Analysis
-
max time kernel
67s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe
Resource
win10v2004-20221111-en
General
-
Target
35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe
-
Size
72KB
-
MD5
271c8e6ab979509c5db040e3ca6b0430
-
SHA1
03c15ef25af4b463649e15dc14117e6ceadb22bb
-
SHA256
35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be
-
SHA512
e625fdb553bd8e27a7bd2e2afee3139c42b15ad1411ca845fe95cb4e3adf185703b3aacf9466bb05deff5a693ebc1da94db3c65cc3cc984bb354b7ab7afe88df
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2K:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 44 IoCs
pid Process 852 backup.exe 1520 backup.exe 1652 backup.exe 1924 data.exe 1516 backup.exe 1640 backup.exe 548 data.exe 1704 backup.exe 1592 backup.exe 1912 backup.exe 824 backup.exe 1184 backup.exe 924 backup.exe 2012 backup.exe 1752 System Restore.exe 108 backup.exe 608 backup.exe 1892 backup.exe 764 backup.exe 1456 backup.exe 1812 backup.exe 1568 backup.exe 900 backup.exe 1640 backup.exe 1052 backup.exe 756 backup.exe 1536 backup.exe 2004 backup.exe 1628 backup.exe 1668 backup.exe 1280 backup.exe 1428 backup.exe 888 backup.exe 924 backup.exe 1776 backup.exe 1564 backup.exe 1764 backup.exe 1276 backup.exe 1108 backup.exe 1476 backup.exe 268 backup.exe 1588 update.exe 1740 backup.exe 1092 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 1704 backup.exe 1704 backup.exe 1592 backup.exe 1592 backup.exe 1704 backup.exe 1704 backup.exe 824 backup.exe 824 backup.exe 1184 backup.exe 1184 backup.exe 824 backup.exe 824 backup.exe 2012 backup.exe 2012 backup.exe 1752 System Restore.exe 1752 System Restore.exe 1752 System Restore.exe 1752 System Restore.exe 1704 backup.exe 2012 backup.exe 1704 backup.exe 2012 backup.exe 1752 System Restore.exe 1752 System Restore.exe 824 backup.exe 824 backup.exe 764 backup.exe 2012 backup.exe 764 backup.exe 2012 backup.exe 1456 backup.exe 1456 backup.exe 1812 backup.exe 1812 backup.exe 1456 backup.exe 1456 backup.exe 1640 backup.exe 1640 backup.exe 1568 backup.exe 1812 backup.exe 1568 backup.exe 1812 backup.exe 2012 backup.exe 1812 backup.exe 1456 backup.exe 1812 backup.exe 1456 backup.exe 2012 backup.exe 1536 backup.exe 1536 backup.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 852 backup.exe 1520 backup.exe 1652 backup.exe 1924 data.exe 1516 backup.exe 1640 backup.exe 548 data.exe 1704 backup.exe 1592 backup.exe 1912 backup.exe 824 backup.exe 1184 backup.exe 924 backup.exe 2012 backup.exe 1752 System Restore.exe 108 backup.exe 1464 backup.exe 268 backup.exe 572 backup.exe 1748 backup.exe 1892 backup.exe 764 backup.exe 1456 backup.exe 1812 backup.exe 1640 backup.exe 900 backup.exe 1052 backup.exe 1568 backup.exe 2004 backup.exe 1628 backup.exe 1536 backup.exe 756 backup.exe 1668 backup.exe 1280 backup.exe 888 backup.exe 1428 backup.exe 924 backup.exe 1776 backup.exe 1764 backup.exe 1564 backup.exe 1276 backup.exe 1108 backup.exe 1476 backup.exe 268 backup.exe 1740 backup.exe 1092 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 852 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 27 PID 1724 wrote to memory of 852 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 27 PID 1724 wrote to memory of 852 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 27 PID 1724 wrote to memory of 852 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 27 PID 1724 wrote to memory of 1520 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 28 PID 1724 wrote to memory of 1520 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 28 PID 1724 wrote to memory of 1520 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 28 PID 1724 wrote to memory of 1520 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 28 PID 1724 wrote to memory of 1652 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 29 PID 1724 wrote to memory of 1652 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 29 PID 1724 wrote to memory of 1652 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 29 PID 1724 wrote to memory of 1652 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 29 PID 1724 wrote to memory of 1924 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 30 PID 1724 wrote to memory of 1924 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 30 PID 1724 wrote to memory of 1924 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 30 PID 1724 wrote to memory of 1924 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 30 PID 1724 wrote to memory of 1516 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 31 PID 1724 wrote to memory of 1516 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 31 PID 1724 wrote to memory of 1516 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 31 PID 1724 wrote to memory of 1516 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 31 PID 1724 wrote to memory of 1640 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 32 PID 1724 wrote to memory of 1640 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 32 PID 1724 wrote to memory of 1640 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 32 PID 1724 wrote to memory of 1640 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 32 PID 852 wrote to memory of 1704 852 backup.exe 34 PID 852 wrote to memory of 1704 852 backup.exe 34 PID 852 wrote to memory of 1704 852 backup.exe 34 PID 852 wrote to memory of 1704 852 backup.exe 34 PID 1724 wrote to memory of 548 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 33 PID 1724 wrote to memory of 548 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 33 PID 1724 wrote to memory of 548 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 33 PID 1724 wrote to memory of 548 1724 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe 33 PID 1704 wrote to memory of 1592 1704 backup.exe 35 PID 1704 wrote to memory of 1592 1704 backup.exe 35 PID 1704 wrote to memory of 1592 1704 backup.exe 35 PID 1704 wrote to memory of 1592 1704 backup.exe 35 PID 1592 wrote to memory of 1912 1592 backup.exe 36 PID 1592 wrote to memory of 1912 1592 backup.exe 36 PID 1592 wrote to memory of 1912 1592 backup.exe 36 PID 1592 wrote to memory of 1912 1592 backup.exe 36 PID 1704 wrote to memory of 824 1704 backup.exe 37 PID 1704 wrote to memory of 824 1704 backup.exe 37 PID 1704 wrote to memory of 824 1704 backup.exe 37 PID 1704 wrote to memory of 824 1704 backup.exe 37 PID 824 wrote to memory of 1184 824 backup.exe 38 PID 824 wrote to memory of 1184 824 backup.exe 38 PID 824 wrote to memory of 1184 824 backup.exe 38 PID 824 wrote to memory of 1184 824 backup.exe 38 PID 1184 wrote to memory of 924 1184 backup.exe 39 PID 1184 wrote to memory of 924 1184 backup.exe 39 PID 1184 wrote to memory of 924 1184 backup.exe 39 PID 1184 wrote to memory of 924 1184 backup.exe 39 PID 824 wrote to memory of 2012 824 backup.exe 40 PID 824 wrote to memory of 2012 824 backup.exe 40 PID 824 wrote to memory of 2012 824 backup.exe 40 PID 824 wrote to memory of 2012 824 backup.exe 40 PID 2012 wrote to memory of 1752 2012 backup.exe 41 PID 2012 wrote to memory of 1752 2012 backup.exe 41 PID 2012 wrote to memory of 1752 2012 backup.exe 41 PID 2012 wrote to memory of 1752 2012 backup.exe 41 PID 1752 wrote to memory of 108 1752 System Restore.exe 42 PID 1752 wrote to memory of 108 1752 System Restore.exe 42 PID 1752 wrote to memory of 108 1752 System Restore.exe 42 PID 1752 wrote to memory of 108 1752 System Restore.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe"C:\Users\Admin\AppData\Local\Temp\35137ea2c2eb9f5ca620e7fc1237a050c5b8b83a5065ca21963b0a5c8c3d90be.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\2309055451\backup.exeC:\Users\Admin\AppData\Local\Temp\2309055451\backup.exe C:\Users\Admin\AppData\Local\Temp\2309055451\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:852 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1704 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1912
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:824 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1184 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:924
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2012 -
C:\Program Files\Common Files\Microsoft Shared\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:108
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:608 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵PID:1436
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵PID:2028
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵PID:472
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:1748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:1060
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:2012
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1456 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:900
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:756
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:1280
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1476
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1092
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1144
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:1160
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1916
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1900
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1944
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:1332
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:680
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:1840
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:1616
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1584
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\8⤵PID:1568
-
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1484
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\data.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\data.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:1688
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1428 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1276 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:268
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:884
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1440
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1596
-
-
C:\Program Files\Common Files\System\ado\it-IT\data.exe"C:\Program Files\Common Files\System\ado\it-IT\data.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1984
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:888
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1280
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1680
-
-
C:\Program Files\Common Files\System\fr-FR\update.exe"C:\Program Files\Common Files\System\fr-FR\update.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1928
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1812 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1052
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1628
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:924
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1688
-
C:\Program Files\DVD Maker\Shared\DvdStyles\data.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\data.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:1520
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵PID:1644
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2004
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:1896
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵PID:676
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵
- Drops file in Program Files directory
PID:1812
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:836
-
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:300
-
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:888
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1788
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1444
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:812
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:764 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵PID:888
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
PID:1588
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:1376
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1904
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1640
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:524
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1972
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1528
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:1280
-
-
-
C:\Program Files (x86)\Internet Explorer\data.exe"C:\Program Files (x86)\Internet Explorer\data.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:548
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:2028
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:916
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:472
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\data.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\data.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD512f7aeed65fc6e2fcafe6eeddf4f1613
SHA1ec2a20be14ae69c57d26de6a510bb504dfbe1391
SHA256230f7d5501919821d8f8d284b39c3c5445fc0548c8faf6fa61fb5550fb8d709a
SHA512f6c3f643297371036e7103f07e8a3406968521141ced1fa979f143ffecf82507e2ec2fe6468ac99903439f07cfe3d3810f79dc78be6d9728dea5329c0962557a
-
Filesize
72KB
MD56088278e0ea4f62e68f979695c4fee74
SHA180d1d202a1aa15d1ad4788b7f77bccc0cb6b8601
SHA256ece61af9401988ac38e5f31263e54c637967584cfb8bd1edc84c3e7c9a30c6c7
SHA51269ab47184f92972c0ba3d0212492498d11b48eed267fd609a7a9336dfad9c588c34eed15085e042fd5eee7fa8925680bb5c0bd3fa1e7606808e792086446ef1b
-
Filesize
72KB
MD56088278e0ea4f62e68f979695c4fee74
SHA180d1d202a1aa15d1ad4788b7f77bccc0cb6b8601
SHA256ece61af9401988ac38e5f31263e54c637967584cfb8bd1edc84c3e7c9a30c6c7
SHA51269ab47184f92972c0ba3d0212492498d11b48eed267fd609a7a9336dfad9c588c34eed15085e042fd5eee7fa8925680bb5c0bd3fa1e7606808e792086446ef1b
-
Filesize
72KB
MD5e14bd0c6d48c8433118ffb1fc951cf99
SHA112a8e805493b15f1f33ffeaea31286126052e755
SHA25681cf0ac083fceab6221e52942124da7cddd158d3a2b78d653cefa9eecca1b78c
SHA512a70b8f065760ef2bd9e3ef87bd2da350e9c2c05c28823b695029de69f1c4a7a744fe7110163af3446a7ec9f76584a71d2a55f434469d0733c6ffadb907852ea5
-
Filesize
72KB
MD5ebc11b585e777852604774a7e6faf90a
SHA16c7390a8ca8ab278f46b497bc6a7e561915b4232
SHA256303e47270a43f883e03e38e02e3d758db44cbd250ca308e6144c10b04e956be2
SHA512168b23d6fa73d55d8fbb03293b875959e24e54f4e156b3c490d01451e0f0a2a44dfc648b933f4f076e5981121d927a284ceca22cabe7c808d4fa8d7969a7cea4
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD5f3b7bc5045cad86281d203ca03399f88
SHA127372c248ea027a86e2d3c4b0fd8fecaf4df352c
SHA2565e50cbb423b7981cc53738d39e8768df67a456500c3402e9c6fb619e5414111c
SHA5124c6ddba71de59688d381e43c2a4adbbd350b4fee54fd16814481cd44b03d4851f36010ccaa390ff4d7918d6bd293a0c098cd666b12a1b5442c5b0f1d2bc6453a
-
Filesize
72KB
MD5ebc11b585e777852604774a7e6faf90a
SHA16c7390a8ca8ab278f46b497bc6a7e561915b4232
SHA256303e47270a43f883e03e38e02e3d758db44cbd250ca308e6144c10b04e956be2
SHA512168b23d6fa73d55d8fbb03293b875959e24e54f4e156b3c490d01451e0f0a2a44dfc648b933f4f076e5981121d927a284ceca22cabe7c808d4fa8d7969a7cea4
-
Filesize
72KB
MD5ebc11b585e777852604774a7e6faf90a
SHA16c7390a8ca8ab278f46b497bc6a7e561915b4232
SHA256303e47270a43f883e03e38e02e3d758db44cbd250ca308e6144c10b04e956be2
SHA512168b23d6fa73d55d8fbb03293b875959e24e54f4e156b3c490d01451e0f0a2a44dfc648b933f4f076e5981121d927a284ceca22cabe7c808d4fa8d7969a7cea4
-
Filesize
72KB
MD5f3b7bc5045cad86281d203ca03399f88
SHA127372c248ea027a86e2d3c4b0fd8fecaf4df352c
SHA2565e50cbb423b7981cc53738d39e8768df67a456500c3402e9c6fb619e5414111c
SHA5124c6ddba71de59688d381e43c2a4adbbd350b4fee54fd16814481cd44b03d4851f36010ccaa390ff4d7918d6bd293a0c098cd666b12a1b5442c5b0f1d2bc6453a
-
Filesize
72KB
MD5614d497c573dd2314b46b3709f7fcff3
SHA173e3d7baed58ebad393e4d258d692264590dfa84
SHA256c14ecf991bc458533206fdcbd30e5b3bdbce880ebc411cb8035b47d3468005a0
SHA5129bb6b73a57634e40a4d872305a811c0e3a88bffdbef9c38d17d19f8fd050beb40eb602e4ca76cc2b5ee919a86ea13c42dbc4f6d995b58cbfaee69d6eed237038
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD59efe1340a4bf165a8a481d33cbc1fc02
SHA18f052861f98ecab31018bdaa149aa27bce2227d0
SHA256c79c0806185b626ef04b51d20671f6dd4993c6c7c5c81d5f4cc264b4168d6923
SHA5126984ac3b37a0f78ddca91bccf3c4623545fc161f8e04d582e21f81d0321c8ce222c3d6ec0b7b71c63418ba70b80dd90206d2199ed1ce67cd29c2dac1c6531d00
-
Filesize
72KB
MD59efe1340a4bf165a8a481d33cbc1fc02
SHA18f052861f98ecab31018bdaa149aa27bce2227d0
SHA256c79c0806185b626ef04b51d20671f6dd4993c6c7c5c81d5f4cc264b4168d6923
SHA5126984ac3b37a0f78ddca91bccf3c4623545fc161f8e04d582e21f81d0321c8ce222c3d6ec0b7b71c63418ba70b80dd90206d2199ed1ce67cd29c2dac1c6531d00
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5a136013fc53d5b8d3127870f35ae5a30
SHA19412987fc492c3eec3fab337f6857cb3efe0ed7c
SHA256657877549565f56bf59ecdb92f0d5de92f9c018b43acad160653394a0dec148f
SHA512f3af759e1db05d7f1bf668f8d0eb13d832b820ad0f67c7279ae035653562f1500ff9509f1734b3e5bba0f6623f93806bab81562a944320a6f9f0072a9a62c177
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5a136013fc53d5b8d3127870f35ae5a30
SHA19412987fc492c3eec3fab337f6857cb3efe0ed7c
SHA256657877549565f56bf59ecdb92f0d5de92f9c018b43acad160653394a0dec148f
SHA512f3af759e1db05d7f1bf668f8d0eb13d832b820ad0f67c7279ae035653562f1500ff9509f1734b3e5bba0f6623f93806bab81562a944320a6f9f0072a9a62c177
-
Filesize
72KB
MD526f1857676b8f22e75b338c4f5da421b
SHA15d7c4c3a18d909dfe1f0a91dc61101ac86aceda7
SHA256d407116fbfc8e5067ce13420b98ce5bfe349c8f88acf6c680ea35e576a661915
SHA512119568fadd761622102f3615fca18118923b2176d1cc542dc6604f607238123603ce114d02140bd3be909113d956f85d61e0a5852b0a6fd26d35d38a0a9886cc
-
Filesize
72KB
MD526f1857676b8f22e75b338c4f5da421b
SHA15d7c4c3a18d909dfe1f0a91dc61101ac86aceda7
SHA256d407116fbfc8e5067ce13420b98ce5bfe349c8f88acf6c680ea35e576a661915
SHA512119568fadd761622102f3615fca18118923b2176d1cc542dc6604f607238123603ce114d02140bd3be909113d956f85d61e0a5852b0a6fd26d35d38a0a9886cc
-
Filesize
72KB
MD512f7aeed65fc6e2fcafe6eeddf4f1613
SHA1ec2a20be14ae69c57d26de6a510bb504dfbe1391
SHA256230f7d5501919821d8f8d284b39c3c5445fc0548c8faf6fa61fb5550fb8d709a
SHA512f6c3f643297371036e7103f07e8a3406968521141ced1fa979f143ffecf82507e2ec2fe6468ac99903439f07cfe3d3810f79dc78be6d9728dea5329c0962557a
-
Filesize
72KB
MD512f7aeed65fc6e2fcafe6eeddf4f1613
SHA1ec2a20be14ae69c57d26de6a510bb504dfbe1391
SHA256230f7d5501919821d8f8d284b39c3c5445fc0548c8faf6fa61fb5550fb8d709a
SHA512f6c3f643297371036e7103f07e8a3406968521141ced1fa979f143ffecf82507e2ec2fe6468ac99903439f07cfe3d3810f79dc78be6d9728dea5329c0962557a
-
Filesize
72KB
MD56088278e0ea4f62e68f979695c4fee74
SHA180d1d202a1aa15d1ad4788b7f77bccc0cb6b8601
SHA256ece61af9401988ac38e5f31263e54c637967584cfb8bd1edc84c3e7c9a30c6c7
SHA51269ab47184f92972c0ba3d0212492498d11b48eed267fd609a7a9336dfad9c588c34eed15085e042fd5eee7fa8925680bb5c0bd3fa1e7606808e792086446ef1b
-
Filesize
72KB
MD56088278e0ea4f62e68f979695c4fee74
SHA180d1d202a1aa15d1ad4788b7f77bccc0cb6b8601
SHA256ece61af9401988ac38e5f31263e54c637967584cfb8bd1edc84c3e7c9a30c6c7
SHA51269ab47184f92972c0ba3d0212492498d11b48eed267fd609a7a9336dfad9c588c34eed15085e042fd5eee7fa8925680bb5c0bd3fa1e7606808e792086446ef1b
-
Filesize
72KB
MD5e14bd0c6d48c8433118ffb1fc951cf99
SHA112a8e805493b15f1f33ffeaea31286126052e755
SHA25681cf0ac083fceab6221e52942124da7cddd158d3a2b78d653cefa9eecca1b78c
SHA512a70b8f065760ef2bd9e3ef87bd2da350e9c2c05c28823b695029de69f1c4a7a744fe7110163af3446a7ec9f76584a71d2a55f434469d0733c6ffadb907852ea5
-
Filesize
72KB
MD5e14bd0c6d48c8433118ffb1fc951cf99
SHA112a8e805493b15f1f33ffeaea31286126052e755
SHA25681cf0ac083fceab6221e52942124da7cddd158d3a2b78d653cefa9eecca1b78c
SHA512a70b8f065760ef2bd9e3ef87bd2da350e9c2c05c28823b695029de69f1c4a7a744fe7110163af3446a7ec9f76584a71d2a55f434469d0733c6ffadb907852ea5
-
Filesize
72KB
MD5ebc11b585e777852604774a7e6faf90a
SHA16c7390a8ca8ab278f46b497bc6a7e561915b4232
SHA256303e47270a43f883e03e38e02e3d758db44cbd250ca308e6144c10b04e956be2
SHA512168b23d6fa73d55d8fbb03293b875959e24e54f4e156b3c490d01451e0f0a2a44dfc648b933f4f076e5981121d927a284ceca22cabe7c808d4fa8d7969a7cea4
-
Filesize
72KB
MD5ebc11b585e777852604774a7e6faf90a
SHA16c7390a8ca8ab278f46b497bc6a7e561915b4232
SHA256303e47270a43f883e03e38e02e3d758db44cbd250ca308e6144c10b04e956be2
SHA512168b23d6fa73d55d8fbb03293b875959e24e54f4e156b3c490d01451e0f0a2a44dfc648b933f4f076e5981121d927a284ceca22cabe7c808d4fa8d7969a7cea4
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD5f3b7bc5045cad86281d203ca03399f88
SHA127372c248ea027a86e2d3c4b0fd8fecaf4df352c
SHA2565e50cbb423b7981cc53738d39e8768df67a456500c3402e9c6fb619e5414111c
SHA5124c6ddba71de59688d381e43c2a4adbbd350b4fee54fd16814481cd44b03d4851f36010ccaa390ff4d7918d6bd293a0c098cd666b12a1b5442c5b0f1d2bc6453a
-
Filesize
72KB
MD5f3b7bc5045cad86281d203ca03399f88
SHA127372c248ea027a86e2d3c4b0fd8fecaf4df352c
SHA2565e50cbb423b7981cc53738d39e8768df67a456500c3402e9c6fb619e5414111c
SHA5124c6ddba71de59688d381e43c2a4adbbd350b4fee54fd16814481cd44b03d4851f36010ccaa390ff4d7918d6bd293a0c098cd666b12a1b5442c5b0f1d2bc6453a
-
Filesize
72KB
MD51c1203ed7558de8b4f4295e79b177648
SHA10cfbdeabee596d4e896498658284957ffb995d3c
SHA25643c6c69b4e96fd27c29dca639795748b1aac071c5f54b0089d41267fc35121d9
SHA512353b14084d137f24995f9a9ee1749533f7a878dd0e399073036beb546c04242d0c5775e087cd45eb9d8e91799fc8132dc507231abeeefdc725f5909d1fd7b666
-
Filesize
72KB
MD51c1203ed7558de8b4f4295e79b177648
SHA10cfbdeabee596d4e896498658284957ffb995d3c
SHA25643c6c69b4e96fd27c29dca639795748b1aac071c5f54b0089d41267fc35121d9
SHA512353b14084d137f24995f9a9ee1749533f7a878dd0e399073036beb546c04242d0c5775e087cd45eb9d8e91799fc8132dc507231abeeefdc725f5909d1fd7b666
-
Filesize
72KB
MD5ebc11b585e777852604774a7e6faf90a
SHA16c7390a8ca8ab278f46b497bc6a7e561915b4232
SHA256303e47270a43f883e03e38e02e3d758db44cbd250ca308e6144c10b04e956be2
SHA512168b23d6fa73d55d8fbb03293b875959e24e54f4e156b3c490d01451e0f0a2a44dfc648b933f4f076e5981121d927a284ceca22cabe7c808d4fa8d7969a7cea4
-
Filesize
72KB
MD5ebc11b585e777852604774a7e6faf90a
SHA16c7390a8ca8ab278f46b497bc6a7e561915b4232
SHA256303e47270a43f883e03e38e02e3d758db44cbd250ca308e6144c10b04e956be2
SHA512168b23d6fa73d55d8fbb03293b875959e24e54f4e156b3c490d01451e0f0a2a44dfc648b933f4f076e5981121d927a284ceca22cabe7c808d4fa8d7969a7cea4
-
Filesize
72KB
MD5f3b7bc5045cad86281d203ca03399f88
SHA127372c248ea027a86e2d3c4b0fd8fecaf4df352c
SHA2565e50cbb423b7981cc53738d39e8768df67a456500c3402e9c6fb619e5414111c
SHA5124c6ddba71de59688d381e43c2a4adbbd350b4fee54fd16814481cd44b03d4851f36010ccaa390ff4d7918d6bd293a0c098cd666b12a1b5442c5b0f1d2bc6453a
-
Filesize
72KB
MD5f3b7bc5045cad86281d203ca03399f88
SHA127372c248ea027a86e2d3c4b0fd8fecaf4df352c
SHA2565e50cbb423b7981cc53738d39e8768df67a456500c3402e9c6fb619e5414111c
SHA5124c6ddba71de59688d381e43c2a4adbbd350b4fee54fd16814481cd44b03d4851f36010ccaa390ff4d7918d6bd293a0c098cd666b12a1b5442c5b0f1d2bc6453a
-
Filesize
72KB
MD5614d497c573dd2314b46b3709f7fcff3
SHA173e3d7baed58ebad393e4d258d692264590dfa84
SHA256c14ecf991bc458533206fdcbd30e5b3bdbce880ebc411cb8035b47d3468005a0
SHA5129bb6b73a57634e40a4d872305a811c0e3a88bffdbef9c38d17d19f8fd050beb40eb602e4ca76cc2b5ee919a86ea13c42dbc4f6d995b58cbfaee69d6eed237038
-
Filesize
72KB
MD5614d497c573dd2314b46b3709f7fcff3
SHA173e3d7baed58ebad393e4d258d692264590dfa84
SHA256c14ecf991bc458533206fdcbd30e5b3bdbce880ebc411cb8035b47d3468005a0
SHA5129bb6b73a57634e40a4d872305a811c0e3a88bffdbef9c38d17d19f8fd050beb40eb602e4ca76cc2b5ee919a86ea13c42dbc4f6d995b58cbfaee69d6eed237038
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD57e4599c5df383d685f55d67a5b99745a
SHA149f65c391858b2e9492591cadda6777321965c5a
SHA256728e67f8dafa30a49ffbd3f6b50f0921bc1bc39efe5ee68006299e2f74c1b01f
SHA51249c6fabaf0eb8f0dc34c31587571bce468ce733f3295f1e44c1eaa6a962ba7a918ded5c934f15f5477c8b9bef3cffd829ef7c1ce268a97e28fa19eff3840c54a
-
Filesize
72KB
MD59efe1340a4bf165a8a481d33cbc1fc02
SHA18f052861f98ecab31018bdaa149aa27bce2227d0
SHA256c79c0806185b626ef04b51d20671f6dd4993c6c7c5c81d5f4cc264b4168d6923
SHA5126984ac3b37a0f78ddca91bccf3c4623545fc161f8e04d582e21f81d0321c8ce222c3d6ec0b7b71c63418ba70b80dd90206d2199ed1ce67cd29c2dac1c6531d00
-
Filesize
72KB
MD59efe1340a4bf165a8a481d33cbc1fc02
SHA18f052861f98ecab31018bdaa149aa27bce2227d0
SHA256c79c0806185b626ef04b51d20671f6dd4993c6c7c5c81d5f4cc264b4168d6923
SHA5126984ac3b37a0f78ddca91bccf3c4623545fc161f8e04d582e21f81d0321c8ce222c3d6ec0b7b71c63418ba70b80dd90206d2199ed1ce67cd29c2dac1c6531d00
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5a136013fc53d5b8d3127870f35ae5a30
SHA19412987fc492c3eec3fab337f6857cb3efe0ed7c
SHA256657877549565f56bf59ecdb92f0d5de92f9c018b43acad160653394a0dec148f
SHA512f3af759e1db05d7f1bf668f8d0eb13d832b820ad0f67c7279ae035653562f1500ff9509f1734b3e5bba0f6623f93806bab81562a944320a6f9f0072a9a62c177
-
Filesize
72KB
MD5a136013fc53d5b8d3127870f35ae5a30
SHA19412987fc492c3eec3fab337f6857cb3efe0ed7c
SHA256657877549565f56bf59ecdb92f0d5de92f9c018b43acad160653394a0dec148f
SHA512f3af759e1db05d7f1bf668f8d0eb13d832b820ad0f67c7279ae035653562f1500ff9509f1734b3e5bba0f6623f93806bab81562a944320a6f9f0072a9a62c177
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5fc035af0e203c4bfdbf26408daf3efd7
SHA13fa1093db15288b1934d9a73f95977133e450d51
SHA25682194429c97a5bd0d77a0fba9e4de7cb8972d755c37b9d0e62d67aa1368e6cda
SHA51290e44f5f3c7930e99ede7e0a1a0de44daa91807852c0558fb65a0486f8172d1804ebd15678767572a59a8824ab61563098777ead330d68bf5f2273dba18a9acb
-
Filesize
72KB
MD5a136013fc53d5b8d3127870f35ae5a30
SHA19412987fc492c3eec3fab337f6857cb3efe0ed7c
SHA256657877549565f56bf59ecdb92f0d5de92f9c018b43acad160653394a0dec148f
SHA512f3af759e1db05d7f1bf668f8d0eb13d832b820ad0f67c7279ae035653562f1500ff9509f1734b3e5bba0f6623f93806bab81562a944320a6f9f0072a9a62c177
-
Filesize
72KB
MD5a136013fc53d5b8d3127870f35ae5a30
SHA19412987fc492c3eec3fab337f6857cb3efe0ed7c
SHA256657877549565f56bf59ecdb92f0d5de92f9c018b43acad160653394a0dec148f
SHA512f3af759e1db05d7f1bf668f8d0eb13d832b820ad0f67c7279ae035653562f1500ff9509f1734b3e5bba0f6623f93806bab81562a944320a6f9f0072a9a62c177