Analysis
-
max time kernel
157s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 14:17
Static task
static1
Behavioral task
behavioral1
Sample
42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe
Resource
win10v2004-20221111-en
General
-
Target
42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe
-
Size
72KB
-
MD5
0051f041a8182e91b3dedf0a58a0c0e3
-
SHA1
6c5872df5702254b027285cf72f54280f3ec7865
-
SHA256
42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f
-
SHA512
de2555eb6c28af35fff9559929725cdf69b3c40c5e10a115c34e009ae1b8603e69039f6a4472a415fc265d0fd12068e13db77e4a550b4d70e7eefa98fc5661bf
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2J:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 55 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1880 backup.exe 1080 backup.exe 588 backup.exe 668 backup.exe 1512 backup.exe 688 backup.exe 844 backup.exe 1116 backup.exe 1748 backup.exe 1992 backup.exe 1676 backup.exe 1452 backup.exe 428 backup.exe 1896 backup.exe 1380 backup.exe 1888 backup.exe 1724 backup.exe 1112 backup.exe 560 backup.exe 1132 backup.exe 832 backup.exe 684 backup.exe 632 backup.exe 1632 backup.exe 1552 backup.exe 1032 backup.exe 688 backup.exe 1640 backup.exe 1748 backup.exe 1712 backup.exe 1128 backup.exe 1992 backup.exe 1072 backup.exe 1500 backup.exe 384 backup.exe 1708 backup.exe 612 System Restore.exe 1740 backup.exe 1948 backup.exe 996 backup.exe 1600 data.exe 568 backup.exe 1080 backup.exe 668 backup.exe 1788 backup.exe 1916 backup.exe 1700 backup.exe 1668 backup.exe 1672 backup.exe 1020 backup.exe 1824 backup.exe 1732 backup.exe 1648 backup.exe 1812 backup.exe 1892 backup.exe 1940 update.exe 1200 backup.exe 560 backup.exe 1488 System Restore.exe 1604 backup.exe 1452 backup.exe 2016 data.exe 1548 backup.exe 1916 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 844 backup.exe 844 backup.exe 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 1116 backup.exe 1116 backup.exe 844 backup.exe 844 backup.exe 1676 backup.exe 1676 backup.exe 844 backup.exe 844 backup.exe 1676 backup.exe 1676 backup.exe 844 backup.exe 844 backup.exe 1676 backup.exe 1676 backup.exe 1896 backup.exe 1896 backup.exe 428 backup.exe 428 backup.exe 1452 backup.exe 1452 backup.exe 1380 backup.exe 1380 backup.exe 1724 backup.exe 1112 backup.exe 1724 backup.exe 1112 backup.exe 1888 backup.exe 1888 backup.exe 1132 backup.exe 1132 backup.exe 684 backup.exe 1724 backup.exe 684 backup.exe 1888 backup.exe 1724 backup.exe 1888 backup.exe 1132 backup.exe 1132 backup.exe 684 backup.exe 1888 backup.exe 684 backup.exe 1888 backup.exe 1132 backup.exe 1132 backup.exe 1032 backup.exe 1032 backup.exe 1032 backup.exe 1032 backup.exe -
Drops file in Program Files directory 45 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\AppPatch64\System Restore.exe backup.exe File opened for modification C:\Windows\assembly\data.exe backup.exe File opened for modification C:\Windows\AppPatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 1880 backup.exe 1080 backup.exe 588 backup.exe 668 backup.exe 1512 backup.exe 844 backup.exe 688 backup.exe 1116 backup.exe 1748 backup.exe 1992 backup.exe 1676 backup.exe 1452 backup.exe 428 backup.exe 1896 backup.exe 1380 backup.exe 1724 backup.exe 560 backup.exe 1112 backup.exe 1888 backup.exe 1132 backup.exe 832 backup.exe 684 backup.exe 632 backup.exe 1632 backup.exe 1032 backup.exe 1552 backup.exe 688 backup.exe 1640 backup.exe 1748 backup.exe 1992 backup.exe 1712 backup.exe 1500 backup.exe 1072 backup.exe 1708 backup.exe 612 System Restore.exe 1128 backup.exe 1740 backup.exe 1948 backup.exe 1600 data.exe 996 backup.exe 568 backup.exe 1080 backup.exe 384 backup.exe 668 backup.exe 1916 backup.exe 1788 backup.exe 1700 backup.exe 1668 backup.exe 1672 backup.exe 1824 backup.exe 1020 backup.exe 1732 backup.exe 1812 backup.exe 1892 backup.exe 1648 backup.exe 1200 backup.exe 560 backup.exe 1452 backup.exe 1624 backup.exe 2016 data.exe 1632 backup.exe 1548 backup.exe 668 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1880 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 28 PID 2036 wrote to memory of 1880 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 28 PID 2036 wrote to memory of 1880 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 28 PID 2036 wrote to memory of 1880 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 28 PID 2036 wrote to memory of 1080 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 29 PID 2036 wrote to memory of 1080 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 29 PID 2036 wrote to memory of 1080 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 29 PID 2036 wrote to memory of 1080 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 29 PID 2036 wrote to memory of 588 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 30 PID 2036 wrote to memory of 588 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 30 PID 2036 wrote to memory of 588 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 30 PID 2036 wrote to memory of 588 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 30 PID 2036 wrote to memory of 668 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 31 PID 2036 wrote to memory of 668 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 31 PID 2036 wrote to memory of 668 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 31 PID 2036 wrote to memory of 668 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 31 PID 2036 wrote to memory of 1512 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 32 PID 2036 wrote to memory of 1512 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 32 PID 2036 wrote to memory of 1512 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 32 PID 2036 wrote to memory of 1512 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 32 PID 2036 wrote to memory of 688 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 33 PID 2036 wrote to memory of 688 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 33 PID 2036 wrote to memory of 688 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 33 PID 2036 wrote to memory of 688 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 33 PID 1880 wrote to memory of 844 1880 backup.exe 34 PID 1880 wrote to memory of 844 1880 backup.exe 34 PID 1880 wrote to memory of 844 1880 backup.exe 34 PID 1880 wrote to memory of 844 1880 backup.exe 34 PID 844 wrote to memory of 1116 844 backup.exe 36 PID 844 wrote to memory of 1116 844 backup.exe 36 PID 844 wrote to memory of 1116 844 backup.exe 36 PID 844 wrote to memory of 1116 844 backup.exe 36 PID 2036 wrote to memory of 1748 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 35 PID 2036 wrote to memory of 1748 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 35 PID 2036 wrote to memory of 1748 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 35 PID 2036 wrote to memory of 1748 2036 42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe 35 PID 1116 wrote to memory of 1992 1116 backup.exe 37 PID 1116 wrote to memory of 1992 1116 backup.exe 37 PID 1116 wrote to memory of 1992 1116 backup.exe 37 PID 1116 wrote to memory of 1992 1116 backup.exe 37 PID 844 wrote to memory of 1676 844 backup.exe 38 PID 844 wrote to memory of 1676 844 backup.exe 38 PID 844 wrote to memory of 1676 844 backup.exe 38 PID 844 wrote to memory of 1676 844 backup.exe 38 PID 1676 wrote to memory of 1452 1676 backup.exe 40 PID 1676 wrote to memory of 1452 1676 backup.exe 40 PID 1676 wrote to memory of 1452 1676 backup.exe 40 PID 1676 wrote to memory of 1452 1676 backup.exe 40 PID 844 wrote to memory of 428 844 backup.exe 39 PID 844 wrote to memory of 428 844 backup.exe 39 PID 844 wrote to memory of 428 844 backup.exe 39 PID 844 wrote to memory of 428 844 backup.exe 39 PID 1676 wrote to memory of 1896 1676 backup.exe 41 PID 1676 wrote to memory of 1896 1676 backup.exe 41 PID 1676 wrote to memory of 1896 1676 backup.exe 41 PID 1676 wrote to memory of 1896 1676 backup.exe 41 PID 844 wrote to memory of 1380 844 backup.exe 42 PID 844 wrote to memory of 1380 844 backup.exe 42 PID 844 wrote to memory of 1380 844 backup.exe 42 PID 844 wrote to memory of 1380 844 backup.exe 42 PID 1676 wrote to memory of 1888 1676 backup.exe 43 PID 1676 wrote to memory of 1888 1676 backup.exe 43 PID 1676 wrote to memory of 1888 1676 backup.exe 43 PID 1676 wrote to memory of 1888 1676 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe"C:\Users\Admin\AppData\Local\Temp\42a91ac8b90ef5a0b3560ae16c410b0a5f096aa2139097d82158ecb03821ff0f.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\2428943342\backup.exeC:\Users\Admin\AppData\Local\Temp\2428943342\backup.exe C:\Users\Admin\AppData\Local\Temp\2428943342\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1880 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:844 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1116 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1676 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1072
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:1672
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:1668
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵PID:384
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:1628
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:800
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\update.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\update.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1684
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Suspicious use of SetWindowsHookEx
PID:668
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:960
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:812
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:632
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:384
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668
-
-
C:\Program Files\DVD Maker\ja-JP\update.exe"C:\Program Files\DVD Maker\ja-JP\update.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Executes dropped EXE
PID:1940
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:1980
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1708
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1728
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:428 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1112 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:996 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1732
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1200 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1244
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1648
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1380
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
PID:1916 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:1732
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:972
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1320
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\data.exe"C:\Program Files (x86)\Common Files\Adobe AIR\data.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:108
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1712
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:808
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1132 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128
-
-
C:\Users\Admin\Downloads\data.exeC:\Users\Admin\Downloads\data.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1600
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1020
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1892
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:1576
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:604
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵PID:1552
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
PID:1604
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1812 -
C:\Windows\AppPatch\AppPatch64\System Restore.exe"C:\Windows\AppPatch\AppPatch64\System Restore.exe" C:\Windows\AppPatch\AppPatch64\6⤵
- Executes dropped EXE
PID:1488
-
-
C:\Windows\AppPatch\Custom\backup.exeC:\Windows\AppPatch\Custom\backup.exe C:\Windows\AppPatch\Custom\6⤵PID:1344
-
-
C:\Windows\AppPatch\de-DE\backup.exeC:\Windows\AppPatch\de-DE\backup.exe C:\Windows\AppPatch\de-DE\6⤵PID:1068
-
-
-
C:\Windows\assembly\data.exeC:\Windows\assembly\data.exe C:\Windows\assembly\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:1580
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:1116
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD53631608de692060bcc289514c5d9325e
SHA1ea4e2f5a7844f00bed832be3cc14d96610b08eb7
SHA2560cabfce3a6c9d00832093d1462dbe58ca2b16759a20276fb5d3a85dc8a726f04
SHA51247ce634cc5322d734c9d6a206a4dbcb78731041f92a6dd4bfcf1c5d05b347bda116711eca16add01b865fb9f936bac53219dd025cdb94c05ffb87a6b5c225950
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5955a46c37eac58ffdb1c3465ed6410d3
SHA1b31da908461475afd352d1d91508fc4e2a034c1e
SHA2560e6ef420f5de9bf36c37fabd26ef019a47ca6971e5d39d829d584649fa99339d
SHA51224a40408e894c12b21e2fce21fed8220939d14d3d218a6b971330ccf5a802afffea4622d7be324395062a82f8ce48d23e230c6bedfc3fe4e0d53398519ad7b49
-
Filesize
72KB
MD56b088eef80d7e2b1de1dbe367b5a249f
SHA1b4591c076e4d3ce5571056b26835bef548736de9
SHA256c4f70a974480e9a04118456e81707099ca35d91fe0f3749ec03b90319db8c6b4
SHA512656b5a4712231167627bd335d0ca1bdaa464b5e55682bea73be96403178c26ab6bed09316cb408a652ab6e08664cff559e20bfb21aade123440bf700e0046551
-
Filesize
72KB
MD56b088eef80d7e2b1de1dbe367b5a249f
SHA1b4591c076e4d3ce5571056b26835bef548736de9
SHA256c4f70a974480e9a04118456e81707099ca35d91fe0f3749ec03b90319db8c6b4
SHA512656b5a4712231167627bd335d0ca1bdaa464b5e55682bea73be96403178c26ab6bed09316cb408a652ab6e08664cff559e20bfb21aade123440bf700e0046551
-
Filesize
72KB
MD52d28eccc116d233134f3fe816e51a23b
SHA1fc9bd0a9e6c0182c13e3dba4217860d0a7025075
SHA25674f94b308bf9a5f3fcc69e8e272bab9dd1e1688c117bc03592bf5c61ed7b855f
SHA51229277f86186dac0b8b70bef2ca4824830508ce10a58fc36c42bfb31c1cfd65751a66b40a08fc25b4088d4e79528d64070eab1efb15ee39e7bdd60d9aaf5d0ca6
-
Filesize
72KB
MD51a437fb6e99b6004d7a464e178e49f59
SHA16797a7f76ff71362c6ae6c0b3a890f9bc55a08bc
SHA256fb82a7c38e961073430bbb164fcd76823ba04fbe9719cb6facb016168bf658b2
SHA512f7b57f56fef812e5bbab7572ca15f2de4f9becc3e80a53564275c6c8f4f7bdd2861df8e723770288e6cd6b397e98ae6a38f88116a3c524187cd2245adbd00246
-
Filesize
72KB
MD51a437fb6e99b6004d7a464e178e49f59
SHA16797a7f76ff71362c6ae6c0b3a890f9bc55a08bc
SHA256fb82a7c38e961073430bbb164fcd76823ba04fbe9719cb6facb016168bf658b2
SHA512f7b57f56fef812e5bbab7572ca15f2de4f9becc3e80a53564275c6c8f4f7bdd2861df8e723770288e6cd6b397e98ae6a38f88116a3c524187cd2245adbd00246
-
Filesize
72KB
MD5c92fc4f617629cec885a27a8ec96d53b
SHA1b177ca4d9322a2aef49187a5cc4e5e6182f87d52
SHA256db34caa48a499f1c257f8b96ded1eec17e9f9b33a489759fbce224c22269c195
SHA51237714a4118dab53d2752d70321d6bb5a225a9fc07b28de3cc40f855d8ab3a00cb35101d630f3f78f31a367bec41165cb13b5385397118ba80c4d7b43209df912
-
Filesize
72KB
MD552e682e08fad4834c9cb218584e2134e
SHA18dca505378f3eced0719a67e122903517bcd466f
SHA256446ff5c6dc07760d689bd9baba0053231111bda00f79a3d24e63782646b6a007
SHA512b7f4eff386bf2aadf1f7a4ad1f4e650a2ef75d4cfce741a1c261f07b8a54135a3d56101b7c0042e9b6ff0c76cb6a29dabb2494b4be1781ac0dd8925b9a37d8f8
-
Filesize
72KB
MD552e682e08fad4834c9cb218584e2134e
SHA18dca505378f3eced0719a67e122903517bcd466f
SHA256446ff5c6dc07760d689bd9baba0053231111bda00f79a3d24e63782646b6a007
SHA512b7f4eff386bf2aadf1f7a4ad1f4e650a2ef75d4cfce741a1c261f07b8a54135a3d56101b7c0042e9b6ff0c76cb6a29dabb2494b4be1781ac0dd8925b9a37d8f8
-
Filesize
72KB
MD5c618c64ca1f04b0a68d73f9966fea3bc
SHA10e5d84c676bf8d0e1bd9d42163f0691e17c2151d
SHA2562ba43e9dd5b81d34b4014bfc06e12cd378350bfa12cb67f9d66c5f3e42d2006e
SHA512257ce4704fcbd8de20a972947479c210b16cbb06600a209bd76e468555dc1919276ad84b0b367d2c9fa5c1cf666abbc3d0765ead518a878771a3f9df6385c862
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5dbce14d93e5f4501b2da74f27093d170
SHA140c721de44dcfba0c7c0e8b79549aeeda88085c4
SHA2565ab6fee7a641f947e7a822e7c3e46024d313bc12059e405459ac510d94460324
SHA5125f654b83996318ee37aebe3a8208004efb7eae5a4320afe68a84fd10f52f9681b09a4f12fd110c83faadf12c2a3614a768e1e2c55d82bb74e868d66a24ff119c
-
Filesize
72KB
MD5dbce14d93e5f4501b2da74f27093d170
SHA140c721de44dcfba0c7c0e8b79549aeeda88085c4
SHA2565ab6fee7a641f947e7a822e7c3e46024d313bc12059e405459ac510d94460324
SHA5125f654b83996318ee37aebe3a8208004efb7eae5a4320afe68a84fd10f52f9681b09a4f12fd110c83faadf12c2a3614a768e1e2c55d82bb74e868d66a24ff119c
-
Filesize
72KB
MD546f06dcdf4b7f59671a9f7c6cf28781a
SHA120dd49a391495b0ef58a881fc9f596c97ebd9f42
SHA25611cb038900e9af51e6cb53221724f7b2b41ce5303546984e684f15af4094ae50
SHA512904425e2a2a43fff1f60b891e3801c3c97a1cd89d29a5d7dc6762a4ba9a6200d12fab273303d596adf49f160326710d1eaa6d043cf7ac457022f6056e6cb070e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD546f06dcdf4b7f59671a9f7c6cf28781a
SHA120dd49a391495b0ef58a881fc9f596c97ebd9f42
SHA25611cb038900e9af51e6cb53221724f7b2b41ce5303546984e684f15af4094ae50
SHA512904425e2a2a43fff1f60b891e3801c3c97a1cd89d29a5d7dc6762a4ba9a6200d12fab273303d596adf49f160326710d1eaa6d043cf7ac457022f6056e6cb070e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD5dbce14d93e5f4501b2da74f27093d170
SHA140c721de44dcfba0c7c0e8b79549aeeda88085c4
SHA2565ab6fee7a641f947e7a822e7c3e46024d313bc12059e405459ac510d94460324
SHA5125f654b83996318ee37aebe3a8208004efb7eae5a4320afe68a84fd10f52f9681b09a4f12fd110c83faadf12c2a3614a768e1e2c55d82bb74e868d66a24ff119c
-
Filesize
72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD56463e3d260612096e42ca27eac974927
SHA18723b925c65b94ac0f1dd5d6fe9f05a0c350dbb9
SHA2566d8b275276195dea8cb5e06337a34e24f416214681163c6d35caada0d6f4b5f2
SHA5126f3aaa73d58e38f8c1fe86412326900fef4063c60104ed47717135979984ad7784a0f3ea16ba7060404e0a107c4dbc042f739272b7903081c71f5c1d89ce82c7
-
Filesize
72KB
MD56463e3d260612096e42ca27eac974927
SHA18723b925c65b94ac0f1dd5d6fe9f05a0c350dbb9
SHA2566d8b275276195dea8cb5e06337a34e24f416214681163c6d35caada0d6f4b5f2
SHA5126f3aaa73d58e38f8c1fe86412326900fef4063c60104ed47717135979984ad7784a0f3ea16ba7060404e0a107c4dbc042f739272b7903081c71f5c1d89ce82c7
-
Filesize
72KB
MD545981ab9b60caef3de5e066e1968e486
SHA112f943b51b6f59305984e3233bc5c3eb6c6dc513
SHA256e8ce291948f8bda77bc6a9d443f816dd08cc77d90c6dcf63b0dd3dcc6a90641c
SHA512bf91702a9e5d77218b14520f5cf51f7d492c2ad3c2f3d6013b01d4749ef2bdc7c6fbb3b51e703d1e8b850c97d2719577ba9581f0aec691a49b17aaa2d1a4fa79
-
Filesize
72KB
MD545981ab9b60caef3de5e066e1968e486
SHA112f943b51b6f59305984e3233bc5c3eb6c6dc513
SHA256e8ce291948f8bda77bc6a9d443f816dd08cc77d90c6dcf63b0dd3dcc6a90641c
SHA512bf91702a9e5d77218b14520f5cf51f7d492c2ad3c2f3d6013b01d4749ef2bdc7c6fbb3b51e703d1e8b850c97d2719577ba9581f0aec691a49b17aaa2d1a4fa79
-
Filesize
72KB
MD53631608de692060bcc289514c5d9325e
SHA1ea4e2f5a7844f00bed832be3cc14d96610b08eb7
SHA2560cabfce3a6c9d00832093d1462dbe58ca2b16759a20276fb5d3a85dc8a726f04
SHA51247ce634cc5322d734c9d6a206a4dbcb78731041f92a6dd4bfcf1c5d05b347bda116711eca16add01b865fb9f936bac53219dd025cdb94c05ffb87a6b5c225950
-
Filesize
72KB
MD53631608de692060bcc289514c5d9325e
SHA1ea4e2f5a7844f00bed832be3cc14d96610b08eb7
SHA2560cabfce3a6c9d00832093d1462dbe58ca2b16759a20276fb5d3a85dc8a726f04
SHA51247ce634cc5322d734c9d6a206a4dbcb78731041f92a6dd4bfcf1c5d05b347bda116711eca16add01b865fb9f936bac53219dd025cdb94c05ffb87a6b5c225950
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5955a46c37eac58ffdb1c3465ed6410d3
SHA1b31da908461475afd352d1d91508fc4e2a034c1e
SHA2560e6ef420f5de9bf36c37fabd26ef019a47ca6971e5d39d829d584649fa99339d
SHA51224a40408e894c12b21e2fce21fed8220939d14d3d218a6b971330ccf5a802afffea4622d7be324395062a82f8ce48d23e230c6bedfc3fe4e0d53398519ad7b49
-
Filesize
72KB
MD5955a46c37eac58ffdb1c3465ed6410d3
SHA1b31da908461475afd352d1d91508fc4e2a034c1e
SHA2560e6ef420f5de9bf36c37fabd26ef019a47ca6971e5d39d829d584649fa99339d
SHA51224a40408e894c12b21e2fce21fed8220939d14d3d218a6b971330ccf5a802afffea4622d7be324395062a82f8ce48d23e230c6bedfc3fe4e0d53398519ad7b49
-
Filesize
72KB
MD56b088eef80d7e2b1de1dbe367b5a249f
SHA1b4591c076e4d3ce5571056b26835bef548736de9
SHA256c4f70a974480e9a04118456e81707099ca35d91fe0f3749ec03b90319db8c6b4
SHA512656b5a4712231167627bd335d0ca1bdaa464b5e55682bea73be96403178c26ab6bed09316cb408a652ab6e08664cff559e20bfb21aade123440bf700e0046551
-
Filesize
72KB
MD56b088eef80d7e2b1de1dbe367b5a249f
SHA1b4591c076e4d3ce5571056b26835bef548736de9
SHA256c4f70a974480e9a04118456e81707099ca35d91fe0f3749ec03b90319db8c6b4
SHA512656b5a4712231167627bd335d0ca1bdaa464b5e55682bea73be96403178c26ab6bed09316cb408a652ab6e08664cff559e20bfb21aade123440bf700e0046551
-
Filesize
72KB
MD52d28eccc116d233134f3fe816e51a23b
SHA1fc9bd0a9e6c0182c13e3dba4217860d0a7025075
SHA25674f94b308bf9a5f3fcc69e8e272bab9dd1e1688c117bc03592bf5c61ed7b855f
SHA51229277f86186dac0b8b70bef2ca4824830508ce10a58fc36c42bfb31c1cfd65751a66b40a08fc25b4088d4e79528d64070eab1efb15ee39e7bdd60d9aaf5d0ca6
-
Filesize
72KB
MD52d28eccc116d233134f3fe816e51a23b
SHA1fc9bd0a9e6c0182c13e3dba4217860d0a7025075
SHA25674f94b308bf9a5f3fcc69e8e272bab9dd1e1688c117bc03592bf5c61ed7b855f
SHA51229277f86186dac0b8b70bef2ca4824830508ce10a58fc36c42bfb31c1cfd65751a66b40a08fc25b4088d4e79528d64070eab1efb15ee39e7bdd60d9aaf5d0ca6
-
Filesize
72KB
MD51a437fb6e99b6004d7a464e178e49f59
SHA16797a7f76ff71362c6ae6c0b3a890f9bc55a08bc
SHA256fb82a7c38e961073430bbb164fcd76823ba04fbe9719cb6facb016168bf658b2
SHA512f7b57f56fef812e5bbab7572ca15f2de4f9becc3e80a53564275c6c8f4f7bdd2861df8e723770288e6cd6b397e98ae6a38f88116a3c524187cd2245adbd00246
-
Filesize
72KB
MD51a437fb6e99b6004d7a464e178e49f59
SHA16797a7f76ff71362c6ae6c0b3a890f9bc55a08bc
SHA256fb82a7c38e961073430bbb164fcd76823ba04fbe9719cb6facb016168bf658b2
SHA512f7b57f56fef812e5bbab7572ca15f2de4f9becc3e80a53564275c6c8f4f7bdd2861df8e723770288e6cd6b397e98ae6a38f88116a3c524187cd2245adbd00246
-
Filesize
72KB
MD5c92fc4f617629cec885a27a8ec96d53b
SHA1b177ca4d9322a2aef49187a5cc4e5e6182f87d52
SHA256db34caa48a499f1c257f8b96ded1eec17e9f9b33a489759fbce224c22269c195
SHA51237714a4118dab53d2752d70321d6bb5a225a9fc07b28de3cc40f855d8ab3a00cb35101d630f3f78f31a367bec41165cb13b5385397118ba80c4d7b43209df912
-
Filesize
72KB
MD5c92fc4f617629cec885a27a8ec96d53b
SHA1b177ca4d9322a2aef49187a5cc4e5e6182f87d52
SHA256db34caa48a499f1c257f8b96ded1eec17e9f9b33a489759fbce224c22269c195
SHA51237714a4118dab53d2752d70321d6bb5a225a9fc07b28de3cc40f855d8ab3a00cb35101d630f3f78f31a367bec41165cb13b5385397118ba80c4d7b43209df912
-
Filesize
72KB
MD552e682e08fad4834c9cb218584e2134e
SHA18dca505378f3eced0719a67e122903517bcd466f
SHA256446ff5c6dc07760d689bd9baba0053231111bda00f79a3d24e63782646b6a007
SHA512b7f4eff386bf2aadf1f7a4ad1f4e650a2ef75d4cfce741a1c261f07b8a54135a3d56101b7c0042e9b6ff0c76cb6a29dabb2494b4be1781ac0dd8925b9a37d8f8
-
Filesize
72KB
MD552e682e08fad4834c9cb218584e2134e
SHA18dca505378f3eced0719a67e122903517bcd466f
SHA256446ff5c6dc07760d689bd9baba0053231111bda00f79a3d24e63782646b6a007
SHA512b7f4eff386bf2aadf1f7a4ad1f4e650a2ef75d4cfce741a1c261f07b8a54135a3d56101b7c0042e9b6ff0c76cb6a29dabb2494b4be1781ac0dd8925b9a37d8f8
-
Filesize
72KB
MD5c618c64ca1f04b0a68d73f9966fea3bc
SHA10e5d84c676bf8d0e1bd9d42163f0691e17c2151d
SHA2562ba43e9dd5b81d34b4014bfc06e12cd378350bfa12cb67f9d66c5f3e42d2006e
SHA512257ce4704fcbd8de20a972947479c210b16cbb06600a209bd76e468555dc1919276ad84b0b367d2c9fa5c1cf666abbc3d0765ead518a878771a3f9df6385c862
-
Filesize
72KB
MD5c618c64ca1f04b0a68d73f9966fea3bc
SHA10e5d84c676bf8d0e1bd9d42163f0691e17c2151d
SHA2562ba43e9dd5b81d34b4014bfc06e12cd378350bfa12cb67f9d66c5f3e42d2006e
SHA512257ce4704fcbd8de20a972947479c210b16cbb06600a209bd76e468555dc1919276ad84b0b367d2c9fa5c1cf666abbc3d0765ead518a878771a3f9df6385c862
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5349ed1db70495d4cb955dc8f926e1a1e
SHA1243dcfb1f6e083fe417cdbeaf71fbfbc08fb3647
SHA2562bf96417d683de724e6ae14bce932563fb5a85e9d13d9a5e5cfad6d00f35baad
SHA51298eec0a1cfc3bcd4cf55221b35e84689ae58119db9fc93e43b3596340284a92cdac3cbda0a91db63a36a1ae101e58d3745671ffe6516eb396ec9395ee35c34a3
-
Filesize
72KB
MD5dbce14d93e5f4501b2da74f27093d170
SHA140c721de44dcfba0c7c0e8b79549aeeda88085c4
SHA2565ab6fee7a641f947e7a822e7c3e46024d313bc12059e405459ac510d94460324
SHA5125f654b83996318ee37aebe3a8208004efb7eae5a4320afe68a84fd10f52f9681b09a4f12fd110c83faadf12c2a3614a768e1e2c55d82bb74e868d66a24ff119c
-
Filesize
72KB
MD5dbce14d93e5f4501b2da74f27093d170
SHA140c721de44dcfba0c7c0e8b79549aeeda88085c4
SHA2565ab6fee7a641f947e7a822e7c3e46024d313bc12059e405459ac510d94460324
SHA5125f654b83996318ee37aebe3a8208004efb7eae5a4320afe68a84fd10f52f9681b09a4f12fd110c83faadf12c2a3614a768e1e2c55d82bb74e868d66a24ff119c
-
Filesize
72KB
MD546f06dcdf4b7f59671a9f7c6cf28781a
SHA120dd49a391495b0ef58a881fc9f596c97ebd9f42
SHA25611cb038900e9af51e6cb53221724f7b2b41ce5303546984e684f15af4094ae50
SHA512904425e2a2a43fff1f60b891e3801c3c97a1cd89d29a5d7dc6762a4ba9a6200d12fab273303d596adf49f160326710d1eaa6d043cf7ac457022f6056e6cb070e
-
Filesize
72KB
MD546f06dcdf4b7f59671a9f7c6cf28781a
SHA120dd49a391495b0ef58a881fc9f596c97ebd9f42
SHA25611cb038900e9af51e6cb53221724f7b2b41ce5303546984e684f15af4094ae50
SHA512904425e2a2a43fff1f60b891e3801c3c97a1cd89d29a5d7dc6762a4ba9a6200d12fab273303d596adf49f160326710d1eaa6d043cf7ac457022f6056e6cb070e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD546f06dcdf4b7f59671a9f7c6cf28781a
SHA120dd49a391495b0ef58a881fc9f596c97ebd9f42
SHA25611cb038900e9af51e6cb53221724f7b2b41ce5303546984e684f15af4094ae50
SHA512904425e2a2a43fff1f60b891e3801c3c97a1cd89d29a5d7dc6762a4ba9a6200d12fab273303d596adf49f160326710d1eaa6d043cf7ac457022f6056e6cb070e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD546f06dcdf4b7f59671a9f7c6cf28781a
SHA120dd49a391495b0ef58a881fc9f596c97ebd9f42
SHA25611cb038900e9af51e6cb53221724f7b2b41ce5303546984e684f15af4094ae50
SHA512904425e2a2a43fff1f60b891e3801c3c97a1cd89d29a5d7dc6762a4ba9a6200d12fab273303d596adf49f160326710d1eaa6d043cf7ac457022f6056e6cb070e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD5dbce14d93e5f4501b2da74f27093d170
SHA140c721de44dcfba0c7c0e8b79549aeeda88085c4
SHA2565ab6fee7a641f947e7a822e7c3e46024d313bc12059e405459ac510d94460324
SHA5125f654b83996318ee37aebe3a8208004efb7eae5a4320afe68a84fd10f52f9681b09a4f12fd110c83faadf12c2a3614a768e1e2c55d82bb74e868d66a24ff119c
-
Filesize
72KB
MD5dbce14d93e5f4501b2da74f27093d170
SHA140c721de44dcfba0c7c0e8b79549aeeda88085c4
SHA2565ab6fee7a641f947e7a822e7c3e46024d313bc12059e405459ac510d94460324
SHA5125f654b83996318ee37aebe3a8208004efb7eae5a4320afe68a84fd10f52f9681b09a4f12fd110c83faadf12c2a3614a768e1e2c55d82bb74e868d66a24ff119c
-
Filesize
72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD578f594b350c899f7072fa6668087db5f
SHA1adc9056e939fb44cb6e84a138e6e145baaa15afa
SHA25692c17f72ccddcc044fe54ca76863bcff7e3e716918dc52058f5e6d8e770ab499
SHA5123705dacdb1dcee518d9eed9fa438a13777701773b6e381608ca528ae0c299b344ceaf319af5e2ba42dadad90397c608e832f7fe3c4cd66c0ea09dafb4d3f9181
-
Filesize
72KB
MD5672e5eea039f9ff067c67bf4be23f49e
SHA107da085c82e0b7252dc1f45a6af9421ab160513f
SHA25644dfc771fbf9ff06a6ed6f9141c665ba446c51b937848b7542992a51350d05bb
SHA5124c0f5572de72878ec88654ade1e4fc42b988addd23469640e19d98795eba260bd2d03339a1d4aa59e18201104a6961130baeb33accb0d8d6693a1e132e3554ba
-
Filesize
72KB
MD56463e3d260612096e42ca27eac974927
SHA18723b925c65b94ac0f1dd5d6fe9f05a0c350dbb9
SHA2566d8b275276195dea8cb5e06337a34e24f416214681163c6d35caada0d6f4b5f2
SHA5126f3aaa73d58e38f8c1fe86412326900fef4063c60104ed47717135979984ad7784a0f3ea16ba7060404e0a107c4dbc042f739272b7903081c71f5c1d89ce82c7
-
Filesize
72KB
MD56463e3d260612096e42ca27eac974927
SHA18723b925c65b94ac0f1dd5d6fe9f05a0c350dbb9
SHA2566d8b275276195dea8cb5e06337a34e24f416214681163c6d35caada0d6f4b5f2
SHA5126f3aaa73d58e38f8c1fe86412326900fef4063c60104ed47717135979984ad7784a0f3ea16ba7060404e0a107c4dbc042f739272b7903081c71f5c1d89ce82c7