Analysis
-
max time kernel
142s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe
Resource
win10v2004-20220812-en
General
-
Target
0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe
-
Size
72KB
-
MD5
047bf52f6ccfc16397f6e3db77242752
-
SHA1
e01193029850e51ea11d92858e2d845420f26b0c
-
SHA256
0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe
-
SHA512
e6c4768f31794da1d9796b5ae5d60fc41023376b9b9f9ed1af0451b783dfc55fa7cbaf20822c1d42022d6ecb916d903eea5af729db7a4b6522c247e5289bbf10
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2I:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP8
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 50 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 852 backup.exe 1992 backup.exe 1980 backup.exe 2016 backup.exe 1768 System Restore.exe 1492 backup.exe 876 System Restore.exe 2004 backup.exe 1404 backup.exe 776 backup.exe 1528 backup.exe 468 backup.exe 940 backup.exe 1420 backup.exe 1912 backup.exe 944 backup.exe 1660 backup.exe 1836 backup.exe 1108 backup.exe 2020 backup.exe 2036 backup.exe 1180 backup.exe 1976 backup.exe 276 backup.exe 1956 backup.exe 1692 update.exe 1768 backup.exe 688 backup.exe 1208 backup.exe 1428 backup.exe 1408 backup.exe 1316 backup.exe 1960 backup.exe 672 backup.exe 1404 backup.exe 1664 backup.exe 1248 backup.exe 528 backup.exe 1544 backup.exe 940 backup.exe 1388 backup.exe 1616 backup.exe 1504 backup.exe 340 backup.exe 1500 backup.exe 1604 backup.exe 1580 backup.exe 1696 backup.exe 1612 backup.exe 2028 backup.exe 1628 backup.exe 1716 backup.exe 1180 backup.exe 1212 update.exe 276 backup.exe 1496 backup.exe 1956 backup.exe 1576 update.exe 876 backup.exe 1220 backup.exe 1492 backup.exe 1076 data.exe 556 data.exe 1036 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 2016 backup.exe 2016 backup.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1492 backup.exe 1492 backup.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 2016 backup.exe 2016 backup.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 776 backup.exe 776 backup.exe 468 backup.exe 468 backup.exe 776 backup.exe 776 backup.exe 1420 backup.exe 1420 backup.exe 1912 backup.exe 1912 backup.exe 1912 backup.exe 1912 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1692 update.exe 1692 update.exe 1692 update.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1660 backup.exe 1208 backup.exe 1208 backup.exe 1208 backup.exe 1208 backup.exe 1208 backup.exe 1208 backup.exe -
Drops file in Program Files directory 54 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\data.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe -
Suspicious use of SetWindowsHookEx 63 IoCs
pid Process 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 852 backup.exe 1992 backup.exe 2016 backup.exe 1980 backup.exe 1768 System Restore.exe 1492 backup.exe 876 System Restore.exe 2004 backup.exe 1404 backup.exe 776 backup.exe 1528 backup.exe 468 backup.exe 940 backup.exe 1420 backup.exe 1912 backup.exe 944 backup.exe 1660 backup.exe 1108 backup.exe 2020 backup.exe 2036 backup.exe 1180 backup.exe 1976 backup.exe 276 backup.exe 1956 backup.exe 1692 update.exe 1768 backup.exe 688 backup.exe 1208 backup.exe 1428 backup.exe 1408 backup.exe 1316 backup.exe 1960 backup.exe 672 backup.exe 1404 backup.exe 1664 backup.exe 1248 backup.exe 528 backup.exe 1544 backup.exe 940 backup.exe 1388 backup.exe 1616 backup.exe 1504 backup.exe 340 backup.exe 1500 backup.exe 1604 backup.exe 1696 backup.exe 1612 backup.exe 2028 backup.exe 1628 backup.exe 1180 backup.exe 1716 backup.exe 1576 update.exe 1956 backup.exe 1496 backup.exe 1212 update.exe 276 backup.exe 876 backup.exe 1220 backup.exe 556 data.exe 1492 backup.exe 1076 data.exe 1036 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 852 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 27 PID 1896 wrote to memory of 852 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 27 PID 1896 wrote to memory of 852 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 27 PID 1896 wrote to memory of 852 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 27 PID 1896 wrote to memory of 1992 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 28 PID 1896 wrote to memory of 1992 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 28 PID 1896 wrote to memory of 1992 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 28 PID 1896 wrote to memory of 1992 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 28 PID 852 wrote to memory of 2016 852 backup.exe 29 PID 852 wrote to memory of 2016 852 backup.exe 29 PID 852 wrote to memory of 2016 852 backup.exe 29 PID 852 wrote to memory of 2016 852 backup.exe 29 PID 1896 wrote to memory of 1980 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 30 PID 1896 wrote to memory of 1980 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 30 PID 1896 wrote to memory of 1980 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 30 PID 1896 wrote to memory of 1980 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 30 PID 1896 wrote to memory of 1768 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 31 PID 1896 wrote to memory of 1768 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 31 PID 1896 wrote to memory of 1768 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 31 PID 1896 wrote to memory of 1768 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 31 PID 2016 wrote to memory of 1492 2016 backup.exe 32 PID 2016 wrote to memory of 1492 2016 backup.exe 32 PID 2016 wrote to memory of 1492 2016 backup.exe 32 PID 2016 wrote to memory of 1492 2016 backup.exe 32 PID 1896 wrote to memory of 876 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 33 PID 1896 wrote to memory of 876 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 33 PID 1896 wrote to memory of 876 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 33 PID 1896 wrote to memory of 876 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 33 PID 1492 wrote to memory of 2004 1492 backup.exe 34 PID 1492 wrote to memory of 2004 1492 backup.exe 34 PID 1492 wrote to memory of 2004 1492 backup.exe 34 PID 1492 wrote to memory of 2004 1492 backup.exe 34 PID 1896 wrote to memory of 1404 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 35 PID 1896 wrote to memory of 1404 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 35 PID 1896 wrote to memory of 1404 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 35 PID 1896 wrote to memory of 1404 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 35 PID 2016 wrote to memory of 776 2016 backup.exe 36 PID 2016 wrote to memory of 776 2016 backup.exe 36 PID 2016 wrote to memory of 776 2016 backup.exe 36 PID 2016 wrote to memory of 776 2016 backup.exe 36 PID 1896 wrote to memory of 1528 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 37 PID 1896 wrote to memory of 1528 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 37 PID 1896 wrote to memory of 1528 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 37 PID 1896 wrote to memory of 1528 1896 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe 37 PID 776 wrote to memory of 468 776 backup.exe 38 PID 776 wrote to memory of 468 776 backup.exe 38 PID 776 wrote to memory of 468 776 backup.exe 38 PID 776 wrote to memory of 468 776 backup.exe 38 PID 468 wrote to memory of 940 468 backup.exe 39 PID 468 wrote to memory of 940 468 backup.exe 39 PID 468 wrote to memory of 940 468 backup.exe 39 PID 468 wrote to memory of 940 468 backup.exe 39 PID 776 wrote to memory of 1420 776 backup.exe 40 PID 776 wrote to memory of 1420 776 backup.exe 40 PID 776 wrote to memory of 1420 776 backup.exe 40 PID 776 wrote to memory of 1420 776 backup.exe 40 PID 1420 wrote to memory of 1912 1420 backup.exe 41 PID 1420 wrote to memory of 1912 1420 backup.exe 41 PID 1420 wrote to memory of 1912 1420 backup.exe 41 PID 1420 wrote to memory of 1912 1420 backup.exe 41 PID 1912 wrote to memory of 944 1912 backup.exe 42 PID 1912 wrote to memory of 944 1912 backup.exe 42 PID 1912 wrote to memory of 944 1912 backup.exe 42 PID 1912 wrote to memory of 944 1912 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe"C:\Users\Admin\AppData\Local\Temp\0d72e04cad00e2d163be19a2467d89f3a23b40fd7e37fdf077c1d28e8fb0bbfe.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\2518642359\backup.exeC:\Users\Admin\AppData\Local\Temp\2518642359\backup.exe C:\Users\Admin\AppData\Local\Temp\2518642359\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2016 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1492 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:468 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1420 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1912 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1836
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1180
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1976
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:276
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1692
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1208 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1428
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1408
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:672
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1664
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1248
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1388
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:340
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:1372
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵PID:1908
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1604 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1276
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:276
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1932
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1416
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
PID:1580
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵PID:1836
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:940
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1696 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:984
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1164
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1640
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1652
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:916
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1768
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1716 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵PID:1672
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵PID:1124
-
-
-
-
C:\Program Files (x86)\Common Files\data.exe"C:\Program Files (x86)\Common Files\data.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Program Files (x86)\Google\data.exe"C:\Program Files (x86)\Google\data.exe" C:\Program Files (x86)\Google\5⤵PID:1676
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2020
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2028 -
C:\Users\Admin\update.exeC:\Users\Admin\update.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:2040
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:1292
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50dbd7471af1618cb3a5c874aa9c97a5b
SHA116464321088aa2e536fb94c1f017ab0223d60348
SHA256551b5942bb1ded84aed3306e44f4ea6babd8a296621ee6ac658509ae715a5dd4
SHA512fb3be6fb2a5da1358e37b7f66f600afc34a54f68f0a9388b23dd328d20403b0376234054c8b9feeb4d279c73fc18e183be9ae7a1dcbd4c3bf8b2a0447e45293f
-
Filesize
72KB
MD56fb5710a4520f463fa955e815e0a27ff
SHA19bea5dada0793c84df4d7cc9fea23815423039ee
SHA256d8ffa51d7510a00303865e11360ecb09326e8433d456e227c9b4685d28c9070b
SHA51244462299def0c57f575521b5da5ddc8bd53c7f8fc09f9bacdf1a487f2389e00e2e66fa68f9fff7a68ccf29a3538f99de9d8c0ba8f984ba35d393208acb74db95
-
Filesize
72KB
MD56fb5710a4520f463fa955e815e0a27ff
SHA19bea5dada0793c84df4d7cc9fea23815423039ee
SHA256d8ffa51d7510a00303865e11360ecb09326e8433d456e227c9b4685d28c9070b
SHA51244462299def0c57f575521b5da5ddc8bd53c7f8fc09f9bacdf1a487f2389e00e2e66fa68f9fff7a68ccf29a3538f99de9d8c0ba8f984ba35d393208acb74db95
-
Filesize
72KB
MD50d2b8bd794788d857e40341acbe7aca3
SHA1af3a748742fa876b0ea9007e6a056197bd8b345e
SHA256370fbaaa002ec23e81799aacfb90ae169e259ccbcc8e4d0704a3ed3cbbfe7338
SHA5125ae196fc779a2b0bd332a9e6cd0b591edc30cd5f7e94f4a10067020f6fb616bd511128b8d5fe116daa9239264fff95365c71765fd7a565685f3020d297530d78
-
Filesize
72KB
MD5add8e009df2f233fa8b1ecc3decff77d
SHA1d1d5622740755e62fa6d5b489b34f77a55f16202
SHA2562e3d0c45df1d9fef8f6523adb64def8cba4b33ad3426d78a004f5f9b4b9e400b
SHA5126401a88bfc546e0fbc0cc23904aa1f3482737ac58d08776d7de55a930d804cd39ac95df6997ecb1c3342bf0d89c9a27f99ba306323c3bce981a7a61810667eed
-
Filesize
72KB
MD5add8e009df2f233fa8b1ecc3decff77d
SHA1d1d5622740755e62fa6d5b489b34f77a55f16202
SHA2562e3d0c45df1d9fef8f6523adb64def8cba4b33ad3426d78a004f5f9b4b9e400b
SHA5126401a88bfc546e0fbc0cc23904aa1f3482737ac58d08776d7de55a930d804cd39ac95df6997ecb1c3342bf0d89c9a27f99ba306323c3bce981a7a61810667eed
-
Filesize
72KB
MD5814570a4ab3a95c551c8ee56fc6ec3ea
SHA17c5aef79ff6b0af3c7b12b302383b245f2799656
SHA256cbe6df45aa791612b17ea6864a2b673aa75e1e2dbde6a68968597c6348907243
SHA5127401e4c28fedd1ca497b29f608ce72b7f98d822fede82bf4bfc17e5e9bb5543184e3950e890f08644d6b992ff6b8fdb91e0afb1e3928bac25783fff4b1f7e074
-
Filesize
72KB
MD522515a31296c1a051cd58aa308054ea3
SHA10ec0c05435b4a8c2bbfbd2402e81a1a6956a2a72
SHA25613402551aaa13b6da983a9cf34f122afb78c2759b0c0b2ae1b0bebd263fd9bd5
SHA51242ca1099e05e028bbed308926e2836ec9d072ea957bb3a4bbb6573f0acd8ac0c0fda151dd43ca98b01a7e9befe84bc7e54338fafcc7b750bd3967cfc511970d3
-
Filesize
72KB
MD522515a31296c1a051cd58aa308054ea3
SHA10ec0c05435b4a8c2bbfbd2402e81a1a6956a2a72
SHA25613402551aaa13b6da983a9cf34f122afb78c2759b0c0b2ae1b0bebd263fd9bd5
SHA51242ca1099e05e028bbed308926e2836ec9d072ea957bb3a4bbb6573f0acd8ac0c0fda151dd43ca98b01a7e9befe84bc7e54338fafcc7b750bd3967cfc511970d3
-
Filesize
72KB
MD5cc090cb1179e9ce00e2f22410153ada6
SHA1996ff0eff292b5e2651fae19bf6babac6a1638b4
SHA2564813b9491f68ae6223be35bda693058dd51eb4a56fcc93cd267b2a0de1947c97
SHA512073d7b5b050ce37f5066b0963177b3c805e44a24ba6c5a02d8446b8e7ab4555e9c1090b38e3a7fa3f4773a5eb601ea5c0947485949ecd6b21273a295c93dbd15
-
Filesize
72KB
MD5814570a4ab3a95c551c8ee56fc6ec3ea
SHA17c5aef79ff6b0af3c7b12b302383b245f2799656
SHA256cbe6df45aa791612b17ea6864a2b673aa75e1e2dbde6a68968597c6348907243
SHA5127401e4c28fedd1ca497b29f608ce72b7f98d822fede82bf4bfc17e5e9bb5543184e3950e890f08644d6b992ff6b8fdb91e0afb1e3928bac25783fff4b1f7e074
-
Filesize
72KB
MD5814570a4ab3a95c551c8ee56fc6ec3ea
SHA17c5aef79ff6b0af3c7b12b302383b245f2799656
SHA256cbe6df45aa791612b17ea6864a2b673aa75e1e2dbde6a68968597c6348907243
SHA5127401e4c28fedd1ca497b29f608ce72b7f98d822fede82bf4bfc17e5e9bb5543184e3950e890f08644d6b992ff6b8fdb91e0afb1e3928bac25783fff4b1f7e074
-
Filesize
72KB
MD5cc090cb1179e9ce00e2f22410153ada6
SHA1996ff0eff292b5e2651fae19bf6babac6a1638b4
SHA2564813b9491f68ae6223be35bda693058dd51eb4a56fcc93cd267b2a0de1947c97
SHA512073d7b5b050ce37f5066b0963177b3c805e44a24ba6c5a02d8446b8e7ab4555e9c1090b38e3a7fa3f4773a5eb601ea5c0947485949ecd6b21273a295c93dbd15
-
Filesize
72KB
MD510237a1ca9e240c68feb5ded7ff316ad
SHA119f3e6caa1dbf4ac00c18b3d6020e4c5edf54d8b
SHA2562e1d3861f5d6f013047dad5e58658ad2934c0352b52b40f9e442f164ff2273ea
SHA512c3e717e4b2a3bf0047402f50d5dfe0870c2f2ece1f7b3b19d0adfac98b1dce2c00fff71ecb7487abdef13072390f59983818a1e80068173bbc44d0d69f35ba85
-
Filesize
72KB
MD510237a1ca9e240c68feb5ded7ff316ad
SHA119f3e6caa1dbf4ac00c18b3d6020e4c5edf54d8b
SHA2562e1d3861f5d6f013047dad5e58658ad2934c0352b52b40f9e442f164ff2273ea
SHA512c3e717e4b2a3bf0047402f50d5dfe0870c2f2ece1f7b3b19d0adfac98b1dce2c00fff71ecb7487abdef13072390f59983818a1e80068173bbc44d0d69f35ba85
-
Filesize
72KB
MD5fb8187a20218f6e6770639f702f6c762
SHA17ff0eccfe80d9b2106a2c3fa9e1c6c649f3c566c
SHA256c646138855cea30924c29cff68591e14da6ace915199ff930eb8b8d626ea79cd
SHA5121523cdc262aa06159d558aa0e6f7c140e0afb21b6a1169471f853c743262808207215655ed0dc5a429f9dac1524463010d9d8f67f1799b6eade1a3b85d058402
-
Filesize
72KB
MD5fb8187a20218f6e6770639f702f6c762
SHA17ff0eccfe80d9b2106a2c3fa9e1c6c649f3c566c
SHA256c646138855cea30924c29cff68591e14da6ace915199ff930eb8b8d626ea79cd
SHA5121523cdc262aa06159d558aa0e6f7c140e0afb21b6a1169471f853c743262808207215655ed0dc5a429f9dac1524463010d9d8f67f1799b6eade1a3b85d058402
-
Filesize
72KB
MD58856aba8a526304e86e466c4988887de
SHA15dc9a6a2108d72643875d9cddcfeddaa57da25fb
SHA256c1b3d73246446172908aa1385e61834fe2a714577c1274b58e41013aaf5c0232
SHA5127cc5eed56e3c95012422ff3cfa6ca8d6177d8c9bafdff65bad90d01aad47e06bf731c3336b8b8d2cf04cd3bad7cead522a23e65faca3c90b23523ea3a3cc00ca
-
Filesize
72KB
MD58856aba8a526304e86e466c4988887de
SHA15dc9a6a2108d72643875d9cddcfeddaa57da25fb
SHA256c1b3d73246446172908aa1385e61834fe2a714577c1274b58e41013aaf5c0232
SHA5127cc5eed56e3c95012422ff3cfa6ca8d6177d8c9bafdff65bad90d01aad47e06bf731c3336b8b8d2cf04cd3bad7cead522a23e65faca3c90b23523ea3a3cc00ca
-
Filesize
72KB
MD59ed78bfa8f5e3ecfda282eec26a5c5dd
SHA19df4bdd7fd5d2b8ffc7bc9b621cde38cbd011302
SHA2566048a879deb05277f683e68f5dbb4437d5c99dada27150bebc03794add9fad46
SHA512db3bd72adefa587ece5883a808a1c1435225f10a71178f3c051b89b84d0115b3f1267e8d67f76d2c7072284f230b0fbcbe4424290b4e4e0999a3a4d90afb6588
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD5886ea0aee9805a41d268f5e1fcc46c61
SHA1b1ddd4b85c6e87816c7f37145f4f8341c74ca94e
SHA256b04bf08fd2c263b5065d64400359ed438be7effaaa3c376d9d6186b6019e4253
SHA5128c8db4d37ad6f905577c4185bed8216a1af23d8dd9cb5631c2c88fce5cbb46b6678a2f67037172baacebbf78493aef720201a89131ce32313aca8de31e1be22b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD53408589f7ce01da68fd75048259d0d3e
SHA1fd44567fb3dc3be7e5a9e4222e8b6ead9017d967
SHA2565d8bc9a8d1c1afc2dee3ec75b1c9bb0b31b6fae12c9d7b9f1ac275019de6a379
SHA51296b8ed5c99f5eaf20a0c456f87c024fca2e56ebc92851d32868136a7633127da073a8a7650050d096e787ebec6d8d10b162d9e50ca5c0e19554d484238caebbd
-
Filesize
72KB
MD55ae1a6a48fa6934ed729b5716ce3e51a
SHA1ab5b62e0f077d61b549278808c1e43feb1386a21
SHA256ff15e4b5a3a50f25c63e6ee6b2f633df1fac061143d258f9dc3f9bec687f92a0
SHA512de47f7fb1f4a5150690d15004007fed79f12d61f9cb9679ad3a46e04cb2d7618fe4571ca05c83ae2ef6fa7476edc84327c3c76ddbadb1ac15a206c9f42a4c17c
-
Filesize
72KB
MD58856aba8a526304e86e466c4988887de
SHA15dc9a6a2108d72643875d9cddcfeddaa57da25fb
SHA256c1b3d73246446172908aa1385e61834fe2a714577c1274b58e41013aaf5c0232
SHA5127cc5eed56e3c95012422ff3cfa6ca8d6177d8c9bafdff65bad90d01aad47e06bf731c3336b8b8d2cf04cd3bad7cead522a23e65faca3c90b23523ea3a3cc00ca
-
Filesize
72KB
MD55ae1a6a48fa6934ed729b5716ce3e51a
SHA1ab5b62e0f077d61b549278808c1e43feb1386a21
SHA256ff15e4b5a3a50f25c63e6ee6b2f633df1fac061143d258f9dc3f9bec687f92a0
SHA512de47f7fb1f4a5150690d15004007fed79f12d61f9cb9679ad3a46e04cb2d7618fe4571ca05c83ae2ef6fa7476edc84327c3c76ddbadb1ac15a206c9f42a4c17c
-
Filesize
72KB
MD5fd2b50fa56b0cf1aa8cda42925793320
SHA1f81563d5bcdde385223f97c18dcadd8d7aab461c
SHA2567af6cfca9b73b894e38da68b38922b5a499ec57a2e9aff06f75ed8bb3d11a8f4
SHA5126a07b96d956e291deb7dfa076a717057f36a93a05109a2b93a6e99e2686b50ea4ccdf455d4543a10d3169af8602798b0470b5afe53ea4196f3fa107e34ec0dfe
-
Filesize
72KB
MD5fd2b50fa56b0cf1aa8cda42925793320
SHA1f81563d5bcdde385223f97c18dcadd8d7aab461c
SHA2567af6cfca9b73b894e38da68b38922b5a499ec57a2e9aff06f75ed8bb3d11a8f4
SHA5126a07b96d956e291deb7dfa076a717057f36a93a05109a2b93a6e99e2686b50ea4ccdf455d4543a10d3169af8602798b0470b5afe53ea4196f3fa107e34ec0dfe
-
Filesize
72KB
MD50dbd7471af1618cb3a5c874aa9c97a5b
SHA116464321088aa2e536fb94c1f017ab0223d60348
SHA256551b5942bb1ded84aed3306e44f4ea6babd8a296621ee6ac658509ae715a5dd4
SHA512fb3be6fb2a5da1358e37b7f66f600afc34a54f68f0a9388b23dd328d20403b0376234054c8b9feeb4d279c73fc18e183be9ae7a1dcbd4c3bf8b2a0447e45293f
-
Filesize
72KB
MD50dbd7471af1618cb3a5c874aa9c97a5b
SHA116464321088aa2e536fb94c1f017ab0223d60348
SHA256551b5942bb1ded84aed3306e44f4ea6babd8a296621ee6ac658509ae715a5dd4
SHA512fb3be6fb2a5da1358e37b7f66f600afc34a54f68f0a9388b23dd328d20403b0376234054c8b9feeb4d279c73fc18e183be9ae7a1dcbd4c3bf8b2a0447e45293f
-
Filesize
72KB
MD56fb5710a4520f463fa955e815e0a27ff
SHA19bea5dada0793c84df4d7cc9fea23815423039ee
SHA256d8ffa51d7510a00303865e11360ecb09326e8433d456e227c9b4685d28c9070b
SHA51244462299def0c57f575521b5da5ddc8bd53c7f8fc09f9bacdf1a487f2389e00e2e66fa68f9fff7a68ccf29a3538f99de9d8c0ba8f984ba35d393208acb74db95
-
Filesize
72KB
MD56fb5710a4520f463fa955e815e0a27ff
SHA19bea5dada0793c84df4d7cc9fea23815423039ee
SHA256d8ffa51d7510a00303865e11360ecb09326e8433d456e227c9b4685d28c9070b
SHA51244462299def0c57f575521b5da5ddc8bd53c7f8fc09f9bacdf1a487f2389e00e2e66fa68f9fff7a68ccf29a3538f99de9d8c0ba8f984ba35d393208acb74db95
-
Filesize
72KB
MD50d2b8bd794788d857e40341acbe7aca3
SHA1af3a748742fa876b0ea9007e6a056197bd8b345e
SHA256370fbaaa002ec23e81799aacfb90ae169e259ccbcc8e4d0704a3ed3cbbfe7338
SHA5125ae196fc779a2b0bd332a9e6cd0b591edc30cd5f7e94f4a10067020f6fb616bd511128b8d5fe116daa9239264fff95365c71765fd7a565685f3020d297530d78
-
Filesize
72KB
MD50d2b8bd794788d857e40341acbe7aca3
SHA1af3a748742fa876b0ea9007e6a056197bd8b345e
SHA256370fbaaa002ec23e81799aacfb90ae169e259ccbcc8e4d0704a3ed3cbbfe7338
SHA5125ae196fc779a2b0bd332a9e6cd0b591edc30cd5f7e94f4a10067020f6fb616bd511128b8d5fe116daa9239264fff95365c71765fd7a565685f3020d297530d78
-
Filesize
72KB
MD5add8e009df2f233fa8b1ecc3decff77d
SHA1d1d5622740755e62fa6d5b489b34f77a55f16202
SHA2562e3d0c45df1d9fef8f6523adb64def8cba4b33ad3426d78a004f5f9b4b9e400b
SHA5126401a88bfc546e0fbc0cc23904aa1f3482737ac58d08776d7de55a930d804cd39ac95df6997ecb1c3342bf0d89c9a27f99ba306323c3bce981a7a61810667eed
-
Filesize
72KB
MD5add8e009df2f233fa8b1ecc3decff77d
SHA1d1d5622740755e62fa6d5b489b34f77a55f16202
SHA2562e3d0c45df1d9fef8f6523adb64def8cba4b33ad3426d78a004f5f9b4b9e400b
SHA5126401a88bfc546e0fbc0cc23904aa1f3482737ac58d08776d7de55a930d804cd39ac95df6997ecb1c3342bf0d89c9a27f99ba306323c3bce981a7a61810667eed
-
Filesize
72KB
MD5814570a4ab3a95c551c8ee56fc6ec3ea
SHA17c5aef79ff6b0af3c7b12b302383b245f2799656
SHA256cbe6df45aa791612b17ea6864a2b673aa75e1e2dbde6a68968597c6348907243
SHA5127401e4c28fedd1ca497b29f608ce72b7f98d822fede82bf4bfc17e5e9bb5543184e3950e890f08644d6b992ff6b8fdb91e0afb1e3928bac25783fff4b1f7e074
-
Filesize
72KB
MD5814570a4ab3a95c551c8ee56fc6ec3ea
SHA17c5aef79ff6b0af3c7b12b302383b245f2799656
SHA256cbe6df45aa791612b17ea6864a2b673aa75e1e2dbde6a68968597c6348907243
SHA5127401e4c28fedd1ca497b29f608ce72b7f98d822fede82bf4bfc17e5e9bb5543184e3950e890f08644d6b992ff6b8fdb91e0afb1e3928bac25783fff4b1f7e074
-
Filesize
72KB
MD522515a31296c1a051cd58aa308054ea3
SHA10ec0c05435b4a8c2bbfbd2402e81a1a6956a2a72
SHA25613402551aaa13b6da983a9cf34f122afb78c2759b0c0b2ae1b0bebd263fd9bd5
SHA51242ca1099e05e028bbed308926e2836ec9d072ea957bb3a4bbb6573f0acd8ac0c0fda151dd43ca98b01a7e9befe84bc7e54338fafcc7b750bd3967cfc511970d3
-
Filesize
72KB
MD522515a31296c1a051cd58aa308054ea3
SHA10ec0c05435b4a8c2bbfbd2402e81a1a6956a2a72
SHA25613402551aaa13b6da983a9cf34f122afb78c2759b0c0b2ae1b0bebd263fd9bd5
SHA51242ca1099e05e028bbed308926e2836ec9d072ea957bb3a4bbb6573f0acd8ac0c0fda151dd43ca98b01a7e9befe84bc7e54338fafcc7b750bd3967cfc511970d3
-
Filesize
72KB
MD5cc090cb1179e9ce00e2f22410153ada6
SHA1996ff0eff292b5e2651fae19bf6babac6a1638b4
SHA2564813b9491f68ae6223be35bda693058dd51eb4a56fcc93cd267b2a0de1947c97
SHA512073d7b5b050ce37f5066b0963177b3c805e44a24ba6c5a02d8446b8e7ab4555e9c1090b38e3a7fa3f4773a5eb601ea5c0947485949ecd6b21273a295c93dbd15
-
Filesize
72KB
MD5cc090cb1179e9ce00e2f22410153ada6
SHA1996ff0eff292b5e2651fae19bf6babac6a1638b4
SHA2564813b9491f68ae6223be35bda693058dd51eb4a56fcc93cd267b2a0de1947c97
SHA512073d7b5b050ce37f5066b0963177b3c805e44a24ba6c5a02d8446b8e7ab4555e9c1090b38e3a7fa3f4773a5eb601ea5c0947485949ecd6b21273a295c93dbd15
-
Filesize
72KB
MD5814570a4ab3a95c551c8ee56fc6ec3ea
SHA17c5aef79ff6b0af3c7b12b302383b245f2799656
SHA256cbe6df45aa791612b17ea6864a2b673aa75e1e2dbde6a68968597c6348907243
SHA5127401e4c28fedd1ca497b29f608ce72b7f98d822fede82bf4bfc17e5e9bb5543184e3950e890f08644d6b992ff6b8fdb91e0afb1e3928bac25783fff4b1f7e074
-
Filesize
72KB
MD5814570a4ab3a95c551c8ee56fc6ec3ea
SHA17c5aef79ff6b0af3c7b12b302383b245f2799656
SHA256cbe6df45aa791612b17ea6864a2b673aa75e1e2dbde6a68968597c6348907243
SHA5127401e4c28fedd1ca497b29f608ce72b7f98d822fede82bf4bfc17e5e9bb5543184e3950e890f08644d6b992ff6b8fdb91e0afb1e3928bac25783fff4b1f7e074
-
Filesize
72KB
MD5cc090cb1179e9ce00e2f22410153ada6
SHA1996ff0eff292b5e2651fae19bf6babac6a1638b4
SHA2564813b9491f68ae6223be35bda693058dd51eb4a56fcc93cd267b2a0de1947c97
SHA512073d7b5b050ce37f5066b0963177b3c805e44a24ba6c5a02d8446b8e7ab4555e9c1090b38e3a7fa3f4773a5eb601ea5c0947485949ecd6b21273a295c93dbd15
-
Filesize
72KB
MD5cc090cb1179e9ce00e2f22410153ada6
SHA1996ff0eff292b5e2651fae19bf6babac6a1638b4
SHA2564813b9491f68ae6223be35bda693058dd51eb4a56fcc93cd267b2a0de1947c97
SHA512073d7b5b050ce37f5066b0963177b3c805e44a24ba6c5a02d8446b8e7ab4555e9c1090b38e3a7fa3f4773a5eb601ea5c0947485949ecd6b21273a295c93dbd15
-
Filesize
72KB
MD5cc090cb1179e9ce00e2f22410153ada6
SHA1996ff0eff292b5e2651fae19bf6babac6a1638b4
SHA2564813b9491f68ae6223be35bda693058dd51eb4a56fcc93cd267b2a0de1947c97
SHA512073d7b5b050ce37f5066b0963177b3c805e44a24ba6c5a02d8446b8e7ab4555e9c1090b38e3a7fa3f4773a5eb601ea5c0947485949ecd6b21273a295c93dbd15
-
Filesize
72KB
MD510237a1ca9e240c68feb5ded7ff316ad
SHA119f3e6caa1dbf4ac00c18b3d6020e4c5edf54d8b
SHA2562e1d3861f5d6f013047dad5e58658ad2934c0352b52b40f9e442f164ff2273ea
SHA512c3e717e4b2a3bf0047402f50d5dfe0870c2f2ece1f7b3b19d0adfac98b1dce2c00fff71ecb7487abdef13072390f59983818a1e80068173bbc44d0d69f35ba85
-
Filesize
72KB
MD510237a1ca9e240c68feb5ded7ff316ad
SHA119f3e6caa1dbf4ac00c18b3d6020e4c5edf54d8b
SHA2562e1d3861f5d6f013047dad5e58658ad2934c0352b52b40f9e442f164ff2273ea
SHA512c3e717e4b2a3bf0047402f50d5dfe0870c2f2ece1f7b3b19d0adfac98b1dce2c00fff71ecb7487abdef13072390f59983818a1e80068173bbc44d0d69f35ba85
-
Filesize
72KB
MD5fb8187a20218f6e6770639f702f6c762
SHA17ff0eccfe80d9b2106a2c3fa9e1c6c649f3c566c
SHA256c646138855cea30924c29cff68591e14da6ace915199ff930eb8b8d626ea79cd
SHA5121523cdc262aa06159d558aa0e6f7c140e0afb21b6a1169471f853c743262808207215655ed0dc5a429f9dac1524463010d9d8f67f1799b6eade1a3b85d058402
-
Filesize
72KB
MD5fb8187a20218f6e6770639f702f6c762
SHA17ff0eccfe80d9b2106a2c3fa9e1c6c649f3c566c
SHA256c646138855cea30924c29cff68591e14da6ace915199ff930eb8b8d626ea79cd
SHA5121523cdc262aa06159d558aa0e6f7c140e0afb21b6a1169471f853c743262808207215655ed0dc5a429f9dac1524463010d9d8f67f1799b6eade1a3b85d058402
-
Filesize
72KB
MD58856aba8a526304e86e466c4988887de
SHA15dc9a6a2108d72643875d9cddcfeddaa57da25fb
SHA256c1b3d73246446172908aa1385e61834fe2a714577c1274b58e41013aaf5c0232
SHA5127cc5eed56e3c95012422ff3cfa6ca8d6177d8c9bafdff65bad90d01aad47e06bf731c3336b8b8d2cf04cd3bad7cead522a23e65faca3c90b23523ea3a3cc00ca
-
Filesize
72KB
MD58856aba8a526304e86e466c4988887de
SHA15dc9a6a2108d72643875d9cddcfeddaa57da25fb
SHA256c1b3d73246446172908aa1385e61834fe2a714577c1274b58e41013aaf5c0232
SHA5127cc5eed56e3c95012422ff3cfa6ca8d6177d8c9bafdff65bad90d01aad47e06bf731c3336b8b8d2cf04cd3bad7cead522a23e65faca3c90b23523ea3a3cc00ca
-
Filesize
72KB
MD59ed78bfa8f5e3ecfda282eec26a5c5dd
SHA19df4bdd7fd5d2b8ffc7bc9b621cde38cbd011302
SHA2566048a879deb05277f683e68f5dbb4437d5c99dada27150bebc03794add9fad46
SHA512db3bd72adefa587ece5883a808a1c1435225f10a71178f3c051b89b84d0115b3f1267e8d67f76d2c7072284f230b0fbcbe4424290b4e4e0999a3a4d90afb6588
-
Filesize
72KB
MD59ed78bfa8f5e3ecfda282eec26a5c5dd
SHA19df4bdd7fd5d2b8ffc7bc9b621cde38cbd011302
SHA2566048a879deb05277f683e68f5dbb4437d5c99dada27150bebc03794add9fad46
SHA512db3bd72adefa587ece5883a808a1c1435225f10a71178f3c051b89b84d0115b3f1267e8d67f76d2c7072284f230b0fbcbe4424290b4e4e0999a3a4d90afb6588
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD5886ea0aee9805a41d268f5e1fcc46c61
SHA1b1ddd4b85c6e87816c7f37145f4f8341c74ca94e
SHA256b04bf08fd2c263b5065d64400359ed438be7effaaa3c376d9d6186b6019e4253
SHA5128c8db4d37ad6f905577c4185bed8216a1af23d8dd9cb5631c2c88fce5cbb46b6678a2f67037172baacebbf78493aef720201a89131ce32313aca8de31e1be22b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD5886ea0aee9805a41d268f5e1fcc46c61
SHA1b1ddd4b85c6e87816c7f37145f4f8341c74ca94e
SHA256b04bf08fd2c263b5065d64400359ed438be7effaaa3c376d9d6186b6019e4253
SHA5128c8db4d37ad6f905577c4185bed8216a1af23d8dd9cb5631c2c88fce5cbb46b6678a2f67037172baacebbf78493aef720201a89131ce32313aca8de31e1be22b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD53408589f7ce01da68fd75048259d0d3e
SHA1fd44567fb3dc3be7e5a9e4222e8b6ead9017d967
SHA2565d8bc9a8d1c1afc2dee3ec75b1c9bb0b31b6fae12c9d7b9f1ac275019de6a379
SHA51296b8ed5c99f5eaf20a0c456f87c024fca2e56ebc92851d32868136a7633127da073a8a7650050d096e787ebec6d8d10b162d9e50ca5c0e19554d484238caebbd
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD53408589f7ce01da68fd75048259d0d3e
SHA1fd44567fb3dc3be7e5a9e4222e8b6ead9017d967
SHA2565d8bc9a8d1c1afc2dee3ec75b1c9bb0b31b6fae12c9d7b9f1ac275019de6a379
SHA51296b8ed5c99f5eaf20a0c456f87c024fca2e56ebc92851d32868136a7633127da073a8a7650050d096e787ebec6d8d10b162d9e50ca5c0e19554d484238caebbd
-
Filesize
72KB
MD55ae1a6a48fa6934ed729b5716ce3e51a
SHA1ab5b62e0f077d61b549278808c1e43feb1386a21
SHA256ff15e4b5a3a50f25c63e6ee6b2f633df1fac061143d258f9dc3f9bec687f92a0
SHA512de47f7fb1f4a5150690d15004007fed79f12d61f9cb9679ad3a46e04cb2d7618fe4571ca05c83ae2ef6fa7476edc84327c3c76ddbadb1ac15a206c9f42a4c17c
-
Filesize
72KB
MD55ae1a6a48fa6934ed729b5716ce3e51a
SHA1ab5b62e0f077d61b549278808c1e43feb1386a21
SHA256ff15e4b5a3a50f25c63e6ee6b2f633df1fac061143d258f9dc3f9bec687f92a0
SHA512de47f7fb1f4a5150690d15004007fed79f12d61f9cb9679ad3a46e04cb2d7618fe4571ca05c83ae2ef6fa7476edc84327c3c76ddbadb1ac15a206c9f42a4c17c
-
Filesize
72KB
MD58856aba8a526304e86e466c4988887de
SHA15dc9a6a2108d72643875d9cddcfeddaa57da25fb
SHA256c1b3d73246446172908aa1385e61834fe2a714577c1274b58e41013aaf5c0232
SHA5127cc5eed56e3c95012422ff3cfa6ca8d6177d8c9bafdff65bad90d01aad47e06bf731c3336b8b8d2cf04cd3bad7cead522a23e65faca3c90b23523ea3a3cc00ca
-
Filesize
72KB
MD58856aba8a526304e86e466c4988887de
SHA15dc9a6a2108d72643875d9cddcfeddaa57da25fb
SHA256c1b3d73246446172908aa1385e61834fe2a714577c1274b58e41013aaf5c0232
SHA5127cc5eed56e3c95012422ff3cfa6ca8d6177d8c9bafdff65bad90d01aad47e06bf731c3336b8b8d2cf04cd3bad7cead522a23e65faca3c90b23523ea3a3cc00ca
-
Filesize
72KB
MD55ae1a6a48fa6934ed729b5716ce3e51a
SHA1ab5b62e0f077d61b549278808c1e43feb1386a21
SHA256ff15e4b5a3a50f25c63e6ee6b2f633df1fac061143d258f9dc3f9bec687f92a0
SHA512de47f7fb1f4a5150690d15004007fed79f12d61f9cb9679ad3a46e04cb2d7618fe4571ca05c83ae2ef6fa7476edc84327c3c76ddbadb1ac15a206c9f42a4c17c
-
Filesize
72KB
MD55ae1a6a48fa6934ed729b5716ce3e51a
SHA1ab5b62e0f077d61b549278808c1e43feb1386a21
SHA256ff15e4b5a3a50f25c63e6ee6b2f633df1fac061143d258f9dc3f9bec687f92a0
SHA512de47f7fb1f4a5150690d15004007fed79f12d61f9cb9679ad3a46e04cb2d7618fe4571ca05c83ae2ef6fa7476edc84327c3c76ddbadb1ac15a206c9f42a4c17c