1320971e667219661a40f5164bebfa3fa1820968b
SHA2560750831ed7f437fb7cf07f6c846c72fee2d24effbdfda1c76e036498154144ca
SHA5121087a7ad2ba57c00d3cebd528b31ef1cc2379d69ec6aa21dabd1aa83f65a84109ef9a2c7774c0f4bf0da1c96864242b25de916e9c5488723fec585f196fa607c
-
Filesize
72KB
MD5bc65ea5e32e19f56c600ef69cefb8be1
SHA1068bf955d8c875ce8150139a9a84293e9f85a0fc
SHA25645aea6fea7945655fde49f3ba4fc46b9d7a65227e93a30ac644c9107f3aab799
SHA5122a2cd3a1a3c2be93b3d7dd732f5fb6a3c1b0b5dfbf6d1d81baad90651bbc57121c8ca4ee5e26b2e7a7e6ea6c71781290fa01774415dc6feb7944073a45f1f80f
-
Filesize
72KB
MD5bc65ea5e32e19f56c600ef69cefb8be1
SHA1068bf955d8c875ce8150139a9a84293e9f85a0fc
SHA25645aea6fea7945655fde49f3ba4fc46b9d7a65227e93a30ac644c9107f3aab799
SHA5122a2cd3a1a3c2be93b3d7dd732f5fb6a3c1b0b5dfbf6d1d81baad90651bbc57121c8ca4ee5e26b2e7a7e6ea6c71781290fa01774415dc6feb7944073a45f1f80f
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD54aa9568b87612e83282db40a1d008e9b
SHA160a3172bb2ab85dcd845fe4ed0d1d9b617552bee
SHA256d7f2137bb426542de6abe89dc524d17509f2d6f4038cb24929f93050d4c2624a
SHA512932358590e176b62589efa9809158ae808da54e5f56f5b4b0b5fde37f068ee7cd41fd550a8c72a8043b83f69fc70d212c88f083f5f3ca644c4316f86bdda8e50
-
Filesize
72KB
MD54aa9568b87612e83282db40a1d008e9b
SHA160a3172bb2ab85dcd845fe4ed0d1d9b617552bee
SHA256d7f2137bb426542de6abe89dc524d17509f2d6f4038cb24929f93050d4c2624a
SHA512932358590e176b62589efa9809158ae808da54e5f56f5b4b0b5fde37f068ee7cd41fd550a8c72a8043b83f69fc70d212c88f083f5f3ca644c4316f86bdda8e50
-
Filesize
72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
Filesize
72KB
MD5f30f4803270fb2a9a4f9c3ea2dacf0bc
SHA15c75121f6c454198107c44f80970c6a02b9375d2
SHA2569e373dcdbfa48734b77b56dc9d8039826f9780e5dc65854cd7b772a8dbc5985d
SHA51271193a0df74a5fc3297fdae2863915919b30ae4aabe9d18c25a32fbd10fc8956d6d623d74fcb133b7be51ff36d12d0ecb5500648e3806248fb28b46c5c3e4c79
-
Filesize
72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
Filesize
72KB
MD5f30f4803270fb2a9a4f9c3ea2dacf0bc
SHA15c75121f6c454198107c44f80970c6a02b9375d2
SHA2569e373dcdbfa48734b77b56dc9d8039826f9780e5dc65854cd7b772a8dbc5985d
SHA51271193a0df74a5fc3297fdae2863915919b30ae4aabe9d18c25a32fbd10fc8956d6d623d74fcb133b7be51ff36d12d0ecb5500648e3806248fb28b46c5c3e4c79
-
Filesize
72KB
MD56616d20dc2df3fb0b68ad04192e2adca
SHA1f8562cfda146a070aca7fb45630fb2abf9223b13
SHA25662f35eac8ecdb28d2dacd65f1f9241fdf2e4ab6fa23dd261d6f81d1dd4189d8c
SHA5128ae4d84acc0ccaaa8f94845a839fdea3e88eed83bb061608e8cf2d67dec1928d18ac8bd03a9e728755058b139cdb109b93210a425e507b130af66e843da3e955
-
Filesize
72KB
MD56616d20dc2df3fb0b68ad04192e2adca
SHA1f8562cfda146a070aca7fb45630fb2abf9223b13
SHA25662f35eac8ecdb28d2dacd65f1f9241fdf2e4ab6fa23dd261d6f81d1dd4189d8c
SHA5128ae4d84acc0ccaaa8f94845a839fdea3e88eed83bb061608e8cf2d67dec1928d18ac8bd03a9e728755058b139cdb109b93210a425e507b130af66e843da3e955
-
Filesize
72KB
MD534699835e26bbbe59c83ee9226722570
SHA1b9b68f4c0a47a6545f8bef662c6026478f3c642f
SHA256097a6d7ed8635466a6b13bcae71ebda4745cc69e12894463b263aa959675b1f3
SHA512605ed3f7560df5993d2bdc1bd01e1e6b2a249eae5db145f72d727d53adfabdde851889d5cb948b0d742d576ad39ef919eb964d9891ccd426638c02c61295aa4b
-
Filesize
72KB
MD534699835e26bbbe59c83ee9226722570
SHA1b9b68f4c0a47a6545f8bef662c6026478f3c642f
SHA256097a6d7ed8635466a6b13bcae71ebda4745cc69e12894463b263aa959675b1f3
SHA512605ed3f7560df5993d2bdc1bd01e1e6b2a249eae5db145f72d727d53adfabdde851889d5cb948b0d742d576ad39ef919eb964d9891ccd426638c02c61295aa4b
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD50318096fc357ba7446aac3c94de671f5
SHA12abc96f1fe5f1da246c3a89aee4d591185b0ba4b
SHA256888a2f9a115d46e93fd5cb39f73cd8b7dbc7471806b5c8c64fc5b81ccc8c586b
SHA512f71c53de1858daefbec0b82ce7ee2a46f786195433e494ad8536a998502772eb33979eaae225373e19deb64554b05e2abba8f084f7be6905db7bf00c0535b2a8
-
Filesize
72KB
MD50318096fc357ba7446aac3c94de671f5
SHA12abc96f1fe5f1da246c3a89aee4d591185b0ba4b
SHA256888a2f9a115d46e93fd5cb39f73cd8b7dbc7471806b5c8c64fc5b81ccc8c586b
SHA512f71c53de1858daefbec0b82ce7ee2a46f786195433e494ad8536a998502772eb33979eaae225373e19deb64554b05e2abba8f084f7be6905db7bf00c0535b2a8
-
Filesize
72KB
MD534699835e26bbbe59c83ee9226722570
SHA1b9b68f4c0a47a6545f8bef662c6026478f3c642f
SHA256097a6d7ed8635466a6b13bcae71ebda4745cc69e12894463b263aa959675b1f3
SHA512605ed3f7560df5993d2bdc1bd01e1e6b2a249eae5db145f72d727d53adfabdde851889d5cb948b0d742d576ad39ef919eb964d9891ccd426638c02c61295aa4b
-
Filesize
72KB
MD534699835e26bbbe59c83ee9226722570
SHA1b9b68f4c0a47a6545f8bef662c6026478f3c642f
SHA256097a6d7ed8635466a6b13bcae71ebda4745cc69e12894463b263aa959675b1f3
SHA512605ed3f7560df5993d2bdc1bd01e1e6b2a249eae5db145f72d727d53adfabdde851889d5cb948b0d742d576ad39ef919eb964d9891ccd426638c02c61295aa4b
-
Filesize
72KB
MD573a5779a142c3f0c262511f09bbc618f
SHA11a22fd7b85e4e49a84948bb7916a350ffe9e1e37
SHA2562c41393d0489992c6f058eed216acda2fb8dcaddf275ca93e6fde769e103fbcf
SHA5122f49694b7c067b83f37e1d69bd8d53baaebfe92d390e707c9eef877adcb870104d34ffa3df6a3817041bb06bc877acec4c419b42fbf5aad474501f70c978884f
-
Filesize
72KB
MD573a5779a142c3f0c262511f09bbc618f
SHA11a22fd7b85e4e49a84948bb7916a350ffe9e1e37
SHA2562c41393d0489992c6f058eed216acda2fb8dcaddf275ca93e6fde769e103fbcf
SHA5122f49694b7c067b83f37e1d69bd8d53baaebfe92d390e707c9eef877adcb870104d34ffa3df6a3817041bb06bc877acec4c419b42fbf5aad474501f70c978884f
-
Filesize
72KB
MD5ec061be13d23dc4906aa9f6bf92612ad
SHA1c6c8b9289e2c1b204d66a9bb7c6738323a4a6bd0
SHA2569780a4fb3e075d165397bf6a44bae0b4b8309926a1708b0246f713e1b86b8038
SHA5125d42903a936e12676e4d6b8a786060e8a877d56dea50f8513aa8294d03d33559f7c7cc3efa90f4d60f813e06a683db80b25255bc0644a2ec3c29cd8df35ae328
-
Filesize
72KB
MD5ec061be13d23dc4906aa9f6bf92612ad
SHA1c6c8b9289e2c1b204d66a9bb7c6738323a4a6bd0
SHA2569780a4fb3e075d165397bf6a44bae0b4b8309926a1708b0246f713e1b86b8038
SHA5125d42903a936e12676e4d6b8a786060e8a877d56dea50f8513aa8294d03d33559f7c7cc3efa90f4d60f813e06a683db80b25255bc0644a2ec3c29cd8df35ae328
-
Filesize
72KB
MD50c88643f2ce01a68cc3d76ff51801f0b
SHA1320971e667219661a40f5164bebfa3fa1820968b
SHA2560750831ed7f437fb7cf07f6c846c72fee2d24effbdfda1c76e036498154144ca
SHA5121087a7ad2ba57c00d3cebd528b31ef1cc2379d69ec6aa21dabd1aa83f65a84109ef9a2c7774c0f4bf0da1c96864242b25de916e9c5488723fec585f196fa607c
-
Filesize
72KB
MD50c88643f2ce01a68cc3d76ff51801f0b
SHA1320971e667219661a40f5164bebfa3fa1820968b
SHA2560750831ed7f437fb7cf07f6c846c72fee2d24effbdfda1c76e036498154144ca
SHA5121087a7ad2ba57c00d3cebd528b31ef1cc2379d69ec6aa21dabd1aa83f65a84109ef9a2c7774c0f4bf0da1c96864242b25de916e9c5488723fec585f196fa607c
-
Filesize
72KB
MD573a5779a142c3f0c262511f09bbc618f
SHA11a22fd7b85e4e49a84948bb7916a350ffe9e1e37
SHA2562c41393d0489992c6f058eed216acda2fb8dcaddf275ca93e6fde769e103fbcf
SHA5122f49694b7c067b83f37e1d69bd8d53baaebfe92d390e707c9eef877adcb870104d34ffa3df6a3817041bb06bc877acec4c419b42fbf5aad474501f70c978884f
-
Filesize
72KB
MD573a5779a142c3f0c262511f09bbc618f
SHA11a22fd7b85e4e49a84948bb7916a350ffe9e1e37
SHA2562c41393d0489992c6f058eed216acda2fb8dcaddf275ca93e6fde769e103fbcf
SHA5122f49694b7c067b83f37e1d69bd8d53baaebfe92d390e707c9eef877adcb870104d34ffa3df6a3817041bb06bc877acec4c419b42fbf5aad474501f70c978884f
-
Filesize
72KB
MD50c88643f2ce01a68cc3d76ff51801f0b
SHA1320971e667219661a40f5164bebfa3fa1820968b
SHA2560750831ed7f437fb7cf07f6c846c72fee2d24effbdfda1c76e036498154144ca
SHA5121087a7ad2ba57c00d3cebd528b31ef1cc2379d69ec6aa21dabd1aa83f65a84109ef9a2c7774c0f4bf0da1c96864242b25de916e9c5488723fec585f196fa607c
-
Filesize
72KB
MD50c88643f2ce01a68cc3d76ff51801f0b
SHA1320971e667219661a40f5164bebfa3fa1820968b
SHA2560750831ed7f437fb7cf07f6c846c72fee2d24effbdfda1c76e036498154144ca
SHA5121087a7ad2ba57c00d3cebd528b31ef1cc2379d69ec6aa21dabd1aa83f65a84109ef9a2c7774c0f4bf0da1c96864242b25de916e9c5488723fec585f196fa607c
-
Filesize
72KB
MD50c88643f2ce01a68cc3d76ff51801f0b
SHA1320971e667219661a40f5164bebfa3fa1820968b
SHA2560750831ed7f437fb7cf07f6c846c72fee2d24effbdfda1c76e036498154144ca
SHA5121087a7ad2ba57c00d3cebd528b31ef1cc2379d69ec6aa21dabd1aa83f65a84109ef9a2c7774c0f4bf0da1c96864242b25de916e9c5488723fec585f196fa607c
-
Filesize
72KB
MD5bc65ea5e32e19f56c600ef69cefb8be1
SHA1068bf955d8c875ce8150139a9a84293e9f85a0fc
SHA25645aea6fea7945655fde49f3ba4fc46b9d7a65227e93a30ac644c9107f3aab799
SHA5122a2cd3a1a3c2be93b3d7dd732f5fb6a3c1b0b5dfbf6d1d81baad90651bbc57121c8ca4ee5e26b2e7a7e6ea6c71781290fa01774415dc6feb7944073a45f1f80f
-
Filesize
72KB
MD5bc65ea5e32e19f56c600ef69cefb8be1
SHA1068bf955d8c875ce8150139a9a84293e9f85a0fc
SHA25645aea6fea7945655fde49f3ba4fc46b9d7a65227e93a30ac644c9107f3aab799
SHA5122a2cd3a1a3c2be93b3d7dd732f5fb6a3c1b0b5dfbf6d1d81baad90651bbc57121c8ca4ee5e26b2e7a7e6ea6c71781290fa01774415dc6feb7944073a45f1f80f
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD5c80b834332c86da5c70ffbdd2c8fb4dc
SHA18e3b4f2796a7a1218f58c1039fa5811aca93ae05
SHA256b872302ca3694a8f7000ceea3ffd6f73d12148874513a3d3ce360a576e5cc12c
SHA512f9ce4aa21dd81970fa86b971b23211874a46274e07c9477db8340ac354b4c3e1c14cb013803bb4335f5240396db7cb95e7c5f200ae83eda2e394635beb0df051
-
Filesize
72KB
MD54aa9568b87612e83282db40a1d008e9b
SHA160a3172bb2ab85dcd845fe4ed0d1d9b617552bee
SHA256d7f2137bb426542de6abe89dc524d17509f2d6f4038cb24929f93050d4c2624a
SHA512932358590e176b62589efa9809158ae808da54e5f56f5b4b0b5fde37f068ee7cd41fd550a8c72a8043b83f69fc70d212c88f083f5f3ca644c4316f86bdda8e50
-
Filesize
72KB
MD54aa9568b87612e83282db40a1d008e9b
SHA160a3172bb2ab85dcd845fe4ed0d1d9b617552bee
SHA256d7f2137bb426542de6abe89dc524d17509f2d6f4038cb24929f93050d4c2624a
SHA512932358590e176b62589efa9809158ae808da54e5f56f5b4b0b5fde37f068ee7cd41fd550a8c72a8043b83f69fc70d212c88f083f5f3ca644c4316f86bdda8e50
-
Filesize
72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
Filesize
72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
Filesize
72KB
MD5f30f4803270fb2a9a4f9c3ea2dacf0bc
SHA15c75121f6c454198107c44f80970c6a02b9375d2
SHA2569e373dcdbfa48734b77b56dc9d8039826f9780e5dc65854cd7b772a8dbc5985d
SHA51271193a0df74a5fc3297fdae2863915919b30ae4aabe9d18c25a32fbd10fc8956d6d623d74fcb133b7be51ff36d12d0ecb5500648e3806248fb28b46c5c3e4c79
-
Filesize
72KB
MD5f30f4803270fb2a9a4f9c3ea2dacf0bc
SHA15c75121f6c454198107c44f80970c6a02b9375d2
SHA2569e373dcdbfa48734b77b56dc9d8039826f9780e5dc65854cd7b772a8dbc5985d
SHA51271193a0df74a5fc3297fdae2863915919b30ae4aabe9d18c25a32fbd10fc8956d6d623d74fcb133b7be51ff36d12d0ecb5500648e3806248fb28b46c5c3e4c79
-
Filesize
72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
Filesize
72KB
MD599c511a66ce7110628dc13f9187e5676
SHA10b6e51828d898fcb1efdea1e70961aa1405cb013
SHA256d2f6df834feb6f7f041502327d71415549c01cb027839844a88f1c544ab26542
SHA51268ba84dfbe9f304072711a108bca6206f0003a69b15c4469ddb96c28b5bac04abb35202d61ea79c37b279124015ed0596669b07773187de13af8eaef62f2d6d0
-
Filesize
72KB
MD5f30f4803270fb2a9a4f9c3ea2dacf0bc
SHA15c75121f6c454198107c44f80970c6a02b9375d2
SHA2569e373dcdbfa48734b77b56dc9d8039826f9780e5dc65854cd7b772a8dbc5985d
SHA51271193a0df74a5fc3297fdae2863915919b30ae4aabe9d18c25a32fbd10fc8956d6d623d74fcb133b7be51ff36d12d0ecb5500648e3806248fb28b46c5c3e4c79
-
Filesize
72KB
MD5f30f4803270fb2a9a4f9c3ea2dacf0bc
SHA15c75121f6c454198107c44f80970c6a02b9375d2
SHA2569e373dcdbfa48734b77b56dc9d8039826f9780e5dc65854cd7b772a8dbc5985d
SHA51271193a0df74a5fc3297fdae2863915919b30ae4aabe9d18c25a32fbd10fc8956d6d623d74fcb133b7be51ff36d12d0ecb5500648e3806248fb28b46c5c3e4c79