Analysis
-
max time kernel
124s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe
Resource
win10v2004-20220901-en
General
-
Target
eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe
-
Size
72KB
-
MD5
049856a9ef71da89a9a5ba3ea5d85a61
-
SHA1
9314e65c18ba529a106f79a3caabb02d5111400b
-
SHA256
eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af
-
SHA512
46b57ca4d8daf12fc74a846bab6b5a61c383cbdda1e8745174fe15ee226d5107872760889295a05ef55c3a1cff9fb3c03bb12d1549c3995a18fd7d5a8ba8f744
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2l:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPR
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 58 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 948 backup.exe 568 backup.exe 520 data.exe 544 backup.exe 528 backup.exe 692 backup.exe 1128 backup.exe 1104 backup.exe 1644 backup.exe 1232 backup.exe 1132 backup.exe 1388 update.exe 1764 backup.exe 628 backup.exe 1008 backup.exe 1356 backup.exe 1880 backup.exe 1904 backup.exe 1432 backup.exe 1288 backup.exe 1164 data.exe 568 backup.exe 1588 backup.exe 1592 backup.exe 528 backup.exe 1212 backup.exe 1040 backup.exe 1696 backup.exe 1652 System Restore.exe 1756 backup.exe 280 backup.exe 1524 backup.exe 1836 backup.exe 1496 System Restore.exe 1484 backup.exe 1132 backup.exe 1840 backup.exe 1968 backup.exe 1660 backup.exe 1384 backup.exe 1716 backup.exe 1356 backup.exe 2024 backup.exe 956 update.exe 1284 backup.exe 1004 backup.exe 560 backup.exe 1928 backup.exe 1780 backup.exe 1504 backup.exe 384 backup.exe 1588 backup.exe 1544 backup.exe 1892 backup.exe 428 backup.exe 1436 backup.exe 1948 backup.exe 1756 backup.exe 864 backup.exe 1836 backup.exe 1920 backup.exe 1764 backup.exe 1132 backup.exe 676 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 520 data.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 520 data.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 692 backup.exe 692 backup.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 520 data.exe 520 data.exe 1232 backup.exe 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 1232 backup.exe 1132 backup.exe 1132 backup.exe 1388 update.exe 1388 update.exe 1388 update.exe 1232 backup.exe 1232 backup.exe 628 backup.exe 628 backup.exe 1008 backup.exe 1008 backup.exe 1008 backup.exe 1008 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1652 System Restore.exe 1652 System Restore.exe 1652 System Restore.exe 1652 System Restore.exe 1652 System Restore.exe 1652 System Restore.exe -
Drops file in Program Files directory 54 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\System Restore.exe System Restore.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe data.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe -
Suspicious use of SetWindowsHookEx 63 IoCs
pid Process 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 948 backup.exe 568 backup.exe 520 data.exe 544 backup.exe 528 backup.exe 692 backup.exe 1128 backup.exe 1104 backup.exe 1644 backup.exe 1232 backup.exe 1132 backup.exe 1764 backup.exe 1388 update.exe 628 backup.exe 1008 backup.exe 1356 backup.exe 1880 backup.exe 1904 backup.exe 1432 backup.exe 1288 backup.exe 1164 data.exe 568 backup.exe 1588 backup.exe 1592 backup.exe 528 backup.exe 1212 backup.exe 1040 backup.exe 1696 backup.exe 1652 System Restore.exe 1756 backup.exe 280 backup.exe 1524 backup.exe 1836 backup.exe 1496 System Restore.exe 1484 backup.exe 1132 backup.exe 1840 backup.exe 1384 backup.exe 1968 backup.exe 1660 backup.exe 1716 backup.exe 1356 backup.exe 2024 backup.exe 956 update.exe 1284 backup.exe 1004 backup.exe 1928 backup.exe 384 backup.exe 1588 backup.exe 560 backup.exe 1780 backup.exe 1504 backup.exe 1892 backup.exe 1544 backup.exe 428 backup.exe 1436 backup.exe 1948 backup.exe 1920 backup.exe 864 backup.exe 1836 backup.exe 1764 backup.exe 968 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 948 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 28 PID 1428 wrote to memory of 948 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 28 PID 1428 wrote to memory of 948 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 28 PID 1428 wrote to memory of 948 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 28 PID 1428 wrote to memory of 568 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 29 PID 1428 wrote to memory of 568 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 29 PID 1428 wrote to memory of 568 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 29 PID 1428 wrote to memory of 568 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 29 PID 948 wrote to memory of 520 948 backup.exe 30 PID 948 wrote to memory of 520 948 backup.exe 30 PID 948 wrote to memory of 520 948 backup.exe 30 PID 948 wrote to memory of 520 948 backup.exe 30 PID 1428 wrote to memory of 544 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 31 PID 1428 wrote to memory of 544 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 31 PID 1428 wrote to memory of 544 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 31 PID 1428 wrote to memory of 544 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 31 PID 1428 wrote to memory of 528 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 32 PID 1428 wrote to memory of 528 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 32 PID 1428 wrote to memory of 528 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 32 PID 1428 wrote to memory of 528 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 32 PID 520 wrote to memory of 692 520 data.exe 33 PID 520 wrote to memory of 692 520 data.exe 33 PID 520 wrote to memory of 692 520 data.exe 33 PID 520 wrote to memory of 692 520 data.exe 33 PID 1428 wrote to memory of 1128 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 34 PID 1428 wrote to memory of 1128 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 34 PID 1428 wrote to memory of 1128 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 34 PID 1428 wrote to memory of 1128 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 34 PID 692 wrote to memory of 1104 692 backup.exe 35 PID 692 wrote to memory of 1104 692 backup.exe 35 PID 692 wrote to memory of 1104 692 backup.exe 35 PID 692 wrote to memory of 1104 692 backup.exe 35 PID 1428 wrote to memory of 1644 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 36 PID 1428 wrote to memory of 1644 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 36 PID 1428 wrote to memory of 1644 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 36 PID 1428 wrote to memory of 1644 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 36 PID 520 wrote to memory of 1232 520 data.exe 37 PID 520 wrote to memory of 1232 520 data.exe 37 PID 520 wrote to memory of 1232 520 data.exe 37 PID 520 wrote to memory of 1232 520 data.exe 37 PID 1232 wrote to memory of 1132 1232 backup.exe 39 PID 1232 wrote to memory of 1132 1232 backup.exe 39 PID 1232 wrote to memory of 1132 1232 backup.exe 39 PID 1232 wrote to memory of 1132 1232 backup.exe 39 PID 1428 wrote to memory of 1388 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 38 PID 1428 wrote to memory of 1388 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 38 PID 1428 wrote to memory of 1388 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 38 PID 1428 wrote to memory of 1388 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 38 PID 1428 wrote to memory of 1388 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 38 PID 1428 wrote to memory of 1388 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 38 PID 1428 wrote to memory of 1388 1428 eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe 38 PID 1132 wrote to memory of 1764 1132 backup.exe 40 PID 1132 wrote to memory of 1764 1132 backup.exe 40 PID 1132 wrote to memory of 1764 1132 backup.exe 40 PID 1132 wrote to memory of 1764 1132 backup.exe 40 PID 1232 wrote to memory of 628 1232 backup.exe 41 PID 1232 wrote to memory of 628 1232 backup.exe 41 PID 1232 wrote to memory of 628 1232 backup.exe 41 PID 1232 wrote to memory of 628 1232 backup.exe 41 PID 628 wrote to memory of 1008 628 backup.exe 42 PID 628 wrote to memory of 1008 628 backup.exe 42 PID 628 wrote to memory of 1008 628 backup.exe 42 PID 628 wrote to memory of 1008 628 backup.exe 42 PID 1008 wrote to memory of 1356 1008 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe"C:\Users\Admin\AppData\Local\Temp\eed9f50bd1f70065644d382a18e6a9642b9846cf966b0a5665e6823ea344d3af.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\200531775\backup.exeC:\Users\Admin\AppData\Local\Temp\200531775\backup.exe C:\Users\Admin\AppData\Local\Temp\200531775\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\data.exe\data.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:520 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1104
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1232 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1132 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1008 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1880 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1288
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1040
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1652 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1756
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:280
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1836
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1356
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Suspicious use of SetWindowsHookEx
PID:968
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1780
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:428
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
PID:676
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:1888
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:384
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1080
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1040
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1356
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1840 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1004 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:560 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1920
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
PID:1132
-
-
-
-
C:\Program Files (x86)\Common Files\update.exe"C:\Program Files (x86)\Common Files\update.exe" C:\Program Files (x86)\Common Files\5⤵PID:1940
-
-
-
C:\Users\update.exeC:\Users\update.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
PID:1756
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:916
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5cb2fecd0a40cacd12debb8b863a8821c
SHA1987587f32dafa7f3ee0dab19d1487554e096bc1d
SHA2564c2999be817a6f13fea1fe01e0502f89e4829f1cb28a036947b07132c593d543
SHA5124e253d619f86ed7bc2ebe80b9a96c645993ba97747327bcc566e4a2ba30dacc61c6b1b7fd75655fa3178cb8c03fa63006d4832f5ed8c46b38ababf85832365f1
-
Filesize
72KB
MD5e8c926c7399486f2ab7e34805011bff3
SHA120284802abca27672b8ef1bec72f359771da0501
SHA256edb722cab4506bc017b63ca51f3ad944286bf976ab2b9f5fe69e418e8e7c7d6d
SHA512e520b503630481acb8817da392e6a11d60d5424118b74f653a5030a01b397aa6270c12b6f6864ebe40f50e571cccbffabfbf3c79bea896540ce7c181d80de127
-
Filesize
72KB
MD5e8c926c7399486f2ab7e34805011bff3
SHA120284802abca27672b8ef1bec72f359771da0501
SHA256edb722cab4506bc017b63ca51f3ad944286bf976ab2b9f5fe69e418e8e7c7d6d
SHA512e520b503630481acb8817da392e6a11d60d5424118b74f653a5030a01b397aa6270c12b6f6864ebe40f50e571cccbffabfbf3c79bea896540ce7c181d80de127
-
Filesize
72KB
MD56bcfcb462469c66eacf668e3c5b0a3f9
SHA1bcf1b0ffa474dcfd0a0f4774be96933495e2a7bf
SHA256cf904c03e977cb405c9ebac1e99b384a879db478223bd011820904996da4ad55
SHA5127f820290061e86e1c8cde3ff68f0f37a990fc54e656e6a272a358e6561403a5c82b2125c79128f82ddd28d2edd4642562a4767d946d8a25baead6c9df694c98a
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD5571a2a14172759399ef9be3454bb6538
SHA13291c361786d37cfde5bc557c8a8ade230633740
SHA2566bc39c8ce6b5da86cfc2aac01028eab55786a9edc4c2f096e45b656f3bf422e5
SHA5127ea116b28191b6b0bb92beef863255df027040dd8b73958fd060f79ddae69de1c25e614723e8a6d043199b967c28e7ca49d0e4ef5b4ee90b2357ed524adf1c0a
-
Filesize
72KB
MD56bcfcb462469c66eacf668e3c5b0a3f9
SHA1bcf1b0ffa474dcfd0a0f4774be96933495e2a7bf
SHA256cf904c03e977cb405c9ebac1e99b384a879db478223bd011820904996da4ad55
SHA5127f820290061e86e1c8cde3ff68f0f37a990fc54e656e6a272a358e6561403a5c82b2125c79128f82ddd28d2edd4642562a4767d946d8a25baead6c9df694c98a
-
Filesize
72KB
MD56bcfcb462469c66eacf668e3c5b0a3f9
SHA1bcf1b0ffa474dcfd0a0f4774be96933495e2a7bf
SHA256cf904c03e977cb405c9ebac1e99b384a879db478223bd011820904996da4ad55
SHA5127f820290061e86e1c8cde3ff68f0f37a990fc54e656e6a272a358e6561403a5c82b2125c79128f82ddd28d2edd4642562a4767d946d8a25baead6c9df694c98a
-
Filesize
72KB
MD5c4b8d863e0e5ddb66b27032cbf74f6f3
SHA17f67c4310affcd178a61087d4d502e52df486372
SHA25665cecb9dc6dad89cf322a2ad9e6cbfd80d50b35d51937103ef87b194be59183f
SHA5120b73a76e48489bc144fc7c8b505c2fe7b9e46d4b4e51fd18a8ee9aa7aa56c1b31b2bdb70ebc3db32f327374fa184302ce5bda3ac243a27e329387acc99f17ed5
-
Filesize
72KB
MD53bf48bec1a6775d093319b80d51ddd1c
SHA1fac434785ed987e22ede568a55e7575b8d008b21
SHA2562766335eb100e8a6d637535fcd6eb8611646b541a8571051dd33e05cf7bf2d85
SHA5125545d44759e2cfb7c9bcaa4e8e88e31a5e3e0f71cc4488d20454a64fd4fdc8cfc2a335c27318699dcf7a115743a0a5a0fbc27ef5bd369fb70bcce9c8f67a9059
-
Filesize
72KB
MD53bf48bec1a6775d093319b80d51ddd1c
SHA1fac434785ed987e22ede568a55e7575b8d008b21
SHA2562766335eb100e8a6d637535fcd6eb8611646b541a8571051dd33e05cf7bf2d85
SHA5125545d44759e2cfb7c9bcaa4e8e88e31a5e3e0f71cc4488d20454a64fd4fdc8cfc2a335c27318699dcf7a115743a0a5a0fbc27ef5bd369fb70bcce9c8f67a9059
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD51dde59f69040bd1e20a45accdcfd9a75
SHA1c154a30897711ab5110ed37f6775293c5dd0b034
SHA2567bbd2ebf1bf8691676656c952df01e2313739476ecfeaf6f29ad4a4a422a1739
SHA5120fb305b66177461fde05b96a600ade7de1aadecc3e818927ab8588b3b3e4618574b8e7933e4b8d24d2fa96e82a1c37a6daa49d6cb12d1b63deb0f2dc8cbb59d6
-
Filesize
72KB
MD51dde59f69040bd1e20a45accdcfd9a75
SHA1c154a30897711ab5110ed37f6775293c5dd0b034
SHA2567bbd2ebf1bf8691676656c952df01e2313739476ecfeaf6f29ad4a4a422a1739
SHA5120fb305b66177461fde05b96a600ade7de1aadecc3e818927ab8588b3b3e4618574b8e7933e4b8d24d2fa96e82a1c37a6daa49d6cb12d1b63deb0f2dc8cbb59d6
-
Filesize
72KB
MD50890f38047497a26c945558946fd0ca8
SHA1f58393d6c0402645573ec0ed017b6775b088261e
SHA256000bd77f6575c77da39d5cf1a479cf7b0996c6e8e07d8e72108f45ca3aa9952a
SHA5127e059fc97f8edf41e6cd6339cafcb40f8a4bbff0349899cdf802d6e90361d3042e72d5663537476584ec6269ebba8644145761c078575a2cfd168862a5657939
-
Filesize
72KB
MD50890f38047497a26c945558946fd0ca8
SHA1f58393d6c0402645573ec0ed017b6775b088261e
SHA256000bd77f6575c77da39d5cf1a479cf7b0996c6e8e07d8e72108f45ca3aa9952a
SHA5127e059fc97f8edf41e6cd6339cafcb40f8a4bbff0349899cdf802d6e90361d3042e72d5663537476584ec6269ebba8644145761c078575a2cfd168862a5657939
-
Filesize
72KB
MD50d79cba561f9132b8490d380e55a64ae
SHA1883dca0c38c2fc9b4d1ee2013db998a536e4bb6a
SHA256c638196648a817df34d3d790b45ebddf6a153238158a33ac5999f548f0bf4aea
SHA512d128979f7f5e487ea2af3a6c79008e4ab88ead1b9fde94fb50b98ab0c1d86d5d5d4ab09671b34da504bccb773a4fffdfdfb3992e44f1f7aabb5b9346ee23c326
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD532c4d82634d6f40344492c9ba52422c5
SHA18b653e017323e044403d79337966a42d872445ee
SHA256e4327d0f7d761932a4119bb96ce7d74b03ed9e519c79e10c905c0381e6d1bee5
SHA512d516f9bb01d92c4070200f86fbf813d23f6c9da5fd9b829222fd9a07614d56b8a7b1da10cb83b6fc42fd3b53ca0ebeed087207a1bceec38eb19b97fcee3603fe
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD524b5ee9cf3cc13c2d88c8c426993d6fb
SHA1a0d67d33033ea919feb2d091370a59912782e057
SHA25613badd588d541739b9577cc2b03d20ebb5853dbf6f474b370b630f6e46fdb404
SHA512d42501a828c9e2fb21ccda37bf1fbed58f4d20c81b4dbebb2568e6829221cf475db84b34fec9e81ac05c942c7b52f17a3bd1b5405b0d761b150bf412c557d9cb
-
Filesize
72KB
MD55bff825d71c1da013e76558d6add0731
SHA1a489bd418782f00d197ebe42ae67e358ca416f37
SHA2564612259b5c7a3d4554a28ee8876703b6ef82974aafb67521375f5eecce6d8f9f
SHA5125cb2d3d3648d655d989684ddd9aa2ce4fc7686c213dcef665addababb72dbc5c8277c9021a9b9b9e77fdb4bd4f26eea7a507a4bda788973cf0cc604ebdca1e55
-
Filesize
72KB
MD55bff825d71c1da013e76558d6add0731
SHA1a489bd418782f00d197ebe42ae67e358ca416f37
SHA2564612259b5c7a3d4554a28ee8876703b6ef82974aafb67521375f5eecce6d8f9f
SHA5125cb2d3d3648d655d989684ddd9aa2ce4fc7686c213dcef665addababb72dbc5c8277c9021a9b9b9e77fdb4bd4f26eea7a507a4bda788973cf0cc604ebdca1e55
-
Filesize
72KB
MD5daf2c64f7774f7064094c51106049455
SHA170931281f136502dbc1522e60dabf7c8b726894d
SHA25680b164941bce51b96f5d21c8e7eb275d20b256772e1838d89df2f626bc92d278
SHA5123d32ada7808e49c1cbcc14b967a798405ede4d5842763db67ac3c22f82e3994b95c9e6c9b9a3b483b4e465202b1e43624a781d41dd07194a98ed4f8e246dfe0e
-
Filesize
72KB
MD524b5ee9cf3cc13c2d88c8c426993d6fb
SHA1a0d67d33033ea919feb2d091370a59912782e057
SHA25613badd588d541739b9577cc2b03d20ebb5853dbf6f474b370b630f6e46fdb404
SHA512d42501a828c9e2fb21ccda37bf1fbed58f4d20c81b4dbebb2568e6829221cf475db84b34fec9e81ac05c942c7b52f17a3bd1b5405b0d761b150bf412c557d9cb
-
Filesize
72KB
MD51ad277cf4960ea444304b8773a94b9aa
SHA1f389197726d18c48b44d66e24224e23b1f035fc8
SHA25674310626d547f528fee9f61d0e43c6ebb15fcb30e18e47c75e5af8f5e90fbeb3
SHA512b3e3a00107c6bd653c4d184441503528190e30f643b7846cf3315ff9a00969121904de60a6d9bbd22ff751bc77db3e9b0a50a00c5df6efa9687e81d37b6f123b
-
Filesize
72KB
MD51ad277cf4960ea444304b8773a94b9aa
SHA1f389197726d18c48b44d66e24224e23b1f035fc8
SHA25674310626d547f528fee9f61d0e43c6ebb15fcb30e18e47c75e5af8f5e90fbeb3
SHA512b3e3a00107c6bd653c4d184441503528190e30f643b7846cf3315ff9a00969121904de60a6d9bbd22ff751bc77db3e9b0a50a00c5df6efa9687e81d37b6f123b
-
Filesize
72KB
MD5cb2fecd0a40cacd12debb8b863a8821c
SHA1987587f32dafa7f3ee0dab19d1487554e096bc1d
SHA2564c2999be817a6f13fea1fe01e0502f89e4829f1cb28a036947b07132c593d543
SHA5124e253d619f86ed7bc2ebe80b9a96c645993ba97747327bcc566e4a2ba30dacc61c6b1b7fd75655fa3178cb8c03fa63006d4832f5ed8c46b38ababf85832365f1
-
Filesize
72KB
MD5cb2fecd0a40cacd12debb8b863a8821c
SHA1987587f32dafa7f3ee0dab19d1487554e096bc1d
SHA2564c2999be817a6f13fea1fe01e0502f89e4829f1cb28a036947b07132c593d543
SHA5124e253d619f86ed7bc2ebe80b9a96c645993ba97747327bcc566e4a2ba30dacc61c6b1b7fd75655fa3178cb8c03fa63006d4832f5ed8c46b38ababf85832365f1
-
Filesize
72KB
MD5e8c926c7399486f2ab7e34805011bff3
SHA120284802abca27672b8ef1bec72f359771da0501
SHA256edb722cab4506bc017b63ca51f3ad944286bf976ab2b9f5fe69e418e8e7c7d6d
SHA512e520b503630481acb8817da392e6a11d60d5424118b74f653a5030a01b397aa6270c12b6f6864ebe40f50e571cccbffabfbf3c79bea896540ce7c181d80de127
-
Filesize
72KB
MD5e8c926c7399486f2ab7e34805011bff3
SHA120284802abca27672b8ef1bec72f359771da0501
SHA256edb722cab4506bc017b63ca51f3ad944286bf976ab2b9f5fe69e418e8e7c7d6d
SHA512e520b503630481acb8817da392e6a11d60d5424118b74f653a5030a01b397aa6270c12b6f6864ebe40f50e571cccbffabfbf3c79bea896540ce7c181d80de127
-
Filesize
72KB
MD56bcfcb462469c66eacf668e3c5b0a3f9
SHA1bcf1b0ffa474dcfd0a0f4774be96933495e2a7bf
SHA256cf904c03e977cb405c9ebac1e99b384a879db478223bd011820904996da4ad55
SHA5127f820290061e86e1c8cde3ff68f0f37a990fc54e656e6a272a358e6561403a5c82b2125c79128f82ddd28d2edd4642562a4767d946d8a25baead6c9df694c98a
-
Filesize
72KB
MD56bcfcb462469c66eacf668e3c5b0a3f9
SHA1bcf1b0ffa474dcfd0a0f4774be96933495e2a7bf
SHA256cf904c03e977cb405c9ebac1e99b384a879db478223bd011820904996da4ad55
SHA5127f820290061e86e1c8cde3ff68f0f37a990fc54e656e6a272a358e6561403a5c82b2125c79128f82ddd28d2edd4642562a4767d946d8a25baead6c9df694c98a
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD5571a2a14172759399ef9be3454bb6538
SHA13291c361786d37cfde5bc557c8a8ade230633740
SHA2566bc39c8ce6b5da86cfc2aac01028eab55786a9edc4c2f096e45b656f3bf422e5
SHA5127ea116b28191b6b0bb92beef863255df027040dd8b73958fd060f79ddae69de1c25e614723e8a6d043199b967c28e7ca49d0e4ef5b4ee90b2357ed524adf1c0a
-
Filesize
72KB
MD5571a2a14172759399ef9be3454bb6538
SHA13291c361786d37cfde5bc557c8a8ade230633740
SHA2566bc39c8ce6b5da86cfc2aac01028eab55786a9edc4c2f096e45b656f3bf422e5
SHA5127ea116b28191b6b0bb92beef863255df027040dd8b73958fd060f79ddae69de1c25e614723e8a6d043199b967c28e7ca49d0e4ef5b4ee90b2357ed524adf1c0a
-
Filesize
72KB
MD56bcfcb462469c66eacf668e3c5b0a3f9
SHA1bcf1b0ffa474dcfd0a0f4774be96933495e2a7bf
SHA256cf904c03e977cb405c9ebac1e99b384a879db478223bd011820904996da4ad55
SHA5127f820290061e86e1c8cde3ff68f0f37a990fc54e656e6a272a358e6561403a5c82b2125c79128f82ddd28d2edd4642562a4767d946d8a25baead6c9df694c98a
-
Filesize
72KB
MD56bcfcb462469c66eacf668e3c5b0a3f9
SHA1bcf1b0ffa474dcfd0a0f4774be96933495e2a7bf
SHA256cf904c03e977cb405c9ebac1e99b384a879db478223bd011820904996da4ad55
SHA5127f820290061e86e1c8cde3ff68f0f37a990fc54e656e6a272a358e6561403a5c82b2125c79128f82ddd28d2edd4642562a4767d946d8a25baead6c9df694c98a
-
Filesize
72KB
MD5c4b8d863e0e5ddb66b27032cbf74f6f3
SHA17f67c4310affcd178a61087d4d502e52df486372
SHA25665cecb9dc6dad89cf322a2ad9e6cbfd80d50b35d51937103ef87b194be59183f
SHA5120b73a76e48489bc144fc7c8b505c2fe7b9e46d4b4e51fd18a8ee9aa7aa56c1b31b2bdb70ebc3db32f327374fa184302ce5bda3ac243a27e329387acc99f17ed5
-
Filesize
72KB
MD5c4b8d863e0e5ddb66b27032cbf74f6f3
SHA17f67c4310affcd178a61087d4d502e52df486372
SHA25665cecb9dc6dad89cf322a2ad9e6cbfd80d50b35d51937103ef87b194be59183f
SHA5120b73a76e48489bc144fc7c8b505c2fe7b9e46d4b4e51fd18a8ee9aa7aa56c1b31b2bdb70ebc3db32f327374fa184302ce5bda3ac243a27e329387acc99f17ed5
-
Filesize
72KB
MD53bf48bec1a6775d093319b80d51ddd1c
SHA1fac434785ed987e22ede568a55e7575b8d008b21
SHA2562766335eb100e8a6d637535fcd6eb8611646b541a8571051dd33e05cf7bf2d85
SHA5125545d44759e2cfb7c9bcaa4e8e88e31a5e3e0f71cc4488d20454a64fd4fdc8cfc2a335c27318699dcf7a115743a0a5a0fbc27ef5bd369fb70bcce9c8f67a9059
-
Filesize
72KB
MD53bf48bec1a6775d093319b80d51ddd1c
SHA1fac434785ed987e22ede568a55e7575b8d008b21
SHA2562766335eb100e8a6d637535fcd6eb8611646b541a8571051dd33e05cf7bf2d85
SHA5125545d44759e2cfb7c9bcaa4e8e88e31a5e3e0f71cc4488d20454a64fd4fdc8cfc2a335c27318699dcf7a115743a0a5a0fbc27ef5bd369fb70bcce9c8f67a9059
-
Filesize
72KB
MD5c4b8d863e0e5ddb66b27032cbf74f6f3
SHA17f67c4310affcd178a61087d4d502e52df486372
SHA25665cecb9dc6dad89cf322a2ad9e6cbfd80d50b35d51937103ef87b194be59183f
SHA5120b73a76e48489bc144fc7c8b505c2fe7b9e46d4b4e51fd18a8ee9aa7aa56c1b31b2bdb70ebc3db32f327374fa184302ce5bda3ac243a27e329387acc99f17ed5
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD55900a94a57fee19d96fc51a3c3d18e3c
SHA1d527ab52708ff898938ce9f5c298f4f17cf8ef7f
SHA2566efc77bfb4344bce64bdd80e7f80baf34b7d681611bf2f9cdf9639f431501d43
SHA512f184a1d4729cd208c57f4cf157f9d3dac3ced2c9c49c5d0fa160e44eb66cadddd6f23657fdd301397054d2d039a6240d198c900a87862917e202a74fa689fea6
-
Filesize
72KB
MD51dde59f69040bd1e20a45accdcfd9a75
SHA1c154a30897711ab5110ed37f6775293c5dd0b034
SHA2567bbd2ebf1bf8691676656c952df01e2313739476ecfeaf6f29ad4a4a422a1739
SHA5120fb305b66177461fde05b96a600ade7de1aadecc3e818927ab8588b3b3e4618574b8e7933e4b8d24d2fa96e82a1c37a6daa49d6cb12d1b63deb0f2dc8cbb59d6
-
Filesize
72KB
MD51dde59f69040bd1e20a45accdcfd9a75
SHA1c154a30897711ab5110ed37f6775293c5dd0b034
SHA2567bbd2ebf1bf8691676656c952df01e2313739476ecfeaf6f29ad4a4a422a1739
SHA5120fb305b66177461fde05b96a600ade7de1aadecc3e818927ab8588b3b3e4618574b8e7933e4b8d24d2fa96e82a1c37a6daa49d6cb12d1b63deb0f2dc8cbb59d6
-
Filesize
72KB
MD50890f38047497a26c945558946fd0ca8
SHA1f58393d6c0402645573ec0ed017b6775b088261e
SHA256000bd77f6575c77da39d5cf1a479cf7b0996c6e8e07d8e72108f45ca3aa9952a
SHA5127e059fc97f8edf41e6cd6339cafcb40f8a4bbff0349899cdf802d6e90361d3042e72d5663537476584ec6269ebba8644145761c078575a2cfd168862a5657939
-
Filesize
72KB
MD50890f38047497a26c945558946fd0ca8
SHA1f58393d6c0402645573ec0ed017b6775b088261e
SHA256000bd77f6575c77da39d5cf1a479cf7b0996c6e8e07d8e72108f45ca3aa9952a
SHA5127e059fc97f8edf41e6cd6339cafcb40f8a4bbff0349899cdf802d6e90361d3042e72d5663537476584ec6269ebba8644145761c078575a2cfd168862a5657939
-
Filesize
72KB
MD50d79cba561f9132b8490d380e55a64ae
SHA1883dca0c38c2fc9b4d1ee2013db998a536e4bb6a
SHA256c638196648a817df34d3d790b45ebddf6a153238158a33ac5999f548f0bf4aea
SHA512d128979f7f5e487ea2af3a6c79008e4ab88ead1b9fde94fb50b98ab0c1d86d5d5d4ab09671b34da504bccb773a4fffdfdfb3992e44f1f7aabb5b9346ee23c326
-
Filesize
72KB
MD50d79cba561f9132b8490d380e55a64ae
SHA1883dca0c38c2fc9b4d1ee2013db998a536e4bb6a
SHA256c638196648a817df34d3d790b45ebddf6a153238158a33ac5999f548f0bf4aea
SHA512d128979f7f5e487ea2af3a6c79008e4ab88ead1b9fde94fb50b98ab0c1d86d5d5d4ab09671b34da504bccb773a4fffdfdfb3992e44f1f7aabb5b9346ee23c326
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD532c4d82634d6f40344492c9ba52422c5
SHA18b653e017323e044403d79337966a42d872445ee
SHA256e4327d0f7d761932a4119bb96ce7d74b03ed9e519c79e10c905c0381e6d1bee5
SHA512d516f9bb01d92c4070200f86fbf813d23f6c9da5fd9b829222fd9a07614d56b8a7b1da10cb83b6fc42fd3b53ca0ebeed087207a1bceec38eb19b97fcee3603fe
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD532c4d82634d6f40344492c9ba52422c5
SHA18b653e017323e044403d79337966a42d872445ee
SHA256e4327d0f7d761932a4119bb96ce7d74b03ed9e519c79e10c905c0381e6d1bee5
SHA512d516f9bb01d92c4070200f86fbf813d23f6c9da5fd9b829222fd9a07614d56b8a7b1da10cb83b6fc42fd3b53ca0ebeed087207a1bceec38eb19b97fcee3603fe
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD524b5ee9cf3cc13c2d88c8c426993d6fb
SHA1a0d67d33033ea919feb2d091370a59912782e057
SHA25613badd588d541739b9577cc2b03d20ebb5853dbf6f474b370b630f6e46fdb404
SHA512d42501a828c9e2fb21ccda37bf1fbed58f4d20c81b4dbebb2568e6829221cf475db84b34fec9e81ac05c942c7b52f17a3bd1b5405b0d761b150bf412c557d9cb
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD524b5ee9cf3cc13c2d88c8c426993d6fb
SHA1a0d67d33033ea919feb2d091370a59912782e057
SHA25613badd588d541739b9577cc2b03d20ebb5853dbf6f474b370b630f6e46fdb404
SHA512d42501a828c9e2fb21ccda37bf1fbed58f4d20c81b4dbebb2568e6829221cf475db84b34fec9e81ac05c942c7b52f17a3bd1b5405b0d761b150bf412c557d9cb
-
Filesize
72KB
MD55bff825d71c1da013e76558d6add0731
SHA1a489bd418782f00d197ebe42ae67e358ca416f37
SHA2564612259b5c7a3d4554a28ee8876703b6ef82974aafb67521375f5eecce6d8f9f
SHA5125cb2d3d3648d655d989684ddd9aa2ce4fc7686c213dcef665addababb72dbc5c8277c9021a9b9b9e77fdb4bd4f26eea7a507a4bda788973cf0cc604ebdca1e55
-
Filesize
72KB
MD55bff825d71c1da013e76558d6add0731
SHA1a489bd418782f00d197ebe42ae67e358ca416f37
SHA2564612259b5c7a3d4554a28ee8876703b6ef82974aafb67521375f5eecce6d8f9f
SHA5125cb2d3d3648d655d989684ddd9aa2ce4fc7686c213dcef665addababb72dbc5c8277c9021a9b9b9e77fdb4bd4f26eea7a507a4bda788973cf0cc604ebdca1e55
-
Filesize
72KB
MD55bff825d71c1da013e76558d6add0731
SHA1a489bd418782f00d197ebe42ae67e358ca416f37
SHA2564612259b5c7a3d4554a28ee8876703b6ef82974aafb67521375f5eecce6d8f9f
SHA5125cb2d3d3648d655d989684ddd9aa2ce4fc7686c213dcef665addababb72dbc5c8277c9021a9b9b9e77fdb4bd4f26eea7a507a4bda788973cf0cc604ebdca1e55
-
Filesize
72KB
MD55bff825d71c1da013e76558d6add0731
SHA1a489bd418782f00d197ebe42ae67e358ca416f37
SHA2564612259b5c7a3d4554a28ee8876703b6ef82974aafb67521375f5eecce6d8f9f
SHA5125cb2d3d3648d655d989684ddd9aa2ce4fc7686c213dcef665addababb72dbc5c8277c9021a9b9b9e77fdb4bd4f26eea7a507a4bda788973cf0cc604ebdca1e55
-
Filesize
72KB
MD5daf2c64f7774f7064094c51106049455
SHA170931281f136502dbc1522e60dabf7c8b726894d
SHA25680b164941bce51b96f5d21c8e7eb275d20b256772e1838d89df2f626bc92d278
SHA5123d32ada7808e49c1cbcc14b967a798405ede4d5842763db67ac3c22f82e3994b95c9e6c9b9a3b483b4e465202b1e43624a781d41dd07194a98ed4f8e246dfe0e
-
Filesize
72KB
MD5daf2c64f7774f7064094c51106049455
SHA170931281f136502dbc1522e60dabf7c8b726894d
SHA25680b164941bce51b96f5d21c8e7eb275d20b256772e1838d89df2f626bc92d278
SHA5123d32ada7808e49c1cbcc14b967a798405ede4d5842763db67ac3c22f82e3994b95c9e6c9b9a3b483b4e465202b1e43624a781d41dd07194a98ed4f8e246dfe0e
-
Filesize
72KB
MD524b5ee9cf3cc13c2d88c8c426993d6fb
SHA1a0d67d33033ea919feb2d091370a59912782e057
SHA25613badd588d541739b9577cc2b03d20ebb5853dbf6f474b370b630f6e46fdb404
SHA512d42501a828c9e2fb21ccda37bf1fbed58f4d20c81b4dbebb2568e6829221cf475db84b34fec9e81ac05c942c7b52f17a3bd1b5405b0d761b150bf412c557d9cb
-
Filesize
72KB
MD524b5ee9cf3cc13c2d88c8c426993d6fb
SHA1a0d67d33033ea919feb2d091370a59912782e057
SHA25613badd588d541739b9577cc2b03d20ebb5853dbf6f474b370b630f6e46fdb404
SHA512d42501a828c9e2fb21ccda37bf1fbed58f4d20c81b4dbebb2568e6829221cf475db84b34fec9e81ac05c942c7b52f17a3bd1b5405b0d761b150bf412c557d9cb