Analysis
-
max time kernel
154s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 13:48
Static task
static1
Behavioral task
behavioral1
Sample
c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe
Resource
win10v2004-20221111-en
General
-
Target
c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe
-
Size
72KB
-
MD5
039047b418085e1143f6c96f6a64a58f
-
SHA1
2ed95fca3ec2b0673437d9750f84639acb333769
-
SHA256
c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6
-
SHA512
22df1a0407b48e874a0b3e18ea176fb29680af3a8f02cdf25c3d1439669d112cee0913e1858e7f8cfeda0138a6f526a5eb11336bf3600a79b78fd1dc06f99919
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2h:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrt
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1156 backup.exe 3908 backup.exe 1544 backup.exe 4444 backup.exe 4356 backup.exe 2664 backup.exe 4816 backup.exe 2992 backup.exe 4716 data.exe 4732 backup.exe 3788 backup.exe 696 backup.exe 4696 backup.exe 4968 backup.exe 4880 backup.exe 3484 backup.exe 4960 data.exe 1744 backup.exe 1760 backup.exe 2420 data.exe 1892 backup.exe 3740 backup.exe 2956 backup.exe 2712 backup.exe 3348 backup.exe 1884 backup.exe 5016 backup.exe 3144 backup.exe 4216 backup.exe 3996 backup.exe 820 backup.exe 404 update.exe 1988 update.exe 3220 backup.exe 1104 backup.exe 4604 backup.exe 2304 backup.exe 1468 backup.exe 4152 backup.exe 8 backup.exe 4160 backup.exe 2572 backup.exe 4356 backup.exe 3988 backup.exe 2564 backup.exe 4032 backup.exe 4328 backup.exe 4184 backup.exe 4724 backup.exe 2288 backup.exe 1428 data.exe 3624 backup.exe 5096 backup.exe 3752 backup.exe 3880 backup.exe 4212 backup.exe 3196 backup.exe 768 backup.exe 4192 backup.exe 3020 backup.exe 812 data.exe 2256 backup.exe 3612 backup.exe 4292 backup.exe -
Drops file in Program Files directory 59 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe data.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 1156 backup.exe 3908 backup.exe 1544 backup.exe 4444 backup.exe 4356 backup.exe 2664 backup.exe 4816 backup.exe 2992 backup.exe 4716 data.exe 4732 backup.exe 3788 backup.exe 696 backup.exe 4696 backup.exe 4968 backup.exe 4880 backup.exe 3484 backup.exe 4960 data.exe 1744 backup.exe 1760 backup.exe 2420 data.exe 1892 backup.exe 3740 backup.exe 2956 backup.exe 2712 backup.exe 3348 backup.exe 1884 backup.exe 5016 backup.exe 3144 backup.exe 4644 backup.exe 3996 backup.exe 404 update.exe 820 backup.exe 1988 update.exe 3220 backup.exe 1104 backup.exe 4604 backup.exe 2304 backup.exe 1468 backup.exe 4152 backup.exe 8 backup.exe 2572 backup.exe 4356 backup.exe 4160 backup.exe 3988 backup.exe 2564 backup.exe 4032 backup.exe 4328 backup.exe 4184 backup.exe 4724 backup.exe 2288 backup.exe 1428 data.exe 3624 backup.exe 3752 backup.exe 5096 backup.exe 3880 backup.exe 4212 backup.exe 768 backup.exe 3196 backup.exe 4192 backup.exe 3020 backup.exe 812 data.exe 2256 backup.exe 3612 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 1156 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 83 PID 912 wrote to memory of 1156 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 83 PID 912 wrote to memory of 1156 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 83 PID 912 wrote to memory of 3908 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 84 PID 912 wrote to memory of 3908 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 84 PID 912 wrote to memory of 3908 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 84 PID 912 wrote to memory of 1544 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 85 PID 912 wrote to memory of 1544 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 85 PID 912 wrote to memory of 1544 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 85 PID 912 wrote to memory of 4444 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 86 PID 912 wrote to memory of 4444 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 86 PID 912 wrote to memory of 4444 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 86 PID 912 wrote to memory of 4356 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 87 PID 912 wrote to memory of 4356 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 87 PID 912 wrote to memory of 4356 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 87 PID 912 wrote to memory of 2664 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 88 PID 912 wrote to memory of 2664 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 88 PID 912 wrote to memory of 2664 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 88 PID 912 wrote to memory of 4816 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 89 PID 912 wrote to memory of 4816 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 89 PID 912 wrote to memory of 4816 912 c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe 89 PID 1156 wrote to memory of 2992 1156 backup.exe 90 PID 1156 wrote to memory of 2992 1156 backup.exe 90 PID 1156 wrote to memory of 2992 1156 backup.exe 90 PID 2992 wrote to memory of 4716 2992 backup.exe 91 PID 2992 wrote to memory of 4716 2992 backup.exe 91 PID 2992 wrote to memory of 4716 2992 backup.exe 91 PID 2992 wrote to memory of 4732 2992 backup.exe 92 PID 2992 wrote to memory of 4732 2992 backup.exe 92 PID 2992 wrote to memory of 4732 2992 backup.exe 92 PID 2992 wrote to memory of 3788 2992 backup.exe 93 PID 2992 wrote to memory of 3788 2992 backup.exe 93 PID 2992 wrote to memory of 3788 2992 backup.exe 93 PID 3788 wrote to memory of 696 3788 backup.exe 94 PID 3788 wrote to memory of 696 3788 backup.exe 94 PID 3788 wrote to memory of 696 3788 backup.exe 94 PID 2992 wrote to memory of 4696 2992 backup.exe 96 PID 2992 wrote to memory of 4696 2992 backup.exe 96 PID 2992 wrote to memory of 4696 2992 backup.exe 96 PID 696 wrote to memory of 4968 696 backup.exe 95 PID 696 wrote to memory of 4968 696 backup.exe 95 PID 696 wrote to memory of 4968 696 backup.exe 95 PID 3788 wrote to memory of 4880 3788 backup.exe 97 PID 3788 wrote to memory of 4880 3788 backup.exe 97 PID 3788 wrote to memory of 4880 3788 backup.exe 97 PID 4880 wrote to memory of 3484 4880 backup.exe 98 PID 4880 wrote to memory of 3484 4880 backup.exe 98 PID 4880 wrote to memory of 3484 4880 backup.exe 98 PID 4880 wrote to memory of 4960 4880 backup.exe 100 PID 4880 wrote to memory of 4960 4880 backup.exe 100 PID 4880 wrote to memory of 4960 4880 backup.exe 100 PID 4696 wrote to memory of 1744 4696 backup.exe 99 PID 4696 wrote to memory of 1744 4696 backup.exe 99 PID 4696 wrote to memory of 1744 4696 backup.exe 99 PID 4960 wrote to memory of 1760 4960 data.exe 101 PID 4960 wrote to memory of 1760 4960 data.exe 101 PID 4960 wrote to memory of 1760 4960 data.exe 101 PID 1744 wrote to memory of 2420 1744 backup.exe 102 PID 1744 wrote to memory of 2420 1744 backup.exe 102 PID 1744 wrote to memory of 2420 1744 backup.exe 102 PID 2420 wrote to memory of 1892 2420 data.exe 103 PID 2420 wrote to memory of 1892 2420 data.exe 103 PID 2420 wrote to memory of 1892 2420 data.exe 103 PID 4960 wrote to memory of 3740 4960 data.exe 104 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe"C:\Users\Admin\AppData\Local\Temp\c52bb87729f91ce55523df0f8dfad587b22aab45c9aa1d5bd24947bd1eab05d6.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\986827290\backup.exeC:\Users\Admin\AppData\Local\Temp\986827290\backup.exe C:\Users\Admin\AppData\Local\Temp\986827290\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1156 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\odt\data.exeC:\odt\data.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4716
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4732
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4968
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4880 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3484
-
-
C:\Program Files\Common Files\microsoft shared\data.exe"C:\Program Files\Common Files\microsoft shared\data.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4960 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3740 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2712
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1884
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3144
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\update.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\update.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:404
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1104
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2572
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4032
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\data.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\data.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3880
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:768
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2556
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4844
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4080
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵PID:1984
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵PID:972
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:820 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3220 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4604 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4356 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4328
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3752
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\data.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:812
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:4292
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2904
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1076
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵PID:2896
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1416
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:3400
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4696 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1744 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\data.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\data.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2420 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2956 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3348 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3996 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2304
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4152
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4160
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3988 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2288
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5096 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3196
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:968 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:3844
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\8⤵PID:2880
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:4304
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:4216 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:4644 -
C:\Users\Admin\3D Objects\update.exe"C:\Users\Admin\3D Objects\update.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1988
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:8
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2564
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4184
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3624
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4212
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4192
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3612
-
-
C:\Users\Admin\Pictures\System Restore.exe"C:\Users\Admin\Pictures\System Restore.exe" C:\Users\Admin\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:4876 -
C:\Users\Admin\Pictures\Camera Roll\backup.exe"C:\Users\Admin\Pictures\Camera Roll\backup.exe" C:\Users\Admin\Pictures\Camera Roll\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:3468
-
-
C:\Users\Admin\Pictures\Saved Pictures\backup.exe"C:\Users\Admin\Pictures\Saved Pictures\backup.exe" C:\Users\Admin\Pictures\Saved Pictures\7⤵PID:3864
-
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:4340
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD55e79641d4b6d952d26a00d43140ff92e
SHA18e167b76a8a0c5094dfba3409ca80bc6ae6efcc2
SHA256f8e5ac712bed98fa81f38fc3eb9e114f1c988b5ad534a544b0b5a4d701cb1d02
SHA51269618d34a12304c247dae9ad811ba5999ebf5f39cd1f5b201162dc206b12cec18bd552e48723704422456e4be00bf78648c9f4608ebd1fdd246160e0b3567cf5
-
Filesize
72KB
MD55e79641d4b6d952d26a00d43140ff92e
SHA18e167b76a8a0c5094dfba3409ca80bc6ae6efcc2
SHA256f8e5ac712bed98fa81f38fc3eb9e114f1c988b5ad534a544b0b5a4d701cb1d02
SHA51269618d34a12304c247dae9ad811ba5999ebf5f39cd1f5b201162dc206b12cec18bd552e48723704422456e4be00bf78648c9f4608ebd1fdd246160e0b3567cf5
-
Filesize
72KB
MD5384000647bf3585cefce3efdfefaf3e5
SHA11a52b102c7726ca24168e95db284f6c51214b4bf
SHA256999695d278c95428f6e364556b1fb0e8313076b63c8294aaab8fc774ff889bbf
SHA5129f1ece56d2813ab922640c8e574a2edd18a7e85a1b67c549084aae90c68239fc04ac3c3bcc6012bd7fbc6594f801d5f2fa94a1d8517821c91fe12fb4a4f370d1
-
Filesize
72KB
MD5384000647bf3585cefce3efdfefaf3e5
SHA11a52b102c7726ca24168e95db284f6c51214b4bf
SHA256999695d278c95428f6e364556b1fb0e8313076b63c8294aaab8fc774ff889bbf
SHA5129f1ece56d2813ab922640c8e574a2edd18a7e85a1b67c549084aae90c68239fc04ac3c3bcc6012bd7fbc6594f801d5f2fa94a1d8517821c91fe12fb4a4f370d1
-
Filesize
72KB
MD561ecf10f180ad6b37a2b8dd873579a4f
SHA16ac67ee647b19ba3b18b396f928daf3ddf5bd2c8
SHA25644a9fb92a71366976f604329e9c2413e9ae84756028b62561b0f82f93d82f0e4
SHA51225f052ff577cf8748f996c8dcbe031f3f5c5657dda784d818fe533870b73bbbda4fd355247393c820c219857d31d426c40c2f80632bd00b3b692e5dee5de8e86
-
Filesize
72KB
MD561ecf10f180ad6b37a2b8dd873579a4f
SHA16ac67ee647b19ba3b18b396f928daf3ddf5bd2c8
SHA25644a9fb92a71366976f604329e9c2413e9ae84756028b62561b0f82f93d82f0e4
SHA51225f052ff577cf8748f996c8dcbe031f3f5c5657dda784d818fe533870b73bbbda4fd355247393c820c219857d31d426c40c2f80632bd00b3b692e5dee5de8e86
-
Filesize
72KB
MD5183488c0496923bd7e2325823c2463a4
SHA1bd7d6f0ccef2085106effd9b3004d90216e2dd6f
SHA256e0e5c68016551f1fce9b62f2f9f958c279e3a3c69dc3afbe72a72bb50918fd9e
SHA5125e37d68c296ec9465be83e8f95756a6acfe30e543125b0dbdf5429ffee0290f1b0fec9b54065beb3a71bc1f1b263d035506af5ae73bacddcd032a30482b5143c
-
Filesize
72KB
MD5183488c0496923bd7e2325823c2463a4
SHA1bd7d6f0ccef2085106effd9b3004d90216e2dd6f
SHA256e0e5c68016551f1fce9b62f2f9f958c279e3a3c69dc3afbe72a72bb50918fd9e
SHA5125e37d68c296ec9465be83e8f95756a6acfe30e543125b0dbdf5429ffee0290f1b0fec9b54065beb3a71bc1f1b263d035506af5ae73bacddcd032a30482b5143c
-
Filesize
72KB
MD5a49f5fed8b1bec135775876bed2b0563
SHA1c1e543f30ec2cf3aa34bf2a258c30a7e7857aa47
SHA2562ec41f8c556c4f98c5f0d3906cb11934c31b9f95ac90ea7238d9e450bbc20821
SHA5120195ecb6c89cb0f357e9be7ec877b46e9f613398ba5bbb1225e5f96f394cfea63fc1232e491c972a20cf805263870fb80b10d936c22efa1fc3a5ca322463ec21
-
Filesize
72KB
MD5a49f5fed8b1bec135775876bed2b0563
SHA1c1e543f30ec2cf3aa34bf2a258c30a7e7857aa47
SHA2562ec41f8c556c4f98c5f0d3906cb11934c31b9f95ac90ea7238d9e450bbc20821
SHA5120195ecb6c89cb0f357e9be7ec877b46e9f613398ba5bbb1225e5f96f394cfea63fc1232e491c972a20cf805263870fb80b10d936c22efa1fc3a5ca322463ec21
-
Filesize
72KB
MD5384000647bf3585cefce3efdfefaf3e5
SHA11a52b102c7726ca24168e95db284f6c51214b4bf
SHA256999695d278c95428f6e364556b1fb0e8313076b63c8294aaab8fc774ff889bbf
SHA5129f1ece56d2813ab922640c8e574a2edd18a7e85a1b67c549084aae90c68239fc04ac3c3bcc6012bd7fbc6594f801d5f2fa94a1d8517821c91fe12fb4a4f370d1
-
Filesize
72KB
MD5384000647bf3585cefce3efdfefaf3e5
SHA11a52b102c7726ca24168e95db284f6c51214b4bf
SHA256999695d278c95428f6e364556b1fb0e8313076b63c8294aaab8fc774ff889bbf
SHA5129f1ece56d2813ab922640c8e574a2edd18a7e85a1b67c549084aae90c68239fc04ac3c3bcc6012bd7fbc6594f801d5f2fa94a1d8517821c91fe12fb4a4f370d1
-
Filesize
72KB
MD5f8a87946d9dbd739ceb69868a2cbe2dd
SHA1db22f95aa0286a76983fd4a2cb8bfde1c479812e
SHA256d9113f009405f99297e0998666412047297dfa1766d532f49f1839a064179bc7
SHA5126400cf404a82a499efe35df4e2e69b78b8b217b69ff28db208b5d83ab58e2074e2032c2655c8734fcbc36b11ce916e167ac0f851805893468be696cf0f492527
-
Filesize
72KB
MD5f8a87946d9dbd739ceb69868a2cbe2dd
SHA1db22f95aa0286a76983fd4a2cb8bfde1c479812e
SHA256d9113f009405f99297e0998666412047297dfa1766d532f49f1839a064179bc7
SHA5126400cf404a82a499efe35df4e2e69b78b8b217b69ff28db208b5d83ab58e2074e2032c2655c8734fcbc36b11ce916e167ac0f851805893468be696cf0f492527
-
Filesize
72KB
MD5ab87b003e6550ccb4baff32e794f5403
SHA13819a65ef8aff967dcfcea70cc844aaffd9005ef
SHA256e71e12815eddd8732b619639a361e8a119d489380ce7cf5374a959fd3ae62771
SHA512854a7441cb980f7c3fd1acdc087b172bccb7439ac7d16b6656174efed477700b84f48e85746f89484343647c15ca94c95fc60bb7a636dc49513ae74c306d9a6a
-
Filesize
72KB
MD5ab87b003e6550ccb4baff32e794f5403
SHA13819a65ef8aff967dcfcea70cc844aaffd9005ef
SHA256e71e12815eddd8732b619639a361e8a119d489380ce7cf5374a959fd3ae62771
SHA512854a7441cb980f7c3fd1acdc087b172bccb7439ac7d16b6656174efed477700b84f48e85746f89484343647c15ca94c95fc60bb7a636dc49513ae74c306d9a6a
-
Filesize
72KB
MD566091c3e5b06734a434088e91c2627c7
SHA1347a4f980508f5cc137c23d61fe4129cf6ce442c
SHA25605d0f3ca3980f17c2abbdec17914350f18985c10bc3cf33cea95303625a84eb0
SHA51294e51714a085037278d96066bb70cb3eb57cbe0cb6c788075f4722c08dcb00b9021d19b2866bb51a587e34a7dfc48c144f4a5d9019be738e17b44e3c2017f7c3
-
Filesize
72KB
MD566091c3e5b06734a434088e91c2627c7
SHA1347a4f980508f5cc137c23d61fe4129cf6ce442c
SHA25605d0f3ca3980f17c2abbdec17914350f18985c10bc3cf33cea95303625a84eb0
SHA51294e51714a085037278d96066bb70cb3eb57cbe0cb6c788075f4722c08dcb00b9021d19b2866bb51a587e34a7dfc48c144f4a5d9019be738e17b44e3c2017f7c3
-
Filesize
72KB
MD5291bc971878f82351e7b2d2372fa94a4
SHA152a35d4fb175aa7305fb6d9085ff299e378411c3
SHA25640b562246edee496a96aa446705e7ab883c4583494500238e93780c234dbda97
SHA5124d6d6dc6e79440df93ef5f518d041c1eaa04b6ce1df074d7bef29451e003c3edea351a8a1ae14a870cea3c3a14eb991286d314629a3b917e3b05fe36644b5dcd
-
Filesize
72KB
MD5291bc971878f82351e7b2d2372fa94a4
SHA152a35d4fb175aa7305fb6d9085ff299e378411c3
SHA25640b562246edee496a96aa446705e7ab883c4583494500238e93780c234dbda97
SHA5124d6d6dc6e79440df93ef5f518d041c1eaa04b6ce1df074d7bef29451e003c3edea351a8a1ae14a870cea3c3a14eb991286d314629a3b917e3b05fe36644b5dcd
-
Filesize
72KB
MD595bf409789647e21a716afab46f15fc0
SHA1a7baaa179edf92e23f595224afa5800576ba92d7
SHA25639e21dbaa37f7435067ecdf39dc419b40fe6a4377e9d92b8115c3a7bb4ea2b3d
SHA5127df9ab6087e503f795367c2abe394154cae885d242da674698bcff5af6eb5318269a2e99d3861a179b152c414de224e42edbd4e69d4b45fbe8065016a04bc88d
-
Filesize
72KB
MD595bf409789647e21a716afab46f15fc0
SHA1a7baaa179edf92e23f595224afa5800576ba92d7
SHA25639e21dbaa37f7435067ecdf39dc419b40fe6a4377e9d92b8115c3a7bb4ea2b3d
SHA5127df9ab6087e503f795367c2abe394154cae885d242da674698bcff5af6eb5318269a2e99d3861a179b152c414de224e42edbd4e69d4b45fbe8065016a04bc88d
-
Filesize
72KB
MD5c50c551fb5f5dc3f48aae0febfd61da6
SHA1c03e5cc9e6abe790751f42a894d07a0b47b5cc90
SHA256cdae31382c373327d7d0b43fb8370f0e7010c6fd436eec1e51c4a54de67ea4ef
SHA5124acfa64ffc24d300b927629ff28e422f5baf79b11b7f5f2ac6e5e25de33dcc12de2a071ee8c6fe1f8f8ebffdbc0aabd35ec4e80f401935d4d1baf11b077ac84d
-
Filesize
72KB
MD5c50c551fb5f5dc3f48aae0febfd61da6
SHA1c03e5cc9e6abe790751f42a894d07a0b47b5cc90
SHA256cdae31382c373327d7d0b43fb8370f0e7010c6fd436eec1e51c4a54de67ea4ef
SHA5124acfa64ffc24d300b927629ff28e422f5baf79b11b7f5f2ac6e5e25de33dcc12de2a071ee8c6fe1f8f8ebffdbc0aabd35ec4e80f401935d4d1baf11b077ac84d
-
Filesize
72KB
MD57a0c9f7fe009d0052dd2db5a03cd30e8
SHA1ad7d73d035abbca0af1ed729f626371a09ed4f6e
SHA25674ca8d6f2dc3fef7ff1dc3e65d21cfce3a4f12ad39a12318b33a3427e83bf404
SHA512b116f632deba64c483be4a2434ef9e095bdb6837ffacc8073cf33c0f77f6ce62c8fd5ffce001d9afe5d782a9a912c7a8b7f890060266127eb120a26bb7fc896b
-
Filesize
72KB
MD57a0c9f7fe009d0052dd2db5a03cd30e8
SHA1ad7d73d035abbca0af1ed729f626371a09ed4f6e
SHA25674ca8d6f2dc3fef7ff1dc3e65d21cfce3a4f12ad39a12318b33a3427e83bf404
SHA512b116f632deba64c483be4a2434ef9e095bdb6837ffacc8073cf33c0f77f6ce62c8fd5ffce001d9afe5d782a9a912c7a8b7f890060266127eb120a26bb7fc896b
-
Filesize
72KB
MD54e9111f23dfa7b4114ef01483b3fa1a7
SHA1ccf8e6b535176973c7736c5de4349d5a4593729b
SHA2565fe2054707cd87ed53fc418e1187c278940a00fbd3cdc2bc27fce72e5b07ddd5
SHA512bc4eca3b29fa8d801e7f7714ab07a7aac2028fa60320b62fa293614089634c0195b97526b3fc78803c7c72f37875f6e8cfab0cb18a0ff225582b071c132a8839
-
Filesize
72KB
MD54e9111f23dfa7b4114ef01483b3fa1a7
SHA1ccf8e6b535176973c7736c5de4349d5a4593729b
SHA2565fe2054707cd87ed53fc418e1187c278940a00fbd3cdc2bc27fce72e5b07ddd5
SHA512bc4eca3b29fa8d801e7f7714ab07a7aac2028fa60320b62fa293614089634c0195b97526b3fc78803c7c72f37875f6e8cfab0cb18a0ff225582b071c132a8839
-
Filesize
72KB
MD5c50c551fb5f5dc3f48aae0febfd61da6
SHA1c03e5cc9e6abe790751f42a894d07a0b47b5cc90
SHA256cdae31382c373327d7d0b43fb8370f0e7010c6fd436eec1e51c4a54de67ea4ef
SHA5124acfa64ffc24d300b927629ff28e422f5baf79b11b7f5f2ac6e5e25de33dcc12de2a071ee8c6fe1f8f8ebffdbc0aabd35ec4e80f401935d4d1baf11b077ac84d
-
Filesize
72KB
MD5c50c551fb5f5dc3f48aae0febfd61da6
SHA1c03e5cc9e6abe790751f42a894d07a0b47b5cc90
SHA256cdae31382c373327d7d0b43fb8370f0e7010c6fd436eec1e51c4a54de67ea4ef
SHA5124acfa64ffc24d300b927629ff28e422f5baf79b11b7f5f2ac6e5e25de33dcc12de2a071ee8c6fe1f8f8ebffdbc0aabd35ec4e80f401935d4d1baf11b077ac84d
-
Filesize
72KB
MD5017feec6b0574b9e2f1c8f23c2f259c2
SHA120c5c9c76c6cd6509549a6646eb9ac90a70ebee2
SHA256137263ef7480d0e13c89061b354db800526b6e525d212cf2d533c94d4d72c0fa
SHA512020602662b33f188f1de172831e392e272b61e2b0784b086e177954a53888160414a2af3b672d47ddfa760ccd8d086c34f2401abe30a55e0d90a2312ed94ccfa
-
Filesize
72KB
MD5017feec6b0574b9e2f1c8f23c2f259c2
SHA120c5c9c76c6cd6509549a6646eb9ac90a70ebee2
SHA256137263ef7480d0e13c89061b354db800526b6e525d212cf2d533c94d4d72c0fa
SHA512020602662b33f188f1de172831e392e272b61e2b0784b086e177954a53888160414a2af3b672d47ddfa760ccd8d086c34f2401abe30a55e0d90a2312ed94ccfa
-
Filesize
72KB
MD57ab7d7afa978c9c10b2483220803e279
SHA12c945d93f43772daf0dc76bbae3543c548ae80eb
SHA256a1d154c230b0b001f9789d9e12a894659f4e7226db32768333624a056bba8ee7
SHA512fa920a364f57516e4b42b0a392c921392589452d2789a15449cf3a5e56171471de9c3e57e47f5228c8f353011978af219316a6c9977c63f0fd0ab23f327bfb99
-
Filesize
72KB
MD57ab7d7afa978c9c10b2483220803e279
SHA12c945d93f43772daf0dc76bbae3543c548ae80eb
SHA256a1d154c230b0b001f9789d9e12a894659f4e7226db32768333624a056bba8ee7
SHA512fa920a364f57516e4b42b0a392c921392589452d2789a15449cf3a5e56171471de9c3e57e47f5228c8f353011978af219316a6c9977c63f0fd0ab23f327bfb99
-
Filesize
72KB
MD553b39e636922edcc504a9edfc3f0a967
SHA194c9c14a104fb77b2d65a2146963790fe4b89c40
SHA2564f9b7b8304895be0232baa04ea382b7bf31e9696b2d81179e2d587b834ff665b
SHA51246047b828157e4db40b66875879bbf637cf2ea16224cea2ed6f4f9c9fbfbc934cec69e50b15f16481f280ce736176c886989b57fe421167738cae27e0fc84edd
-
Filesize
72KB
MD553b39e636922edcc504a9edfc3f0a967
SHA194c9c14a104fb77b2d65a2146963790fe4b89c40
SHA2564f9b7b8304895be0232baa04ea382b7bf31e9696b2d81179e2d587b834ff665b
SHA51246047b828157e4db40b66875879bbf637cf2ea16224cea2ed6f4f9c9fbfbc934cec69e50b15f16481f280ce736176c886989b57fe421167738cae27e0fc84edd
-
Filesize
72KB
MD553b39e636922edcc504a9edfc3f0a967
SHA194c9c14a104fb77b2d65a2146963790fe4b89c40
SHA2564f9b7b8304895be0232baa04ea382b7bf31e9696b2d81179e2d587b834ff665b
SHA51246047b828157e4db40b66875879bbf637cf2ea16224cea2ed6f4f9c9fbfbc934cec69e50b15f16481f280ce736176c886989b57fe421167738cae27e0fc84edd
-
Filesize
72KB
MD553b39e636922edcc504a9edfc3f0a967
SHA194c9c14a104fb77b2d65a2146963790fe4b89c40
SHA2564f9b7b8304895be0232baa04ea382b7bf31e9696b2d81179e2d587b834ff665b
SHA51246047b828157e4db40b66875879bbf637cf2ea16224cea2ed6f4f9c9fbfbc934cec69e50b15f16481f280ce736176c886989b57fe421167738cae27e0fc84edd
-
Filesize
72KB
MD553b39e636922edcc504a9edfc3f0a967
SHA194c9c14a104fb77b2d65a2146963790fe4b89c40
SHA2564f9b7b8304895be0232baa04ea382b7bf31e9696b2d81179e2d587b834ff665b
SHA51246047b828157e4db40b66875879bbf637cf2ea16224cea2ed6f4f9c9fbfbc934cec69e50b15f16481f280ce736176c886989b57fe421167738cae27e0fc84edd
-
Filesize
72KB
MD553b39e636922edcc504a9edfc3f0a967
SHA194c9c14a104fb77b2d65a2146963790fe4b89c40
SHA2564f9b7b8304895be0232baa04ea382b7bf31e9696b2d81179e2d587b834ff665b
SHA51246047b828157e4db40b66875879bbf637cf2ea16224cea2ed6f4f9c9fbfbc934cec69e50b15f16481f280ce736176c886989b57fe421167738cae27e0fc84edd
-
Filesize
72KB
MD531a01ebb8cca070fc275941af0bd4394
SHA11909ac0efb20cb11cd52abeedcc75248e86078e2
SHA25658a89a49b10c4a7470709cdd747bf93b2d7d45d1f0f5209c4a75d9b5fdf06709
SHA51254a3a42e7e05e22cea6cf3543d4efdc1415bb7d21d7daa2f90d50a4e6bf88a40f25978fd0af5a235fd12283cf652923892c5abdfdffc6a2fe5001a5c6fddf5db
-
Filesize
72KB
MD531a01ebb8cca070fc275941af0bd4394
SHA11909ac0efb20cb11cd52abeedcc75248e86078e2
SHA25658a89a49b10c4a7470709cdd747bf93b2d7d45d1f0f5209c4a75d9b5fdf06709
SHA51254a3a42e7e05e22cea6cf3543d4efdc1415bb7d21d7daa2f90d50a4e6bf88a40f25978fd0af5a235fd12283cf652923892c5abdfdffc6a2fe5001a5c6fddf5db
-
Filesize
72KB
MD55e79641d4b6d952d26a00d43140ff92e
SHA18e167b76a8a0c5094dfba3409ca80bc6ae6efcc2
SHA256f8e5ac712bed98fa81f38fc3eb9e114f1c988b5ad534a544b0b5a4d701cb1d02
SHA51269618d34a12304c247dae9ad811ba5999ebf5f39cd1f5b201162dc206b12cec18bd552e48723704422456e4be00bf78648c9f4608ebd1fdd246160e0b3567cf5
-
Filesize
72KB
MD55e79641d4b6d952d26a00d43140ff92e
SHA18e167b76a8a0c5094dfba3409ca80bc6ae6efcc2
SHA256f8e5ac712bed98fa81f38fc3eb9e114f1c988b5ad534a544b0b5a4d701cb1d02
SHA51269618d34a12304c247dae9ad811ba5999ebf5f39cd1f5b201162dc206b12cec18bd552e48723704422456e4be00bf78648c9f4608ebd1fdd246160e0b3567cf5
-
Filesize
72KB
MD510eaf0fbaef7acdf44648be39f354160
SHA1c34a81c2229e8c19dde61c078f9077422e0eca95
SHA256c2ebefa20b885cfd4a33982e2000e5d8dd7cb8953ad999d11ea08aae3f236c99
SHA51267a07c87ded7110827fb6b3441e1d4abc8a2a53ac7c3028a7b4375a2329483680c685465da8a0de6681ef52fd796e1b816816720df653aa11cd1c3646d0e0871
-
Filesize
72KB
MD5915671b94b8c3023250e5783a7cc7cfe
SHA1bf29d8d07430814c95664334fca606546b78d2ab
SHA256380751ff17a37be6ef22f155d722d092bd7523e3f2c1781ac50c66f23bba5e79
SHA5120f55618ac11475fe8965bfeeff761cf95aa77929598e5c88381d7dc0a7857cc75c7847e9413303220c44a29255503073fe2b8cee1992b776ce266f2260d740f2
-
Filesize
72KB
MD5915671b94b8c3023250e5783a7cc7cfe
SHA1bf29d8d07430814c95664334fca606546b78d2ab
SHA256380751ff17a37be6ef22f155d722d092bd7523e3f2c1781ac50c66f23bba5e79
SHA5120f55618ac11475fe8965bfeeff761cf95aa77929598e5c88381d7dc0a7857cc75c7847e9413303220c44a29255503073fe2b8cee1992b776ce266f2260d740f2
-
Filesize
72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
Filesize
72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
Filesize
72KB
MD5915671b94b8c3023250e5783a7cc7cfe
SHA1bf29d8d07430814c95664334fca606546b78d2ab
SHA256380751ff17a37be6ef22f155d722d092bd7523e3f2c1781ac50c66f23bba5e79
SHA5120f55618ac11475fe8965bfeeff761cf95aa77929598e5c88381d7dc0a7857cc75c7847e9413303220c44a29255503073fe2b8cee1992b776ce266f2260d740f2
-
Filesize
72KB
MD5915671b94b8c3023250e5783a7cc7cfe
SHA1bf29d8d07430814c95664334fca606546b78d2ab
SHA256380751ff17a37be6ef22f155d722d092bd7523e3f2c1781ac50c66f23bba5e79
SHA5120f55618ac11475fe8965bfeeff761cf95aa77929598e5c88381d7dc0a7857cc75c7847e9413303220c44a29255503073fe2b8cee1992b776ce266f2260d740f2
-
Filesize
72KB
MD5915671b94b8c3023250e5783a7cc7cfe
SHA1bf29d8d07430814c95664334fca606546b78d2ab
SHA256380751ff17a37be6ef22f155d722d092bd7523e3f2c1781ac50c66f23bba5e79
SHA5120f55618ac11475fe8965bfeeff761cf95aa77929598e5c88381d7dc0a7857cc75c7847e9413303220c44a29255503073fe2b8cee1992b776ce266f2260d740f2
-
Filesize
72KB
MD5915671b94b8c3023250e5783a7cc7cfe
SHA1bf29d8d07430814c95664334fca606546b78d2ab
SHA256380751ff17a37be6ef22f155d722d092bd7523e3f2c1781ac50c66f23bba5e79
SHA5120f55618ac11475fe8965bfeeff761cf95aa77929598e5c88381d7dc0a7857cc75c7847e9413303220c44a29255503073fe2b8cee1992b776ce266f2260d740f2
-
Filesize
72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
Filesize
72KB
MD58a23adb630def695a9554d40d3324223
SHA1fb920dc75fe21921d6fc6f53cb9fe8e9a443ca2e
SHA256949c3e4121f37f625af024f1e199c6f5807f0cb4e2676e8101e890599686ed75
SHA5128e1ac5b199a6e3936d2a7b631f95cbf7acccc65a440efaa6b0ed37e6ce8d04fb27cb54555150793eebdb29ce9cd06137c008741d18526087d1d2fb2c53617fa1
-
Filesize
72KB
MD571430f949150edfceaf30bf9ab64a546
SHA1333571c39aa748415839c8b876bc76c1920c5472
SHA256f71ce0a6c2c76ea97a120fdf8c06ebbf3b78a065964a4faf76b2d6e8e97d4298
SHA5128860f088bf3079777e853a3623ed6cb94a49b39d75f1ca5bf182cc1e89f8bd3d821c85e3dcf779546fc1a12c27fd09aac5fc60306801bd99f873686f4a0df651
-
Filesize
72KB
MD5ed33f2b6e97b4599b54f0dc4cb9ba826
SHA195c609383d8b15c2fa5cc0c8396d521d55353855
SHA256a296c5f15994b8671d82a50d0b341c189f0a0866a985472a90baaffda96bfe7b
SHA512530a6e83da086bf657fba1f2ba41b198e7d42b68f92993e9c2341b858eafc1ddbfb7d7a50cf64b3866ee6e126685c1ab0de813f104ef6012036a627eac3e6bdf
-
Filesize
72KB
MD5ed33f2b6e97b4599b54f0dc4cb9ba826
SHA195c609383d8b15c2fa5cc0c8396d521d55353855
SHA256a296c5f15994b8671d82a50d0b341c189f0a0866a985472a90baaffda96bfe7b
SHA512530a6e83da086bf657fba1f2ba41b198e7d42b68f92993e9c2341b858eafc1ddbfb7d7a50cf64b3866ee6e126685c1ab0de813f104ef6012036a627eac3e6bdf
-
Filesize
72KB
MD55e79641d4b6d952d26a00d43140ff92e
SHA18e167b76a8a0c5094dfba3409ca80bc6ae6efcc2
SHA256f8e5ac712bed98fa81f38fc3eb9e114f1c988b5ad534a544b0b5a4d701cb1d02
SHA51269618d34a12304c247dae9ad811ba5999ebf5f39cd1f5b201162dc206b12cec18bd552e48723704422456e4be00bf78648c9f4608ebd1fdd246160e0b3567cf5
-
Filesize
72KB
MD55e79641d4b6d952d26a00d43140ff92e
SHA18e167b76a8a0c5094dfba3409ca80bc6ae6efcc2
SHA256f8e5ac712bed98fa81f38fc3eb9e114f1c988b5ad534a544b0b5a4d701cb1d02
SHA51269618d34a12304c247dae9ad811ba5999ebf5f39cd1f5b201162dc206b12cec18bd552e48723704422456e4be00bf78648c9f4608ebd1fdd246160e0b3567cf5