Analysis
-
max time kernel
94s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe
Resource
win10v2004-20220812-en
General
-
Target
2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe
-
Size
72KB
-
MD5
00e32c05245e99c56fcfd74e27dda55c
-
SHA1
69d88a4d9accfcfa6d936eeb2a32c1c395c709e4
-
SHA256
2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b
-
SHA512
2de7a874a05cebcab59aebb5055b7b75f65532d73a1cc46a92c968ab241f0da9715e3b2f9e2ef4d41c5ff39a7eca5ae1dd37081f62be9230b13ac9bab4cd4bc1
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2X:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPj
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 884 backup.exe 940 backup.exe 2032 backup.exe 2036 backup.exe 1656 backup.exe 1760 backup.exe 332 backup.exe 696 backup.exe 1152 backup.exe 1940 backup.exe 1700 backup.exe 1408 backup.exe 1532 backup.exe 1500 backup.exe 988 System Restore.exe 560 backup.exe 1788 backup.exe 1068 backup.exe 824 backup.exe 2044 backup.exe 2000 System Restore.exe 1900 backup.exe 1296 backup.exe 1492 backup.exe 972 backup.exe 1496 backup.exe 1416 backup.exe 1708 backup.exe 324 backup.exe 1560 backup.exe 304 backup.exe 1696 backup.exe 1908 backup.exe 1776 System Restore.exe 928 backup.exe 1168 update.exe 436 backup.exe 1972 backup.exe 1764 backup.exe 1428 backup.exe 856 backup.exe 1420 backup.exe 1116 backup.exe 916 backup.exe 896 backup.exe 940 backup.exe 1964 backup.exe 1876 backup.exe 1872 backup.exe 1892 backup.exe 1020 backup.exe 320 backup.exe 1600 backup.exe 332 backup.exe 1120 backup.exe 1192 backup.exe 1076 backup.exe 1620 backup.exe 324 backup.exe 1908 backup.exe 1012 backup.exe 968 data.exe 1564 backup.exe 1796 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 696 backup.exe 696 backup.exe 1152 backup.exe 1152 backup.exe 696 backup.exe 696 backup.exe 1700 backup.exe 1700 backup.exe 1408 backup.exe 1408 backup.exe 1700 backup.exe 1700 backup.exe 696 backup.exe 1500 backup.exe 696 backup.exe 1500 backup.exe 1700 backup.exe 560 backup.exe 560 backup.exe 1700 backup.exe 988 System Restore.exe 988 System Restore.exe 1788 backup.exe 1788 backup.exe 988 System Restore.exe 988 System Restore.exe 1068 backup.exe 2044 backup.exe 2044 backup.exe 1068 backup.exe 2000 System Restore.exe 2000 System Restore.exe 2044 backup.exe 2044 backup.exe 2000 System Restore.exe 1068 backup.exe 2000 System Restore.exe 1068 backup.exe 972 backup.exe 972 backup.exe 2000 System Restore.exe 972 backup.exe 2000 System Restore.exe 972 backup.exe 1068 backup.exe 1068 backup.exe 972 backup.exe 972 backup.exe 1068 backup.exe 1068 backup.exe -
Drops file in Program Files directory 59 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\data.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\System Restore.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe System Restore.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 884 backup.exe 940 backup.exe 2032 backup.exe 2036 backup.exe 1656 backup.exe 1760 backup.exe 332 backup.exe 696 backup.exe 1152 backup.exe 1940 backup.exe 1700 backup.exe 1408 backup.exe 1532 backup.exe 1500 backup.exe 988 System Restore.exe 560 backup.exe 1788 backup.exe 824 backup.exe 1068 backup.exe 2044 backup.exe 2000 System Restore.exe 1900 backup.exe 1296 backup.exe 1492 backup.exe 972 backup.exe 1416 backup.exe 1496 backup.exe 1708 backup.exe 324 backup.exe 304 backup.exe 1696 backup.exe 1908 backup.exe 928 backup.exe 436 backup.exe 1972 backup.exe 1764 backup.exe 1168 update.exe 1428 backup.exe 856 backup.exe 1420 backup.exe 1116 backup.exe 896 backup.exe 916 backup.exe 940 backup.exe 1892 backup.exe 320 backup.exe 1876 backup.exe 1964 backup.exe 1120 backup.exe 1076 backup.exe 1192 backup.exe 1620 backup.exe 1872 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 884 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 27 PID 752 wrote to memory of 884 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 27 PID 752 wrote to memory of 884 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 27 PID 752 wrote to memory of 884 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 27 PID 752 wrote to memory of 940 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 28 PID 752 wrote to memory of 940 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 28 PID 752 wrote to memory of 940 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 28 PID 752 wrote to memory of 940 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 28 PID 752 wrote to memory of 2032 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 29 PID 752 wrote to memory of 2032 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 29 PID 752 wrote to memory of 2032 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 29 PID 752 wrote to memory of 2032 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 29 PID 752 wrote to memory of 2036 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 30 PID 752 wrote to memory of 2036 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 30 PID 752 wrote to memory of 2036 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 30 PID 752 wrote to memory of 2036 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 30 PID 752 wrote to memory of 1656 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 31 PID 752 wrote to memory of 1656 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 31 PID 752 wrote to memory of 1656 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 31 PID 752 wrote to memory of 1656 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 31 PID 752 wrote to memory of 1760 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 32 PID 752 wrote to memory of 1760 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 32 PID 752 wrote to memory of 1760 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 32 PID 752 wrote to memory of 1760 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 32 PID 752 wrote to memory of 332 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 33 PID 752 wrote to memory of 332 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 33 PID 752 wrote to memory of 332 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 33 PID 752 wrote to memory of 332 752 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe 33 PID 884 wrote to memory of 696 884 backup.exe 34 PID 884 wrote to memory of 696 884 backup.exe 34 PID 884 wrote to memory of 696 884 backup.exe 34 PID 884 wrote to memory of 696 884 backup.exe 34 PID 696 wrote to memory of 1152 696 backup.exe 35 PID 696 wrote to memory of 1152 696 backup.exe 35 PID 696 wrote to memory of 1152 696 backup.exe 35 PID 696 wrote to memory of 1152 696 backup.exe 35 PID 1152 wrote to memory of 1940 1152 backup.exe 36 PID 1152 wrote to memory of 1940 1152 backup.exe 36 PID 1152 wrote to memory of 1940 1152 backup.exe 36 PID 1152 wrote to memory of 1940 1152 backup.exe 36 PID 696 wrote to memory of 1700 696 backup.exe 37 PID 696 wrote to memory of 1700 696 backup.exe 37 PID 696 wrote to memory of 1700 696 backup.exe 37 PID 696 wrote to memory of 1700 696 backup.exe 37 PID 1700 wrote to memory of 1408 1700 backup.exe 38 PID 1700 wrote to memory of 1408 1700 backup.exe 38 PID 1700 wrote to memory of 1408 1700 backup.exe 38 PID 1700 wrote to memory of 1408 1700 backup.exe 38 PID 1408 wrote to memory of 1532 1408 backup.exe 39 PID 1408 wrote to memory of 1532 1408 backup.exe 39 PID 1408 wrote to memory of 1532 1408 backup.exe 39 PID 1408 wrote to memory of 1532 1408 backup.exe 39 PID 1700 wrote to memory of 1500 1700 backup.exe 40 PID 1700 wrote to memory of 1500 1700 backup.exe 40 PID 1700 wrote to memory of 1500 1700 backup.exe 40 PID 1700 wrote to memory of 1500 1700 backup.exe 40 PID 696 wrote to memory of 560 696 backup.exe 42 PID 696 wrote to memory of 560 696 backup.exe 42 PID 696 wrote to memory of 560 696 backup.exe 42 PID 696 wrote to memory of 560 696 backup.exe 42 PID 1500 wrote to memory of 988 1500 backup.exe 41 PID 1500 wrote to memory of 988 1500 backup.exe 41 PID 1500 wrote to memory of 988 1500 backup.exe 41 PID 1500 wrote to memory of 988 1500 backup.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe"C:\Users\Admin\AppData\Local\Temp\2a4e23b90fdb603f3359a99dd588afcec16e699c362a309471ff5797b9d4ab7b.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:752 -
C:\Users\Admin\AppData\Local\Temp\4161472763\backup.exeC:\Users\Admin\AppData\Local\Temp\4161472763\backup.exe C:\Users\Admin\AppData\Local\Temp\4161472763\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:884 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:696 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1152 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1700 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1408 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files\Common Files\Microsoft Shared\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:988 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Executes dropped EXE
PID:1560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Executes dropped EXE
PID:1020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
PID:1012
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵PID:952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:1244
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:1292
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Executes dropped EXE
PID:332
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
PID:1564
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1268
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1112
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:928
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1972
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1428 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1420
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1068 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1416
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:304
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1908
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:928
-
-
C:\Program Files\DVD Maker\ja-JP\update.exe"C:\Program Files\DVD Maker\ja-JP\update.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1168
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Executes dropped EXE
PID:324
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:704
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
PID:1796
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1992
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:936
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1092
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:1308
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:560 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2044 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1900
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:972 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:324
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1696
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Executes dropped EXE
PID:1776
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Executes dropped EXE
PID:968
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1572
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1932
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1828
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:2004
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:856
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
PID:1600
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1624
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:1200
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:280
-
-
C:\Program Files (x86)\Common Files\DESIGNER\data.exe"C:\Program Files (x86)\Common Files\DESIGNER\data.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:2036
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1984
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:1904
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\data.exe"C:\Program Files (x86)\Common Files\SpeechEngines\data.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:1888
-
-
C:\Program Files (x86)\Common Files\System\backup.exe"C:\Program Files (x86)\Common Files\System\backup.exe" C:\Program Files (x86)\Common Files\System\6⤵PID:524
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1120 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:1712
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:1980
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1752
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:1516
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:788
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:436 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:856
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:964
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1124
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:1976
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:1576
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:1696
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:332
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f6961215086275b800216e87dbee2b69
SHA1ec95587ff9e73cac316e05097e9f53d941355174
SHA2563ab58076de06d15874c0dc0d7222007272532168ad05cc739fef6fe0fe32fdfa
SHA512fe89c6b6bcce3f4b26719158deabc097066d1ae2b416a743fe061be2506dd5744868314f01c050343cd90de493fad15d5a17ebf31f7adf2b53edd025d6935999
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5630f190148bacfd4220cc5cd68edb250
SHA13dff7858ec2d14a9b5c4beb6ba219a596c2c404c
SHA2561131abb4817afb172ab2dab1ae181edb24e9d0026a9ead945a51d60b347867c2
SHA5123c5c9fe1ba56246d025f725cfe7adafad237ed4241b167c7f28dac977898932f13415d79e374e9b28f886a17aaf0c85b167f53c1bc12968758110a7eafdb2ad1
-
Filesize
72KB
MD5630f190148bacfd4220cc5cd68edb250
SHA13dff7858ec2d14a9b5c4beb6ba219a596c2c404c
SHA2561131abb4817afb172ab2dab1ae181edb24e9d0026a9ead945a51d60b347867c2
SHA5123c5c9fe1ba56246d025f725cfe7adafad237ed4241b167c7f28dac977898932f13415d79e374e9b28f886a17aaf0c85b167f53c1bc12968758110a7eafdb2ad1
-
Filesize
72KB
MD5d3cc83124600e49ad62f14fff86a86ce
SHA1c3348fed0909f2f9fee5dbe396d8c055710ed718
SHA256c95d985b35c2f45d1792ed42aa88339ba545dd9cb882539584884e444d3d1db0
SHA5124813d644a4bde657cc4a959a8f77bd40ef89500f560e0e5de236b41c084d085bc9930c1d562befbf3f6807c6fd50682a23c9eb6a4770890e3071a73bc68fb6b7
-
Filesize
72KB
MD5d3cc83124600e49ad62f14fff86a86ce
SHA1c3348fed0909f2f9fee5dbe396d8c055710ed718
SHA256c95d985b35c2f45d1792ed42aa88339ba545dd9cb882539584884e444d3d1db0
SHA5124813d644a4bde657cc4a959a8f77bd40ef89500f560e0e5de236b41c084d085bc9930c1d562befbf3f6807c6fd50682a23c9eb6a4770890e3071a73bc68fb6b7
-
Filesize
72KB
MD5f3e915b476df738d69c8b682e57c119e
SHA1764cb9988a77b7686e95bb400e6e0a6998a64fbe
SHA2569b8c60aa27973283c504e3d63cd6b8f0b0d1f7e666175dd5a5835a1fad7d3df5
SHA5127c830b2d62d690c1ca9d5317bfeff15df4c2ad54627d6e34acb7e1395a2eed100d8bcfe9d46dbcceebc744909ece8b7cfffc717da10ee1ba87a95d265d79107c
-
Filesize
72KB
MD5f6961215086275b800216e87dbee2b69
SHA1ec95587ff9e73cac316e05097e9f53d941355174
SHA2563ab58076de06d15874c0dc0d7222007272532168ad05cc739fef6fe0fe32fdfa
SHA512fe89c6b6bcce3f4b26719158deabc097066d1ae2b416a743fe061be2506dd5744868314f01c050343cd90de493fad15d5a17ebf31f7adf2b53edd025d6935999
-
Filesize
72KB
MD5f6961215086275b800216e87dbee2b69
SHA1ec95587ff9e73cac316e05097e9f53d941355174
SHA2563ab58076de06d15874c0dc0d7222007272532168ad05cc739fef6fe0fe32fdfa
SHA512fe89c6b6bcce3f4b26719158deabc097066d1ae2b416a743fe061be2506dd5744868314f01c050343cd90de493fad15d5a17ebf31f7adf2b53edd025d6935999
-
Filesize
72KB
MD52cf5a21931a8060415ad208ebfc7c4b5
SHA19b9e4bfce8e8cbfa79d8143388f523809666335e
SHA256a16073be8dc518995fabcf52dfaf2f0180816fbec5252fcea98f1ed823376c5c
SHA5127777142c478ea40f1e0c4ce2885cade32f71ca3f58363a9e931e039b94f446cdcfcaf9f8cfbada7272b8ff826d259f34132cc3ef55b8185aa5498a6bb861f3b7
-
Filesize
72KB
MD5e2cdf5a12dad81bf9efd8b5f96551edd
SHA1fad08f63b99c742e78c61c819d65df4c3714d694
SHA256f601480d6a8cc2db2eb6b122b2b03ea83eaa3eb677a5511cea82bb3b79fc30a2
SHA512ffe1f79db256c130cbc9317f9e0890789da8c4d2e1795a82a846c168d33881a8572655cba0947a52001f3af50d2f0162ba4f1861f077f924384eba941cc22856
-
Filesize
72KB
MD5e2cdf5a12dad81bf9efd8b5f96551edd
SHA1fad08f63b99c742e78c61c819d65df4c3714d694
SHA256f601480d6a8cc2db2eb6b122b2b03ea83eaa3eb677a5511cea82bb3b79fc30a2
SHA512ffe1f79db256c130cbc9317f9e0890789da8c4d2e1795a82a846c168d33881a8572655cba0947a52001f3af50d2f0162ba4f1861f077f924384eba941cc22856
-
Filesize
72KB
MD5f675a68c4d0d581cca337ad8a8ecc080
SHA12d98dc59f366b1e6ca5192cb1fc8069c49cdb82c
SHA256f12a1b4d6d33cc4477db201675a26a2b086bf1611d674290f128e7c3075b17e8
SHA512cf5d5b11b6c4d1b2d8535a8995c6076667489de42a4a5ab677b409c345c8059a8119587a8ede82c7d42d60a2e99d8f119522ac5e23f597b4ab8a315cf6a58b4d
-
Filesize
72KB
MD5f675a68c4d0d581cca337ad8a8ecc080
SHA12d98dc59f366b1e6ca5192cb1fc8069c49cdb82c
SHA256f12a1b4d6d33cc4477db201675a26a2b086bf1611d674290f128e7c3075b17e8
SHA512cf5d5b11b6c4d1b2d8535a8995c6076667489de42a4a5ab677b409c345c8059a8119587a8ede82c7d42d60a2e99d8f119522ac5e23f597b4ab8a315cf6a58b4d
-
Filesize
72KB
MD554ab07520b961e8d77df4af9e472f762
SHA1c6e02f53ffc2dbe5d472d72ddc19b788b2adf153
SHA2560e9e81657d6f7e27dfc2089a3bb9c79eb97af623266e776afae43855f61537e3
SHA5121aa68774752f4cc23f63b6c5056d0aa1f7935de61d28e74acb0f163deb5e45cf7d8bdec9af3f1feae1b42a052145faf8be8d9a222e7136d42929c1ec046f1f84
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD594b20f63be2e73e451380b7cba5536fe
SHA1ac3b2f74cf09c9d304687ab7dcfd989a96e49ba0
SHA256de96be9a2cead8cfb5ea3ad792e4b5187eed267374688be46a6dceef5c85d782
SHA5128f785980f108858a560f9bed6a61f8cbc0a9747471a6b53a68c6956f342963e50e886c953f441e080845874f67e0670cac5e71df2d1590d54ccee0a5dd1b0803
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD594b20f63be2e73e451380b7cba5536fe
SHA1ac3b2f74cf09c9d304687ab7dcfd989a96e49ba0
SHA256de96be9a2cead8cfb5ea3ad792e4b5187eed267374688be46a6dceef5c85d782
SHA5128f785980f108858a560f9bed6a61f8cbc0a9747471a6b53a68c6956f342963e50e886c953f441e080845874f67e0670cac5e71df2d1590d54ccee0a5dd1b0803
-
Filesize
72KB
MD586b9bb2415259d52db8e796b5a151529
SHA118d59a468d58aabc35fb684d47259bc8a2ddfc1d
SHA2562a2d04dafbb9025c8cbc29950eace159df46d4e7f9bfdea4b60103ae786dba70
SHA51217c433e4f448d44308cbeb0871455e131a115ffc6c18f816954bf3fc1085ebe1ab79e187538e8a90b35e60e3355876a1f0f42b82061e465564e4953f75b56584
-
Filesize
72KB
MD586b9bb2415259d52db8e796b5a151529
SHA118d59a468d58aabc35fb684d47259bc8a2ddfc1d
SHA2562a2d04dafbb9025c8cbc29950eace159df46d4e7f9bfdea4b60103ae786dba70
SHA51217c433e4f448d44308cbeb0871455e131a115ffc6c18f816954bf3fc1085ebe1ab79e187538e8a90b35e60e3355876a1f0f42b82061e465564e4953f75b56584
-
Filesize
72KB
MD5f6961215086275b800216e87dbee2b69
SHA1ec95587ff9e73cac316e05097e9f53d941355174
SHA2563ab58076de06d15874c0dc0d7222007272532168ad05cc739fef6fe0fe32fdfa
SHA512fe89c6b6bcce3f4b26719158deabc097066d1ae2b416a743fe061be2506dd5744868314f01c050343cd90de493fad15d5a17ebf31f7adf2b53edd025d6935999
-
Filesize
72KB
MD5f6961215086275b800216e87dbee2b69
SHA1ec95587ff9e73cac316e05097e9f53d941355174
SHA2563ab58076de06d15874c0dc0d7222007272532168ad05cc739fef6fe0fe32fdfa
SHA512fe89c6b6bcce3f4b26719158deabc097066d1ae2b416a743fe061be2506dd5744868314f01c050343cd90de493fad15d5a17ebf31f7adf2b53edd025d6935999
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5630f190148bacfd4220cc5cd68edb250
SHA13dff7858ec2d14a9b5c4beb6ba219a596c2c404c
SHA2561131abb4817afb172ab2dab1ae181edb24e9d0026a9ead945a51d60b347867c2
SHA5123c5c9fe1ba56246d025f725cfe7adafad237ed4241b167c7f28dac977898932f13415d79e374e9b28f886a17aaf0c85b167f53c1bc12968758110a7eafdb2ad1
-
Filesize
72KB
MD5630f190148bacfd4220cc5cd68edb250
SHA13dff7858ec2d14a9b5c4beb6ba219a596c2c404c
SHA2561131abb4817afb172ab2dab1ae181edb24e9d0026a9ead945a51d60b347867c2
SHA5123c5c9fe1ba56246d025f725cfe7adafad237ed4241b167c7f28dac977898932f13415d79e374e9b28f886a17aaf0c85b167f53c1bc12968758110a7eafdb2ad1
-
Filesize
72KB
MD5d3cc83124600e49ad62f14fff86a86ce
SHA1c3348fed0909f2f9fee5dbe396d8c055710ed718
SHA256c95d985b35c2f45d1792ed42aa88339ba545dd9cb882539584884e444d3d1db0
SHA5124813d644a4bde657cc4a959a8f77bd40ef89500f560e0e5de236b41c084d085bc9930c1d562befbf3f6807c6fd50682a23c9eb6a4770890e3071a73bc68fb6b7
-
Filesize
72KB
MD5d3cc83124600e49ad62f14fff86a86ce
SHA1c3348fed0909f2f9fee5dbe396d8c055710ed718
SHA256c95d985b35c2f45d1792ed42aa88339ba545dd9cb882539584884e444d3d1db0
SHA5124813d644a4bde657cc4a959a8f77bd40ef89500f560e0e5de236b41c084d085bc9930c1d562befbf3f6807c6fd50682a23c9eb6a4770890e3071a73bc68fb6b7
-
Filesize
72KB
MD5f3e915b476df738d69c8b682e57c119e
SHA1764cb9988a77b7686e95bb400e6e0a6998a64fbe
SHA2569b8c60aa27973283c504e3d63cd6b8f0b0d1f7e666175dd5a5835a1fad7d3df5
SHA5127c830b2d62d690c1ca9d5317bfeff15df4c2ad54627d6e34acb7e1395a2eed100d8bcfe9d46dbcceebc744909ece8b7cfffc717da10ee1ba87a95d265d79107c
-
Filesize
72KB
MD5f3e915b476df738d69c8b682e57c119e
SHA1764cb9988a77b7686e95bb400e6e0a6998a64fbe
SHA2569b8c60aa27973283c504e3d63cd6b8f0b0d1f7e666175dd5a5835a1fad7d3df5
SHA5127c830b2d62d690c1ca9d5317bfeff15df4c2ad54627d6e34acb7e1395a2eed100d8bcfe9d46dbcceebc744909ece8b7cfffc717da10ee1ba87a95d265d79107c
-
Filesize
72KB
MD5f6961215086275b800216e87dbee2b69
SHA1ec95587ff9e73cac316e05097e9f53d941355174
SHA2563ab58076de06d15874c0dc0d7222007272532168ad05cc739fef6fe0fe32fdfa
SHA512fe89c6b6bcce3f4b26719158deabc097066d1ae2b416a743fe061be2506dd5744868314f01c050343cd90de493fad15d5a17ebf31f7adf2b53edd025d6935999
-
Filesize
72KB
MD5f6961215086275b800216e87dbee2b69
SHA1ec95587ff9e73cac316e05097e9f53d941355174
SHA2563ab58076de06d15874c0dc0d7222007272532168ad05cc739fef6fe0fe32fdfa
SHA512fe89c6b6bcce3f4b26719158deabc097066d1ae2b416a743fe061be2506dd5744868314f01c050343cd90de493fad15d5a17ebf31f7adf2b53edd025d6935999
-
Filesize
72KB
MD52cf5a21931a8060415ad208ebfc7c4b5
SHA19b9e4bfce8e8cbfa79d8143388f523809666335e
SHA256a16073be8dc518995fabcf52dfaf2f0180816fbec5252fcea98f1ed823376c5c
SHA5127777142c478ea40f1e0c4ce2885cade32f71ca3f58363a9e931e039b94f446cdcfcaf9f8cfbada7272b8ff826d259f34132cc3ef55b8185aa5498a6bb861f3b7
-
Filesize
72KB
MD52cf5a21931a8060415ad208ebfc7c4b5
SHA19b9e4bfce8e8cbfa79d8143388f523809666335e
SHA256a16073be8dc518995fabcf52dfaf2f0180816fbec5252fcea98f1ed823376c5c
SHA5127777142c478ea40f1e0c4ce2885cade32f71ca3f58363a9e931e039b94f446cdcfcaf9f8cfbada7272b8ff826d259f34132cc3ef55b8185aa5498a6bb861f3b7
-
Filesize
72KB
MD5e2cdf5a12dad81bf9efd8b5f96551edd
SHA1fad08f63b99c742e78c61c819d65df4c3714d694
SHA256f601480d6a8cc2db2eb6b122b2b03ea83eaa3eb677a5511cea82bb3b79fc30a2
SHA512ffe1f79db256c130cbc9317f9e0890789da8c4d2e1795a82a846c168d33881a8572655cba0947a52001f3af50d2f0162ba4f1861f077f924384eba941cc22856
-
Filesize
72KB
MD5e2cdf5a12dad81bf9efd8b5f96551edd
SHA1fad08f63b99c742e78c61c819d65df4c3714d694
SHA256f601480d6a8cc2db2eb6b122b2b03ea83eaa3eb677a5511cea82bb3b79fc30a2
SHA512ffe1f79db256c130cbc9317f9e0890789da8c4d2e1795a82a846c168d33881a8572655cba0947a52001f3af50d2f0162ba4f1861f077f924384eba941cc22856
-
Filesize
72KB
MD5f675a68c4d0d581cca337ad8a8ecc080
SHA12d98dc59f366b1e6ca5192cb1fc8069c49cdb82c
SHA256f12a1b4d6d33cc4477db201675a26a2b086bf1611d674290f128e7c3075b17e8
SHA512cf5d5b11b6c4d1b2d8535a8995c6076667489de42a4a5ab677b409c345c8059a8119587a8ede82c7d42d60a2e99d8f119522ac5e23f597b4ab8a315cf6a58b4d
-
Filesize
72KB
MD5f675a68c4d0d581cca337ad8a8ecc080
SHA12d98dc59f366b1e6ca5192cb1fc8069c49cdb82c
SHA256f12a1b4d6d33cc4477db201675a26a2b086bf1611d674290f128e7c3075b17e8
SHA512cf5d5b11b6c4d1b2d8535a8995c6076667489de42a4a5ab677b409c345c8059a8119587a8ede82c7d42d60a2e99d8f119522ac5e23f597b4ab8a315cf6a58b4d
-
Filesize
72KB
MD554ab07520b961e8d77df4af9e472f762
SHA1c6e02f53ffc2dbe5d472d72ddc19b788b2adf153
SHA2560e9e81657d6f7e27dfc2089a3bb9c79eb97af623266e776afae43855f61537e3
SHA5121aa68774752f4cc23f63b6c5056d0aa1f7935de61d28e74acb0f163deb5e45cf7d8bdec9af3f1feae1b42a052145faf8be8d9a222e7136d42929c1ec046f1f84
-
Filesize
72KB
MD554ab07520b961e8d77df4af9e472f762
SHA1c6e02f53ffc2dbe5d472d72ddc19b788b2adf153
SHA2560e9e81657d6f7e27dfc2089a3bb9c79eb97af623266e776afae43855f61537e3
SHA5121aa68774752f4cc23f63b6c5056d0aa1f7935de61d28e74acb0f163deb5e45cf7d8bdec9af3f1feae1b42a052145faf8be8d9a222e7136d42929c1ec046f1f84
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5c2bd5cc8c21618de34ee61e73ca63b98
SHA198eefe0d2a061e78c7b3611337226b9d41e91cf8
SHA256dd06a81fe4c6a6ff7109e037bf7eca2085e717e380b295723df413037f4fbaf1
SHA5120be4bbed62d2fdc2b503bbd0a99dd6192f9f1999c507731d76580022740c3f019d14bce2e862dbf7580ec4414f2d9b743722333ac4ff1b157a70d3a895d38e15
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD594b20f63be2e73e451380b7cba5536fe
SHA1ac3b2f74cf09c9d304687ab7dcfd989a96e49ba0
SHA256de96be9a2cead8cfb5ea3ad792e4b5187eed267374688be46a6dceef5c85d782
SHA5128f785980f108858a560f9bed6a61f8cbc0a9747471a6b53a68c6956f342963e50e886c953f441e080845874f67e0670cac5e71df2d1590d54ccee0a5dd1b0803
-
Filesize
72KB
MD594b20f63be2e73e451380b7cba5536fe
SHA1ac3b2f74cf09c9d304687ab7dcfd989a96e49ba0
SHA256de96be9a2cead8cfb5ea3ad792e4b5187eed267374688be46a6dceef5c85d782
SHA5128f785980f108858a560f9bed6a61f8cbc0a9747471a6b53a68c6956f342963e50e886c953f441e080845874f67e0670cac5e71df2d1590d54ccee0a5dd1b0803
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD5eafa290cc590da2eae10ad1584a48a2d
SHA1db26ec6abf18e36de848383c55fac767b7d35db8
SHA2566e000e1fcebe37a792a6a5b8b1af502b80243a8bfce40c792c2d6c312a5bf447
SHA512f1b16688109a1252a2b2992880ade14eefd58b114c361cb0536ce954c7e28a44865831bcd37d9ae32ed56cf0f15e00d2dc6fe91e9409949cfe1e46194b96e1a7
-
Filesize
72KB
MD594b20f63be2e73e451380b7cba5536fe
SHA1ac3b2f74cf09c9d304687ab7dcfd989a96e49ba0
SHA256de96be9a2cead8cfb5ea3ad792e4b5187eed267374688be46a6dceef5c85d782
SHA5128f785980f108858a560f9bed6a61f8cbc0a9747471a6b53a68c6956f342963e50e886c953f441e080845874f67e0670cac5e71df2d1590d54ccee0a5dd1b0803
-
Filesize
72KB
MD594b20f63be2e73e451380b7cba5536fe
SHA1ac3b2f74cf09c9d304687ab7dcfd989a96e49ba0
SHA256de96be9a2cead8cfb5ea3ad792e4b5187eed267374688be46a6dceef5c85d782
SHA5128f785980f108858a560f9bed6a61f8cbc0a9747471a6b53a68c6956f342963e50e886c953f441e080845874f67e0670cac5e71df2d1590d54ccee0a5dd1b0803