Analysis
-
max time kernel
152s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:43
Static task
static1
Behavioral task
behavioral1
Sample
41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe
Resource
win10v2004-20221111-en
General
-
Target
41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe
-
Size
72KB
-
MD5
5362209e912ef32b5f7cebb5ac7229d3
-
SHA1
233e09d2e6a92f4f37d23e4e9d4b49b4f17a5684
-
SHA256
41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def
-
SHA512
a64364092905e0326d11749351531469c64dfa08bf3f5ac430d537396db566ce87ddbf5aadbfa4f2afc16bc735dc7da2c8c1d21bfce74220979f35d5e176f989
-
SSDEEP
384:D6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2C:DpQNwC3BEddsEqOt/hyJF+x3BEJwRru
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 45 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exe41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exeSystem Restore.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
Processes:
backup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exe41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe -
Executes dropped EXE 64 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exedata.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exepid process 1000 backup.exe 340 backup.exe 1172 backup.exe 1800 backup.exe 1696 backup.exe 1832 backup.exe 2028 backup.exe 552 backup.exe 1716 backup.exe 1780 backup.exe 1040 backup.exe 2024 data.exe 1032 backup.exe 1588 data.exe 1740 backup.exe 576 backup.exe 1156 System Restore.exe 872 backup.exe 1596 backup.exe 996 backup.exe 1936 update.exe 1112 backup.exe 1732 backup.exe 1952 backup.exe 1712 backup.exe 1380 backup.exe 1088 backup.exe 852 backup.exe 1780 backup.exe 1856 backup.exe 1844 backup.exe 1236 backup.exe 828 backup.exe 592 System Restore.exe 1500 backup.exe 816 backup.exe 1048 backup.exe 1032 backup.exe 1896 backup.exe 1592 backup.exe 1800 System Restore.exe 960 backup.exe 1532 backup.exe 1580 backup.exe 1264 backup.exe 1364 backup.exe 1084 backup.exe 1836 backup.exe 428 backup.exe 1392 data.exe 1816 backup.exe 1996 backup.exe 1504 backup.exe 812 backup.exe 828 backup.exe 1356 backup.exe 1056 backup.exe 796 System Restore.exe 1708 backup.exe 652 backup.exe 1048 backup.exe 1384 backup.exe 1548 backup.exe 876 backup.exe -
Loads dropped DLL 64 IoCs
Processes:
41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exebackup.exebackup.exebackup.exedata.exedata.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exepid process 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 1832 backup.exe 1832 backup.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 552 backup.exe 552 backup.exe 1832 backup.exe 1832 backup.exe 1040 backup.exe 1040 backup.exe 2024 data.exe 2024 data.exe 1832 backup.exe 1832 backup.exe 1040 backup.exe 1040 backup.exe 1588 data.exe 1588 data.exe 1740 backup.exe 1832 backup.exe 1832 backup.exe 1740 backup.exe 1040 backup.exe 1040 backup.exe 576 backup.exe 576 backup.exe 1156 System Restore.exe 872 backup.exe 996 backup.exe 872 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 872 backup.exe 872 backup.exe 1952 backup.exe 1952 backup.exe 1712 backup.exe 1712 backup.exe 1952 backup.exe 1952 backup.exe 1936 update.exe 1936 update.exe 1936 update.exe 1712 backup.exe 1712 backup.exe 1952 backup.exe 1952 backup.exe 1936 update.exe 1936 update.exe 1844 backup.exe 1844 backup.exe -
Drops file in Program Files directory 64 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Services\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Office\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe data.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe data.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe -
Drops file in Windows directory 8 IoCs
Processes:
backup.exebackup.exedescription ioc process File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\CSC\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 59 IoCs
Processes:
41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exedata.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exepid process 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe 1000 backup.exe 340 backup.exe 1172 backup.exe 1800 backup.exe 1696 backup.exe 1832 backup.exe 2028 backup.exe 552 backup.exe 1716 backup.exe 1780 backup.exe 1040 backup.exe 2024 data.exe 1032 backup.exe 1588 data.exe 1740 backup.exe 576 backup.exe 1156 System Restore.exe 1596 backup.exe 872 backup.exe 996 backup.exe 1732 backup.exe 1112 backup.exe 1952 backup.exe 1712 backup.exe 1380 backup.exe 1088 backup.exe 852 backup.exe 1936 update.exe 1780 backup.exe 1856 backup.exe 1844 backup.exe 1236 backup.exe 828 backup.exe 592 System Restore.exe 816 backup.exe 1500 backup.exe 1048 backup.exe 1032 backup.exe 1896 backup.exe 1592 backup.exe 1800 System Restore.exe 1532 backup.exe 1580 backup.exe 1836 backup.exe 1264 backup.exe 1084 backup.exe 1364 backup.exe 1996 backup.exe 1392 data.exe 812 backup.exe 428 backup.exe 652 backup.exe 1048 backup.exe 828 backup.exe 1056 backup.exe 980 backup.exe 268 backup.exe 876 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exebackup.exebackup.exebackup.exebackup.exedata.exedata.exedescription pid process target process PID 568 wrote to memory of 1000 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1000 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1000 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1000 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 340 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 340 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 340 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 340 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1172 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1172 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1172 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1172 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1800 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1800 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1800 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1800 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1696 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1696 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1696 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1696 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 1000 wrote to memory of 1832 1000 backup.exe backup.exe PID 1000 wrote to memory of 1832 1000 backup.exe backup.exe PID 1000 wrote to memory of 1832 1000 backup.exe backup.exe PID 1000 wrote to memory of 1832 1000 backup.exe backup.exe PID 568 wrote to memory of 2028 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 2028 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 2028 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 2028 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 1832 wrote to memory of 552 1832 backup.exe backup.exe PID 1832 wrote to memory of 552 1832 backup.exe backup.exe PID 1832 wrote to memory of 552 1832 backup.exe backup.exe PID 1832 wrote to memory of 552 1832 backup.exe backup.exe PID 568 wrote to memory of 1716 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1716 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1716 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 568 wrote to memory of 1716 568 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe backup.exe PID 552 wrote to memory of 1780 552 backup.exe backup.exe PID 552 wrote to memory of 1780 552 backup.exe backup.exe PID 552 wrote to memory of 1780 552 backup.exe backup.exe PID 552 wrote to memory of 1780 552 backup.exe backup.exe PID 1832 wrote to memory of 1040 1832 backup.exe backup.exe PID 1832 wrote to memory of 1040 1832 backup.exe backup.exe PID 1832 wrote to memory of 1040 1832 backup.exe backup.exe PID 1832 wrote to memory of 1040 1832 backup.exe backup.exe PID 1040 wrote to memory of 2024 1040 backup.exe data.exe PID 1040 wrote to memory of 2024 1040 backup.exe data.exe PID 1040 wrote to memory of 2024 1040 backup.exe data.exe PID 1040 wrote to memory of 2024 1040 backup.exe data.exe PID 2024 wrote to memory of 1032 2024 data.exe backup.exe PID 2024 wrote to memory of 1032 2024 data.exe backup.exe PID 2024 wrote to memory of 1032 2024 data.exe backup.exe PID 2024 wrote to memory of 1032 2024 data.exe backup.exe PID 1832 wrote to memory of 1588 1832 backup.exe data.exe PID 1832 wrote to memory of 1588 1832 backup.exe data.exe PID 1832 wrote to memory of 1588 1832 backup.exe data.exe PID 1832 wrote to memory of 1588 1832 backup.exe data.exe PID 1040 wrote to memory of 1740 1040 backup.exe backup.exe PID 1040 wrote to memory of 1740 1040 backup.exe backup.exe PID 1040 wrote to memory of 1740 1040 backup.exe backup.exe PID 1040 wrote to memory of 1740 1040 backup.exe backup.exe PID 1588 wrote to memory of 576 1588 data.exe backup.exe PID 1588 wrote to memory of 576 1588 data.exe backup.exe PID 1588 wrote to memory of 576 1588 data.exe backup.exe PID 1588 wrote to memory of 576 1588 data.exe backup.exe -
System policy modification 1 TTPs 64 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exebackup.exe41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe"C:\Users\Admin\AppData\Local\Temp\41e1044f386a5dd97c2d84f8d31dfc1b7ac8d72de8a180c81c4e3c11dfd60def.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:568 -
C:\Users\Admin\AppData\Local\Temp\1255017376\backup.exeC:\Users\Admin\AppData\Local\Temp\1255017376\backup.exe C:\Users\Admin\AppData\Local\Temp\1255017376\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1000 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1832 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1780 -
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1040 -
C:\Program Files\7-Zip\data.exe"C:\Program Files\7-Zip\data.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032 -
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1112 -
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1088 -
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1856 -
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:828 -
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816 -
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592 -
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
PID:960 -
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:784
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:1468
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:2112
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1048 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:2136
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:844
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1832
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:2076
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:812 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵PID:2104
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
PID:1548 -
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:1992
-
C:\Program Files (x86)\data.exe"C:\Program Files (x86)\data.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:996 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1732 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1952 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1236 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:428 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Executes dropped EXE
PID:1708 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1320
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1788
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1224
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:2068
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:2152
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1836 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Executes dropped EXE
PID:1384 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1776
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:948
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:2096
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Executes dropped EXE
PID:1356 -
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1364 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
PID:1816 -
C:\Program Files (x86)\Common Files\Adobe AIR\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe AIR\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵
- Executes dropped EXE
PID:796 -
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1664
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:748
-
C:\Program Files (x86)\Common Files\Services\System Restore.exe"C:\Program Files (x86)\Common Files\Services\System Restore.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:1092
-
C:\Program Files (x86)\Common Files\SpeechEngines\System Restore.exe"C:\Program Files (x86)\Common Files\SpeechEngines\System Restore.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:2088
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
PID:1504 -
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:896
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1020
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2124
-
C:\Users\System Restore.exe"C:\Users\System Restore.exe" C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Users\Admin\update.exeC:\Users\Admin\update.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1844 -
C:\Users\Admin\Desktop\System Restore.exe"C:\Users\Admin\Desktop\System Restore.exe" C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032 -
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1896 -
C:\Users\Admin\Favorites\System Restore.exe"C:\Users\Admin\Favorites\System Restore.exe" C:\Users\Admin\Favorites\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1532 -
C:\Users\Admin\Music\data.exeC:\Users\Admin\Music\data.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1392 -
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:652 -
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:1736
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵PID:1752
-
C:\Users\Admin\Videos\backup.exeC:\Users\Admin\Videos\backup.exe C:\Users\Admin\Videos\6⤵PID:1920
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1264 -
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1648
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:1616
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:2060
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:340 -
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD539987c7ebb137f8094145e3f666de56b
SHA1a5e9ae788b683224b5b0b6891ea8df55d395421d
SHA25674f66eda21fc8d1abe5a128141f0e6b4a136ef61303253f6881c30e6c75273db
SHA512f2f849aaf3b01729b52be79a09741a14f598576f00db3c972c8a592777fd2c8a3cf8c5abc98d567e0c0a039b2cff0138b8f568ef37f6723d64e425a7115d3d9c
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD5b2d0ba3f674a3051d966ddcecb85dd62
SHA14a53430fb3e74697553ee6f870dd485cedfb180e
SHA25609943815b8b73836919a092b2bc69ab9b150d53a511ffc251f68974eea6ba96f
SHA512b94f657806dc8c0ecce20f229cac21a36e1a431a0601a3c19852d24f31587e5def471440b071f78dfde0de5b8f466a5b80c5cbfe87394d39af4b91ed0596e8f0
-
Filesize
72KB
MD5b2d0ba3f674a3051d966ddcecb85dd62
SHA14a53430fb3e74697553ee6f870dd485cedfb180e
SHA25609943815b8b73836919a092b2bc69ab9b150d53a511ffc251f68974eea6ba96f
SHA512b94f657806dc8c0ecce20f229cac21a36e1a431a0601a3c19852d24f31587e5def471440b071f78dfde0de5b8f466a5b80c5cbfe87394d39af4b91ed0596e8f0
-
Filesize
72KB
MD5f68fc76c865aca5ae05016817fe010cb
SHA15d00d2019865fb247f9c0e7c8da2625a516826b1
SHA25625d282af85d5ff3418dbfcafe98a402d0d38cadd5767552163b64ac681dbf740
SHA512821bb4f5f4f1b6117f69a12b23988d76c7e2d5af0dc3634ff043f4dd85077e16c2427d26e067b8527c29e47f41203d4f9b06b8374aec4d3e3f37993b80e48b9e
-
Filesize
72KB
MD5f68fc76c865aca5ae05016817fe010cb
SHA15d00d2019865fb247f9c0e7c8da2625a516826b1
SHA25625d282af85d5ff3418dbfcafe98a402d0d38cadd5767552163b64ac681dbf740
SHA512821bb4f5f4f1b6117f69a12b23988d76c7e2d5af0dc3634ff043f4dd85077e16c2427d26e067b8527c29e47f41203d4f9b06b8374aec4d3e3f37993b80e48b9e
-
Filesize
72KB
MD57e9df9c7c8fbc651a31d36d890b20277
SHA1db53d267179c6c47a352cebfacafb19aad32c028
SHA2562870929d04cbc00a3152506c8f18cda801f3aa0a14cfc0754a0e39c59a630f92
SHA512e05f122fe029db7b0953634b9d330bd67357199f29f96cf15a4083c4bd6f545e4f98a18dd7f19a56843d7858c9e0568fc26b73fdf9e723d80a0428433381eb6c
-
Filesize
72KB
MD539987c7ebb137f8094145e3f666de56b
SHA1a5e9ae788b683224b5b0b6891ea8df55d395421d
SHA25674f66eda21fc8d1abe5a128141f0e6b4a136ef61303253f6881c30e6c75273db
SHA512f2f849aaf3b01729b52be79a09741a14f598576f00db3c972c8a592777fd2c8a3cf8c5abc98d567e0c0a039b2cff0138b8f568ef37f6723d64e425a7115d3d9c
-
Filesize
72KB
MD539987c7ebb137f8094145e3f666de56b
SHA1a5e9ae788b683224b5b0b6891ea8df55d395421d
SHA25674f66eda21fc8d1abe5a128141f0e6b4a136ef61303253f6881c30e6c75273db
SHA512f2f849aaf3b01729b52be79a09741a14f598576f00db3c972c8a592777fd2c8a3cf8c5abc98d567e0c0a039b2cff0138b8f568ef37f6723d64e425a7115d3d9c
-
Filesize
72KB
MD587cb6042c6f48349eab88405fd3a20c9
SHA1ecfc9103dc282c84e6378a7a5c6ea905f484aacc
SHA256d8d2fa9e60def60f2d82e1a4811d83451322a590d40553c1e65bb99fa3c1163e
SHA51217366949b9799a40e356689ebc29f92dfdc1df1e0f61f453941716e11424db427659c9e656b546312eb08d7a79443c0427bdab278a6cb5f86307ddf78830f972
-
Filesize
72KB
MD5f8b8d3a7989ad8a7a17e573a8ecf4ae8
SHA16c9e7e968a739e4618def1173057e13c0a20a9e2
SHA25609f121fb964d9c28997618c6706df843a41bab3354aea1f09a473fc44fc29778
SHA51217f10acd682422f69140e8fb8929f70ec91d9cdd5d5529b5c9b92652f21f850395a87250c102732865cb752c9ac52809dce8820be7cb7495a1b5be0fafe2bfc7
-
Filesize
72KB
MD5f8b8d3a7989ad8a7a17e573a8ecf4ae8
SHA16c9e7e968a739e4618def1173057e13c0a20a9e2
SHA25609f121fb964d9c28997618c6706df843a41bab3354aea1f09a473fc44fc29778
SHA51217f10acd682422f69140e8fb8929f70ec91d9cdd5d5529b5c9b92652f21f850395a87250c102732865cb752c9ac52809dce8820be7cb7495a1b5be0fafe2bfc7
-
Filesize
72KB
MD575bce4f058546aba2374414657924d01
SHA188ad56e031737b975482eacfbe46a882d435a1db
SHA256177b240243460d0ec1e53e292eab0f7d366006070f89398ef24590a4a1f78760
SHA51292ec8cc21d910e6ee28108431a0f09326e6c6bd88185d33d3e6be2d421dd00356b16d3d88145eb2d11429ea0665756d7c17de26cc532695fe8cb634c6f522580
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b6357d97a5a17850efaf7e93859a62db
SHA113bcada2d949169010ce5c037ac6d68993aed8a8
SHA256396637a892ddb89d6fb782676fac1bf119989e63da1133614928260684b0337b
SHA512a9b2ec2ddf6d78da4071fd275bead2bf99d6c8a256ab6cbe5613866545a779341feeb10aeb6271e473ac5ce94d2b398051e2fed895157033480766e246403c85
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b6357d97a5a17850efaf7e93859a62db
SHA113bcada2d949169010ce5c037ac6d68993aed8a8
SHA256396637a892ddb89d6fb782676fac1bf119989e63da1133614928260684b0337b
SHA512a9b2ec2ddf6d78da4071fd275bead2bf99d6c8a256ab6cbe5613866545a779341feeb10aeb6271e473ac5ce94d2b398051e2fed895157033480766e246403c85
-
Filesize
72KB
MD5ce17df88f7f13ede9a6f2183fb8f34d6
SHA1b3835691f6d0741ddca572a76929fb1db8f21c7a
SHA2561e0baf7269b876595bd0cbb10e16ebd985a6afb8cad2d3f517e674f9e7f5af3d
SHA5120d2e55ad52513ed5ec5d188a5a38b8de1c23be5eed13e6b981843cd09990df35abeea7ef8b7fe465901827cc12af0ee6f65338cc387c150fd81fb7c7c77c0aa8
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5ce17df88f7f13ede9a6f2183fb8f34d6
SHA1b3835691f6d0741ddca572a76929fb1db8f21c7a
SHA2561e0baf7269b876595bd0cbb10e16ebd985a6afb8cad2d3f517e674f9e7f5af3d
SHA5120d2e55ad52513ed5ec5d188a5a38b8de1c23be5eed13e6b981843cd09990df35abeea7ef8b7fe465901827cc12af0ee6f65338cc387c150fd81fb7c7c77c0aa8
-
Filesize
72KB
MD505e4e4a51a03402c8428d4627d4dfe44
SHA15ef1d2e63ba3f9265c25721f13683c562e08374d
SHA256b33097a8d5517a2e1249c0950ae0aa3a734cc8d8d47bbf3b6ea138758e3c4d2a
SHA512f5b69214bfca61a0fa60bdbe341e5b87168801ea5a3ef7e1cdf04d9d3baecdbb7ad65c3282b0cc613b578e8386da973b2bf19f665793ea230246d53711ea7c9b
-
Filesize
72KB
MD5d5cc25b1f43aa1907dd33b3f1e8d0cf3
SHA14482592b23d3d7845af48f4f20e0b6c36fef8678
SHA2565ddd41994d52fb7b02952511eb18b73f1bc206cd1ad21277035d5da436073e83
SHA5120fd4a37f09dd70f7abf6e6cdd8a6949fb86e65b4bdc7ffebea767e96bbc3c46a979f57ba60fc8c79153ec9a88dc8d706f3f3d94db6863081624a0290964fe166
-
Filesize
72KB
MD5d5cc25b1f43aa1907dd33b3f1e8d0cf3
SHA14482592b23d3d7845af48f4f20e0b6c36fef8678
SHA2565ddd41994d52fb7b02952511eb18b73f1bc206cd1ad21277035d5da436073e83
SHA5120fd4a37f09dd70f7abf6e6cdd8a6949fb86e65b4bdc7ffebea767e96bbc3c46a979f57ba60fc8c79153ec9a88dc8d706f3f3d94db6863081624a0290964fe166
-
Filesize
72KB
MD539987c7ebb137f8094145e3f666de56b
SHA1a5e9ae788b683224b5b0b6891ea8df55d395421d
SHA25674f66eda21fc8d1abe5a128141f0e6b4a136ef61303253f6881c30e6c75273db
SHA512f2f849aaf3b01729b52be79a09741a14f598576f00db3c972c8a592777fd2c8a3cf8c5abc98d567e0c0a039b2cff0138b8f568ef37f6723d64e425a7115d3d9c
-
Filesize
72KB
MD539987c7ebb137f8094145e3f666de56b
SHA1a5e9ae788b683224b5b0b6891ea8df55d395421d
SHA25674f66eda21fc8d1abe5a128141f0e6b4a136ef61303253f6881c30e6c75273db
SHA512f2f849aaf3b01729b52be79a09741a14f598576f00db3c972c8a592777fd2c8a3cf8c5abc98d567e0c0a039b2cff0138b8f568ef37f6723d64e425a7115d3d9c
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD5e0d2020f3d105b6a178a17bd1c222eca
SHA125d7e51bc3633732cc76b5c4c7c2b9aba976ecea
SHA256e988e97d928a59098d65f195b1b8ca0db86f5443d103f22a8dfa1e507c38d3ca
SHA512589b2a5deb9a7d675ed29288f0d249b1b0a165abe176b1b2510b7ea16c97c90fe3af3b3cdf8b66b393447b0cbabfeee1c78cc173667b0080a553e2e6ee28c369
-
Filesize
72KB
MD5b2d0ba3f674a3051d966ddcecb85dd62
SHA14a53430fb3e74697553ee6f870dd485cedfb180e
SHA25609943815b8b73836919a092b2bc69ab9b150d53a511ffc251f68974eea6ba96f
SHA512b94f657806dc8c0ecce20f229cac21a36e1a431a0601a3c19852d24f31587e5def471440b071f78dfde0de5b8f466a5b80c5cbfe87394d39af4b91ed0596e8f0
-
Filesize
72KB
MD5b2d0ba3f674a3051d966ddcecb85dd62
SHA14a53430fb3e74697553ee6f870dd485cedfb180e
SHA25609943815b8b73836919a092b2bc69ab9b150d53a511ffc251f68974eea6ba96f
SHA512b94f657806dc8c0ecce20f229cac21a36e1a431a0601a3c19852d24f31587e5def471440b071f78dfde0de5b8f466a5b80c5cbfe87394d39af4b91ed0596e8f0
-
Filesize
72KB
MD5f68fc76c865aca5ae05016817fe010cb
SHA15d00d2019865fb247f9c0e7c8da2625a516826b1
SHA25625d282af85d5ff3418dbfcafe98a402d0d38cadd5767552163b64ac681dbf740
SHA512821bb4f5f4f1b6117f69a12b23988d76c7e2d5af0dc3634ff043f4dd85077e16c2427d26e067b8527c29e47f41203d4f9b06b8374aec4d3e3f37993b80e48b9e
-
Filesize
72KB
MD5f68fc76c865aca5ae05016817fe010cb
SHA15d00d2019865fb247f9c0e7c8da2625a516826b1
SHA25625d282af85d5ff3418dbfcafe98a402d0d38cadd5767552163b64ac681dbf740
SHA512821bb4f5f4f1b6117f69a12b23988d76c7e2d5af0dc3634ff043f4dd85077e16c2427d26e067b8527c29e47f41203d4f9b06b8374aec4d3e3f37993b80e48b9e
-
Filesize
72KB
MD57e9df9c7c8fbc651a31d36d890b20277
SHA1db53d267179c6c47a352cebfacafb19aad32c028
SHA2562870929d04cbc00a3152506c8f18cda801f3aa0a14cfc0754a0e39c59a630f92
SHA512e05f122fe029db7b0953634b9d330bd67357199f29f96cf15a4083c4bd6f545e4f98a18dd7f19a56843d7858c9e0568fc26b73fdf9e723d80a0428433381eb6c
-
Filesize
72KB
MD57e9df9c7c8fbc651a31d36d890b20277
SHA1db53d267179c6c47a352cebfacafb19aad32c028
SHA2562870929d04cbc00a3152506c8f18cda801f3aa0a14cfc0754a0e39c59a630f92
SHA512e05f122fe029db7b0953634b9d330bd67357199f29f96cf15a4083c4bd6f545e4f98a18dd7f19a56843d7858c9e0568fc26b73fdf9e723d80a0428433381eb6c
-
Filesize
72KB
MD539987c7ebb137f8094145e3f666de56b
SHA1a5e9ae788b683224b5b0b6891ea8df55d395421d
SHA25674f66eda21fc8d1abe5a128141f0e6b4a136ef61303253f6881c30e6c75273db
SHA512f2f849aaf3b01729b52be79a09741a14f598576f00db3c972c8a592777fd2c8a3cf8c5abc98d567e0c0a039b2cff0138b8f568ef37f6723d64e425a7115d3d9c
-
Filesize
72KB
MD539987c7ebb137f8094145e3f666de56b
SHA1a5e9ae788b683224b5b0b6891ea8df55d395421d
SHA25674f66eda21fc8d1abe5a128141f0e6b4a136ef61303253f6881c30e6c75273db
SHA512f2f849aaf3b01729b52be79a09741a14f598576f00db3c972c8a592777fd2c8a3cf8c5abc98d567e0c0a039b2cff0138b8f568ef37f6723d64e425a7115d3d9c
-
Filesize
72KB
MD587cb6042c6f48349eab88405fd3a20c9
SHA1ecfc9103dc282c84e6378a7a5c6ea905f484aacc
SHA256d8d2fa9e60def60f2d82e1a4811d83451322a590d40553c1e65bb99fa3c1163e
SHA51217366949b9799a40e356689ebc29f92dfdc1df1e0f61f453941716e11424db427659c9e656b546312eb08d7a79443c0427bdab278a6cb5f86307ddf78830f972
-
Filesize
72KB
MD587cb6042c6f48349eab88405fd3a20c9
SHA1ecfc9103dc282c84e6378a7a5c6ea905f484aacc
SHA256d8d2fa9e60def60f2d82e1a4811d83451322a590d40553c1e65bb99fa3c1163e
SHA51217366949b9799a40e356689ebc29f92dfdc1df1e0f61f453941716e11424db427659c9e656b546312eb08d7a79443c0427bdab278a6cb5f86307ddf78830f972
-
Filesize
72KB
MD5f8b8d3a7989ad8a7a17e573a8ecf4ae8
SHA16c9e7e968a739e4618def1173057e13c0a20a9e2
SHA25609f121fb964d9c28997618c6706df843a41bab3354aea1f09a473fc44fc29778
SHA51217f10acd682422f69140e8fb8929f70ec91d9cdd5d5529b5c9b92652f21f850395a87250c102732865cb752c9ac52809dce8820be7cb7495a1b5be0fafe2bfc7
-
Filesize
72KB
MD5f8b8d3a7989ad8a7a17e573a8ecf4ae8
SHA16c9e7e968a739e4618def1173057e13c0a20a9e2
SHA25609f121fb964d9c28997618c6706df843a41bab3354aea1f09a473fc44fc29778
SHA51217f10acd682422f69140e8fb8929f70ec91d9cdd5d5529b5c9b92652f21f850395a87250c102732865cb752c9ac52809dce8820be7cb7495a1b5be0fafe2bfc7
-
Filesize
72KB
MD575bce4f058546aba2374414657924d01
SHA188ad56e031737b975482eacfbe46a882d435a1db
SHA256177b240243460d0ec1e53e292eab0f7d366006070f89398ef24590a4a1f78760
SHA51292ec8cc21d910e6ee28108431a0f09326e6c6bd88185d33d3e6be2d421dd00356b16d3d88145eb2d11429ea0665756d7c17de26cc532695fe8cb634c6f522580
-
Filesize
72KB
MD575bce4f058546aba2374414657924d01
SHA188ad56e031737b975482eacfbe46a882d435a1db
SHA256177b240243460d0ec1e53e292eab0f7d366006070f89398ef24590a4a1f78760
SHA51292ec8cc21d910e6ee28108431a0f09326e6c6bd88185d33d3e6be2d421dd00356b16d3d88145eb2d11429ea0665756d7c17de26cc532695fe8cb634c6f522580
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD52ee1b788bb3bd1f02a64da4eff5b45f5
SHA129d9c1396a04161218a2d6432656649a3866b194
SHA25636fd6737cc6aa72f8cc5125fe5199fc4f67074b5dd4bb9d286321cc4c6455506
SHA5129aa0cb694121a40be34f14486982615ad8f55f0c33a3c5001084200ee767ec13ba4d6f8e9ff64dd85473bb113e62bf77a9c3cc15ddae89353f75d6796b995a04
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b6357d97a5a17850efaf7e93859a62db
SHA113bcada2d949169010ce5c037ac6d68993aed8a8
SHA256396637a892ddb89d6fb782676fac1bf119989e63da1133614928260684b0337b
SHA512a9b2ec2ddf6d78da4071fd275bead2bf99d6c8a256ab6cbe5613866545a779341feeb10aeb6271e473ac5ce94d2b398051e2fed895157033480766e246403c85
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b6357d97a5a17850efaf7e93859a62db
SHA113bcada2d949169010ce5c037ac6d68993aed8a8
SHA256396637a892ddb89d6fb782676fac1bf119989e63da1133614928260684b0337b
SHA512a9b2ec2ddf6d78da4071fd275bead2bf99d6c8a256ab6cbe5613866545a779341feeb10aeb6271e473ac5ce94d2b398051e2fed895157033480766e246403c85
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b6357d97a5a17850efaf7e93859a62db
SHA113bcada2d949169010ce5c037ac6d68993aed8a8
SHA256396637a892ddb89d6fb782676fac1bf119989e63da1133614928260684b0337b
SHA512a9b2ec2ddf6d78da4071fd275bead2bf99d6c8a256ab6cbe5613866545a779341feeb10aeb6271e473ac5ce94d2b398051e2fed895157033480766e246403c85
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b6357d97a5a17850efaf7e93859a62db
SHA113bcada2d949169010ce5c037ac6d68993aed8a8
SHA256396637a892ddb89d6fb782676fac1bf119989e63da1133614928260684b0337b
SHA512a9b2ec2ddf6d78da4071fd275bead2bf99d6c8a256ab6cbe5613866545a779341feeb10aeb6271e473ac5ce94d2b398051e2fed895157033480766e246403c85
-
Filesize
72KB
MD5ce17df88f7f13ede9a6f2183fb8f34d6
SHA1b3835691f6d0741ddca572a76929fb1db8f21c7a
SHA2561e0baf7269b876595bd0cbb10e16ebd985a6afb8cad2d3f517e674f9e7f5af3d
SHA5120d2e55ad52513ed5ec5d188a5a38b8de1c23be5eed13e6b981843cd09990df35abeea7ef8b7fe465901827cc12af0ee6f65338cc387c150fd81fb7c7c77c0aa8
-
Filesize
72KB
MD5ce17df88f7f13ede9a6f2183fb8f34d6
SHA1b3835691f6d0741ddca572a76929fb1db8f21c7a
SHA2561e0baf7269b876595bd0cbb10e16ebd985a6afb8cad2d3f517e674f9e7f5af3d
SHA5120d2e55ad52513ed5ec5d188a5a38b8de1c23be5eed13e6b981843cd09990df35abeea7ef8b7fe465901827cc12af0ee6f65338cc387c150fd81fb7c7c77c0aa8
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5447800315f0e734c6d7d0b339156a299
SHA190cc37ca9a59b569b5156edd204e6b1f5a05de6c
SHA2564a1448bc6c9000cfbf76401e8e2ce5c6d02cbd5d61ea413f7d10698fdd04a5c2
SHA512a9dbf6016aa988eaa3152e09501fe79775868c5364b48aa1fdee842e6e630968a200dc29e0cb4de860b0721f547625191a5753f4000a1bb2ad23eb9c565c8a15
-
Filesize
72KB
MD5ce17df88f7f13ede9a6f2183fb8f34d6
SHA1b3835691f6d0741ddca572a76929fb1db8f21c7a
SHA2561e0baf7269b876595bd0cbb10e16ebd985a6afb8cad2d3f517e674f9e7f5af3d
SHA5120d2e55ad52513ed5ec5d188a5a38b8de1c23be5eed13e6b981843cd09990df35abeea7ef8b7fe465901827cc12af0ee6f65338cc387c150fd81fb7c7c77c0aa8
-
Filesize
72KB
MD5ce17df88f7f13ede9a6f2183fb8f34d6
SHA1b3835691f6d0741ddca572a76929fb1db8f21c7a
SHA2561e0baf7269b876595bd0cbb10e16ebd985a6afb8cad2d3f517e674f9e7f5af3d
SHA5120d2e55ad52513ed5ec5d188a5a38b8de1c23be5eed13e6b981843cd09990df35abeea7ef8b7fe465901827cc12af0ee6f65338cc387c150fd81fb7c7c77c0aa8
-
Filesize
72KB
MD505e4e4a51a03402c8428d4627d4dfe44
SHA15ef1d2e63ba3f9265c25721f13683c562e08374d
SHA256b33097a8d5517a2e1249c0950ae0aa3a734cc8d8d47bbf3b6ea138758e3c4d2a
SHA512f5b69214bfca61a0fa60bdbe341e5b87168801ea5a3ef7e1cdf04d9d3baecdbb7ad65c3282b0cc613b578e8386da973b2bf19f665793ea230246d53711ea7c9b
-
Filesize
72KB
MD505e4e4a51a03402c8428d4627d4dfe44
SHA15ef1d2e63ba3f9265c25721f13683c562e08374d
SHA256b33097a8d5517a2e1249c0950ae0aa3a734cc8d8d47bbf3b6ea138758e3c4d2a
SHA512f5b69214bfca61a0fa60bdbe341e5b87168801ea5a3ef7e1cdf04d9d3baecdbb7ad65c3282b0cc613b578e8386da973b2bf19f665793ea230246d53711ea7c9b