Analysis
-
max time kernel
120s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 14:19
Static task
static1
Behavioral task
behavioral1
Sample
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe
Resource
win10v2004-20220812-en
General
-
Target
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe
-
Size
72KB
-
MD5
9cb946578645e32db35a5fc5b35ec5a4
-
SHA1
54c309208c6cdb670e34c0b06f80facf57214d07
-
SHA256
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a
-
SHA512
667a0666a0ba962b40a16e7482dde4090b77700c85623a57da49074ff455c9112ddc3976e3863005a4dc5798f0c885bde3492516b9cc604a8b11c8550b8cbe68
-
SSDEEP
384:TA6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGfM:EpQNwC3BEddsEqOt/hyJF+x3BEJwRrh
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 60 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1296 backup.exe 1472 backup.exe 1080 backup.exe 2040 backup.exe 964 backup.exe 1336 System Restore.exe 1488 backup.exe 1828 backup.exe 572 backup.exe 1512 backup.exe 576 backup.exe 2016 backup.exe 1196 backup.exe 1056 backup.exe 1500 update.exe 672 backup.exe 1700 update.exe 1044 backup.exe 1212 backup.exe 520 backup.exe 1876 backup.exe 1632 backup.exe 1536 backup.exe 1880 backup.exe 1708 backup.exe 1816 backup.exe 2036 backup.exe 1480 update.exe 1328 data.exe 856 backup.exe 288 backup.exe 1204 backup.exe 1668 backup.exe 1352 backup.exe 1464 backup.exe 1376 backup.exe 1956 backup.exe 1560 backup.exe 1108 backup.exe 852 backup.exe 840 update.exe 760 backup.exe 1008 backup.exe 520 backup.exe 1876 backup.exe 1796 backup.exe 440 backup.exe 988 backup.exe 552 backup.exe 816 backup.exe 1568 backup.exe 1960 backup.exe 636 backup.exe 1736 backup.exe 1580 backup.exe 1760 backup.exe 1116 backup.exe 1920 backup.exe 1396 backup.exe 1720 backup.exe 1676 backup.exe 1464 backup.exe 1192 backup.exe 468 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 1828 backup.exe 1828 backup.exe 572 backup.exe 572 backup.exe 1828 backup.exe 1828 backup.exe 576 backup.exe 576 backup.exe 2016 backup.exe 2016 backup.exe 576 backup.exe 576 backup.exe 1056 backup.exe 1500 update.exe 1500 update.exe 1500 update.exe 1500 update.exe 1500 update.exe 672 backup.exe 672 backup.exe 672 backup.exe 1500 update.exe 1700 update.exe 1700 update.exe 1700 update.exe 1700 update.exe 1700 update.exe 1044 backup.exe 1044 backup.exe 1044 backup.exe 1700 update.exe 1700 update.exe 1212 backup.exe 1212 backup.exe 1212 backup.exe 1700 update.exe 1700 update.exe 520 backup.exe 520 backup.exe 520 backup.exe 1700 update.exe 1700 update.exe 1876 backup.exe 1876 backup.exe 1876 backup.exe 1700 update.exe 1700 update.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\data.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\update.exe backup.exe File opened for modification C:\Program Files (x86)\Google\data.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\update.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Services\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 1296 backup.exe 1472 backup.exe 1080 backup.exe 2040 backup.exe 964 backup.exe 1336 System Restore.exe 1488 backup.exe 1828 backup.exe 572 backup.exe 1512 backup.exe 576 backup.exe 2016 backup.exe 1196 backup.exe 1056 backup.exe 1500 update.exe 672 backup.exe 1700 update.exe 1044 backup.exe 1212 backup.exe 520 backup.exe 1876 backup.exe 1632 backup.exe 1536 backup.exe 1880 backup.exe 1708 backup.exe 1816 backup.exe 2036 backup.exe 856 backup.exe 1328 data.exe 288 backup.exe 1352 backup.exe 1204 backup.exe 1668 backup.exe 1956 backup.exe 1464 backup.exe 1560 backup.exe 1376 backup.exe 1108 backup.exe 852 backup.exe 840 update.exe 1008 backup.exe 760 backup.exe 520 backup.exe 1876 backup.exe 1796 backup.exe 440 backup.exe 988 backup.exe 552 backup.exe 816 backup.exe 1568 backup.exe 1960 backup.exe 636 backup.exe 1736 backup.exe 1580 backup.exe 1760 backup.exe 1116 backup.exe 1920 backup.exe 1396 backup.exe 1676 backup.exe 1720 backup.exe 1192 backup.exe 1464 backup.exe 1468 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1296 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 28 PID 2032 wrote to memory of 1296 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 28 PID 2032 wrote to memory of 1296 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 28 PID 2032 wrote to memory of 1296 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 28 PID 2032 wrote to memory of 1472 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 29 PID 2032 wrote to memory of 1472 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 29 PID 2032 wrote to memory of 1472 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 29 PID 2032 wrote to memory of 1472 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 29 PID 2032 wrote to memory of 1080 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 30 PID 2032 wrote to memory of 1080 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 30 PID 2032 wrote to memory of 1080 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 30 PID 2032 wrote to memory of 1080 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 30 PID 2032 wrote to memory of 2040 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 31 PID 2032 wrote to memory of 2040 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 31 PID 2032 wrote to memory of 2040 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 31 PID 2032 wrote to memory of 2040 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 31 PID 2032 wrote to memory of 964 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 32 PID 2032 wrote to memory of 964 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 32 PID 2032 wrote to memory of 964 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 32 PID 2032 wrote to memory of 964 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 32 PID 2032 wrote to memory of 1336 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 33 PID 2032 wrote to memory of 1336 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 33 PID 2032 wrote to memory of 1336 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 33 PID 2032 wrote to memory of 1336 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 33 PID 2032 wrote to memory of 1488 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 34 PID 2032 wrote to memory of 1488 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 34 PID 2032 wrote to memory of 1488 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 34 PID 2032 wrote to memory of 1488 2032 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 34 PID 1296 wrote to memory of 1828 1296 backup.exe 35 PID 1296 wrote to memory of 1828 1296 backup.exe 35 PID 1296 wrote to memory of 1828 1296 backup.exe 35 PID 1296 wrote to memory of 1828 1296 backup.exe 35 PID 1828 wrote to memory of 572 1828 backup.exe 36 PID 1828 wrote to memory of 572 1828 backup.exe 36 PID 1828 wrote to memory of 572 1828 backup.exe 36 PID 1828 wrote to memory of 572 1828 backup.exe 36 PID 572 wrote to memory of 1512 572 backup.exe 37 PID 572 wrote to memory of 1512 572 backup.exe 37 PID 572 wrote to memory of 1512 572 backup.exe 37 PID 572 wrote to memory of 1512 572 backup.exe 37 PID 1828 wrote to memory of 576 1828 backup.exe 38 PID 1828 wrote to memory of 576 1828 backup.exe 38 PID 1828 wrote to memory of 576 1828 backup.exe 38 PID 1828 wrote to memory of 576 1828 backup.exe 38 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 1056 wrote to memory of 1500 1056 backup.exe 42 PID 1056 wrote to memory of 1500 1056 backup.exe 42 PID 1056 wrote to memory of 1500 1056 backup.exe 42 PID 1056 wrote to memory of 1500 1056 backup.exe 42 PID 1056 wrote to memory of 1500 1056 backup.exe 42 PID 1056 wrote to memory of 1500 1056 backup.exe 42 PID 1056 wrote to memory of 1500 1056 backup.exe 42 PID 1500 wrote to memory of 672 1500 update.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe"C:\Users\Admin\AppData\Local\Temp\39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\1819793539\backup.exeC:\Users\Admin\AppData\Local\Temp\1819793539\backup.exe C:\Users\Admin\AppData\Local\Temp\1819793539\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1296 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1828 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:572 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1196
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1056 -
C:\Program Files\Common Files\Microsoft Shared\update.exe"C:\Program Files\Common Files\Microsoft Shared\update.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1500 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:672
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1044
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:520
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1880
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1816
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:288
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1376
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:760 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:988
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1920
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:1476
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵PID:1920
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:620
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1464
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1008
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1796
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1568
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:856
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:836
-
-
-
C:\Program Files\Common Files\Services\update.exe"C:\Program Files\Common Files\Services\update.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
PID:1480
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:852
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:1908
-
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1452
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
C:\Program Files\DVD Maker\es-ES\update.exe"C:\Program Files\DVD Maker\es-ES\update.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:840
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1876
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1960
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵PID:1076
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1008 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1084
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1568
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1872
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1472
-
-
-
C:\Program Files (x86)\data.exe"C:\Program Files (x86)\data.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1328 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1956 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:520 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1736
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1396
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1464
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1732
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1308
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:2024
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:108
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵PID:1552
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
PID:468 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:952
-
-
-
C:\Program Files (x86)\Google\data.exe"C:\Program Files (x86)\Google\data.exe" C:\Program Files (x86)\Google\5⤵PID:1624
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1156
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:812
-
-
C:\Windows\update.exeC:\Windows\update.exe C:\Windows\4⤵PID:1748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD590840066cd6a3e4c5a2de36be9dd89bc
SHA17eb2e2f0f0b3efe1321c68aa76d1237a55e05224
SHA2564813608c61914e215d61f2467a1104b4434525b7040c318901e32eddc24769ef
SHA5120632d1a548d940e8106b9202a886e117c74ad3520b394b08661c81609aec636595329d4d640747a71955003e14e59d644d28642aa210e9c3a7f9460eee6d6c4b
-
Filesize
72KB
MD53763b435107682301d3a309b27050663
SHA109ec66ef2c33255f23b214e1822869e9ae04f48a
SHA256bca471a3a09d9f63c42239b3fb3e5752ee5683945e5e00fe989ff393d4702d19
SHA5120458cae905668cf8e0d34ae34a5303bcba9dfcad7621a195b2c62d94978551ef6738516ccf3806acc9057702b7260f5544f2b64f5077ccdefb35f6f88b5e0f7f
-
Filesize
72KB
MD53763b435107682301d3a309b27050663
SHA109ec66ef2c33255f23b214e1822869e9ae04f48a
SHA256bca471a3a09d9f63c42239b3fb3e5752ee5683945e5e00fe989ff393d4702d19
SHA5120458cae905668cf8e0d34ae34a5303bcba9dfcad7621a195b2c62d94978551ef6738516ccf3806acc9057702b7260f5544f2b64f5077ccdefb35f6f88b5e0f7f
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD59d28bfdc8b271cc8a13adf1f31cc125e
SHA1efb171b3fa58352f0efb8038fce9b25ed931277d
SHA25684258d8276ec67f7812f6a6567b33d361f22ef05d8a2a5d35d09518cf9f6e597
SHA5129a680066e63a30b57db2a6963915de14a65a4064cab6bc09402ed0ccefa788abefe8f5ca2eb79afbda5240b55b3c5feea0c6613bda83fca96cc098cf14bc478f
-
Filesize
72KB
MD59d28bfdc8b271cc8a13adf1f31cc125e
SHA1efb171b3fa58352f0efb8038fce9b25ed931277d
SHA25684258d8276ec67f7812f6a6567b33d361f22ef05d8a2a5d35d09518cf9f6e597
SHA5129a680066e63a30b57db2a6963915de14a65a4064cab6bc09402ed0ccefa788abefe8f5ca2eb79afbda5240b55b3c5feea0c6613bda83fca96cc098cf14bc478f
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD589a637fdb62468c5473dfec7606003e4
SHA1758b37619976d5299f861aeb33dcaa74e165458c
SHA256347df4cf81569fee65e695e8b592cbff5d9915ffd5a5538780dfee997c75c39c
SHA51293928d1428f1c87ace3123f489b4e3b4075a51b5f00650a9d27d2f4399bbcb6a08620ba1f6bc1932db4f0e67d204cb1707b125e00614386367258355127ae9fd
-
Filesize
72KB
MD589a637fdb62468c5473dfec7606003e4
SHA1758b37619976d5299f861aeb33dcaa74e165458c
SHA256347df4cf81569fee65e695e8b592cbff5d9915ffd5a5538780dfee997c75c39c
SHA51293928d1428f1c87ace3123f489b4e3b4075a51b5f00650a9d27d2f4399bbcb6a08620ba1f6bc1932db4f0e67d204cb1707b125e00614386367258355127ae9fd
-
Filesize
72KB
MD590840066cd6a3e4c5a2de36be9dd89bc
SHA17eb2e2f0f0b3efe1321c68aa76d1237a55e05224
SHA2564813608c61914e215d61f2467a1104b4434525b7040c318901e32eddc24769ef
SHA5120632d1a548d940e8106b9202a886e117c74ad3520b394b08661c81609aec636595329d4d640747a71955003e14e59d644d28642aa210e9c3a7f9460eee6d6c4b
-
Filesize
72KB
MD590840066cd6a3e4c5a2de36be9dd89bc
SHA17eb2e2f0f0b3efe1321c68aa76d1237a55e05224
SHA2564813608c61914e215d61f2467a1104b4434525b7040c318901e32eddc24769ef
SHA5120632d1a548d940e8106b9202a886e117c74ad3520b394b08661c81609aec636595329d4d640747a71955003e14e59d644d28642aa210e9c3a7f9460eee6d6c4b
-
Filesize
72KB
MD53763b435107682301d3a309b27050663
SHA109ec66ef2c33255f23b214e1822869e9ae04f48a
SHA256bca471a3a09d9f63c42239b3fb3e5752ee5683945e5e00fe989ff393d4702d19
SHA5120458cae905668cf8e0d34ae34a5303bcba9dfcad7621a195b2c62d94978551ef6738516ccf3806acc9057702b7260f5544f2b64f5077ccdefb35f6f88b5e0f7f
-
Filesize
72KB
MD53763b435107682301d3a309b27050663
SHA109ec66ef2c33255f23b214e1822869e9ae04f48a
SHA256bca471a3a09d9f63c42239b3fb3e5752ee5683945e5e00fe989ff393d4702d19
SHA5120458cae905668cf8e0d34ae34a5303bcba9dfcad7621a195b2c62d94978551ef6738516ccf3806acc9057702b7260f5544f2b64f5077ccdefb35f6f88b5e0f7f
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD5c3995eba7e6dc4d61e911b6df47b199c
SHA172282537230566b4ce840c46ae2ecda49ca50154
SHA256346596a16d16cf4eb2fb67f436a015fdeb31a3f6de574285f1c9009b13c2fd6a
SHA512917af0f50b72b7a242ebb7ab994889316dd5d327fe638d6fa1b7cb13cca8d8571905c0d79bf904c78fdb2e7f4092055fe288fe3e85c63efc2e33c9c3ce09c59f
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD50e20967385b759742509f48dbab39c6c
SHA1cc4b494605c295f4ff507a83ae65e7019b62bba5
SHA256aa24b1f12547ac8132895a30e84711774fbd110b53fe3cd026a7857d7dba8478
SHA512d799ee4647c8e824b32f9881c12d9038e063dcec3073a63f49b05f07d891d2cea958f2cf63599c74c698d7311c3aaaf1c8c551a2e0ba3362e86b8281b99ac7a5
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD5ed1570029c5fecf35970f7e6dafeefe1
SHA13f1b66cf474bd4c839aabbb76f33d5431a0ba8c9
SHA25641bce8a797c7574f7389a45afeded7f4d41bad810e2735b328084eff405e217b
SHA5120d94783e8f1458bd3ee9b38d0bf4d433935aba377a7fc63ead6756fcde5757fe2ba5f7df2194e5d0280a5759327377be3dee7637c0bcdc550833674e36acb6b2
-
Filesize
72KB
MD59d28bfdc8b271cc8a13adf1f31cc125e
SHA1efb171b3fa58352f0efb8038fce9b25ed931277d
SHA25684258d8276ec67f7812f6a6567b33d361f22ef05d8a2a5d35d09518cf9f6e597
SHA5129a680066e63a30b57db2a6963915de14a65a4064cab6bc09402ed0ccefa788abefe8f5ca2eb79afbda5240b55b3c5feea0c6613bda83fca96cc098cf14bc478f
-
Filesize
72KB
MD59d28bfdc8b271cc8a13adf1f31cc125e
SHA1efb171b3fa58352f0efb8038fce9b25ed931277d
SHA25684258d8276ec67f7812f6a6567b33d361f22ef05d8a2a5d35d09518cf9f6e597
SHA5129a680066e63a30b57db2a6963915de14a65a4064cab6bc09402ed0ccefa788abefe8f5ca2eb79afbda5240b55b3c5feea0c6613bda83fca96cc098cf14bc478f
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e
-
Filesize
72KB
MD5770946603de162ad15394a55e85f5bd9
SHA14718a5c1982d03915831559216aa8a419d5f4b75
SHA256e060fdb1548ad4cc441a672951bdfc0ca1dff20592437cca418d7a1a8d826165
SHA5127e241a55efdf11ab2b5aaf875f393ed4f8876e2ad25a18419873a2016e0df0aaeed678c8aa570e17607c479c04b7b32294d6daea17b0dff7cf56f59f68a20e0e