Analysis
-
max time kernel
155s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe
Resource
win10v2004-20220812-en
General
-
Target
4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe
-
Size
72KB
-
MD5
029e78e01676b1ccd5b054853fe4c5ad
-
SHA1
f57ad9134ef7d5b31b735cd408bf1d9f78837fec
-
SHA256
4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff
-
SHA512
e42a68cd518f9789c89e55cb1a09a6f4a061d528afe004730daad7b9d2149fcfc390b5bffa538093e8077c226e20fe1ac7bbbb6586ba574b2b582f7cb8af90e0
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf27:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrH
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 35 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe -
Executes dropped EXE 64 IoCs
pid Process 1968 backup.exe 2024 backup.exe 1548 backup.exe 1464 backup.exe 336 backup.exe 904 backup.exe 1396 backup.exe 576 backup.exe 1492 backup.exe 1680 backup.exe 1964 backup.exe 1384 backup.exe 1368 backup.exe 1788 backup.exe 852 backup.exe 1252 update.exe 1804 update.exe 1896 backup.exe 2004 backup.exe 2044 backup.exe 1604 backup.exe 2032 backup.exe 1688 backup.exe 1528 backup.exe 1792 backup.exe 948 backup.exe 2040 backup.exe 580 backup.exe 1796 backup.exe 1556 backup.exe 628 backup.exe 740 backup.exe 1724 backup.exe 1472 update.exe 1376 data.exe 1956 backup.exe 1952 backup.exe 1360 backup.exe 1108 backup.exe 1752 System Restore.exe 956 backup.exe 1748 backup.exe 1948 backup.exe 1892 backup.exe 1880 backup.exe 1484 backup.exe 1412 data.exe 1020 backup.exe 1500 backup.exe 1608 backup.exe 1580 backup.exe 2004 backup.exe 1480 backup.exe 1624 backup.exe 1820 data.exe 1408 backup.exe 268 backup.exe 460 backup.exe 664 backup.exe 972 backup.exe 1300 backup.exe 780 backup.exe 1448 backup.exe 1180 System Restore.exe -
Loads dropped DLL 64 IoCs
pid Process 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1548 backup.exe 1548 backup.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 336 backup.exe 336 backup.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1548 backup.exe 1548 backup.exe 1492 backup.exe 1492 backup.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1680 backup.exe 1680 backup.exe 1492 backup.exe 1492 backup.exe 1368 backup.exe 1368 backup.exe 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1788 backup.exe 1788 backup.exe 1788 backup.exe 1548 backup.exe 1548 backup.exe 1368 backup.exe 1368 backup.exe 1896 backup.exe 1896 backup.exe 1492 backup.exe 1492 backup.exe 2044 backup.exe 2044 backup.exe 2032 backup.exe 2032 backup.exe 2032 backup.exe 2032 backup.exe 1368 backup.exe 1368 backup.exe 1528 backup.exe 1528 backup.exe 1528 backup.exe 1528 backup.exe 1804 update.exe 1804 update.exe 1804 update.exe 1528 backup.exe 1528 backup.exe 1252 update.exe 1252 update.exe 1252 update.exe 1528 backup.exe 1528 backup.exe 1252 update.exe 1252 update.exe 1556 backup.exe 1556 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\MSBuild\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe update.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 1968 backup.exe 2024 backup.exe 1548 backup.exe 1464 backup.exe 336 backup.exe 904 backup.exe 1396 backup.exe 576 backup.exe 1492 backup.exe 1680 backup.exe 1964 backup.exe 1384 backup.exe 1368 backup.exe 1788 backup.exe 852 backup.exe 1896 backup.exe 2004 backup.exe 2044 backup.exe 2032 backup.exe 1688 backup.exe 1528 backup.exe 1792 backup.exe 948 backup.exe 2040 backup.exe 1252 update.exe 1804 update.exe 580 backup.exe 1796 backup.exe 1556 backup.exe 628 backup.exe 740 backup.exe 1724 backup.exe 1472 update.exe 1376 data.exe 1952 backup.exe 1108 backup.exe 1752 System Restore.exe 1748 backup.exe 1500 backup.exe 1480 backup.exe 1020 backup.exe 1892 backup.exe 956 backup.exe 1408 backup.exe 1820 data.exe 2004 backup.exe 1880 backup.exe 1484 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1968 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 26 PID 1076 wrote to memory of 1968 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 26 PID 1076 wrote to memory of 1968 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 26 PID 1076 wrote to memory of 1968 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 26 PID 1076 wrote to memory of 2024 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 27 PID 1076 wrote to memory of 2024 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 27 PID 1076 wrote to memory of 2024 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 27 PID 1076 wrote to memory of 2024 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 27 PID 1968 wrote to memory of 1548 1968 backup.exe 28 PID 1968 wrote to memory of 1548 1968 backup.exe 28 PID 1968 wrote to memory of 1548 1968 backup.exe 28 PID 1968 wrote to memory of 1548 1968 backup.exe 28 PID 1076 wrote to memory of 1464 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 29 PID 1076 wrote to memory of 1464 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 29 PID 1076 wrote to memory of 1464 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 29 PID 1076 wrote to memory of 1464 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 29 PID 1548 wrote to memory of 336 1548 backup.exe 30 PID 1548 wrote to memory of 336 1548 backup.exe 30 PID 1548 wrote to memory of 336 1548 backup.exe 30 PID 1548 wrote to memory of 336 1548 backup.exe 30 PID 1076 wrote to memory of 904 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 31 PID 1076 wrote to memory of 904 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 31 PID 1076 wrote to memory of 904 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 31 PID 1076 wrote to memory of 904 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 31 PID 336 wrote to memory of 576 336 backup.exe 32 PID 336 wrote to memory of 576 336 backup.exe 32 PID 336 wrote to memory of 576 336 backup.exe 32 PID 336 wrote to memory of 576 336 backup.exe 32 PID 1076 wrote to memory of 1396 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 33 PID 1076 wrote to memory of 1396 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 33 PID 1076 wrote to memory of 1396 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 33 PID 1076 wrote to memory of 1396 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 33 PID 1548 wrote to memory of 1492 1548 backup.exe 34 PID 1548 wrote to memory of 1492 1548 backup.exe 34 PID 1548 wrote to memory of 1492 1548 backup.exe 34 PID 1548 wrote to memory of 1492 1548 backup.exe 34 PID 1492 wrote to memory of 1680 1492 backup.exe 35 PID 1492 wrote to memory of 1680 1492 backup.exe 35 PID 1492 wrote to memory of 1680 1492 backup.exe 35 PID 1492 wrote to memory of 1680 1492 backup.exe 35 PID 1076 wrote to memory of 1964 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 36 PID 1076 wrote to memory of 1964 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 36 PID 1076 wrote to memory of 1964 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 36 PID 1076 wrote to memory of 1964 1076 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe 36 PID 1680 wrote to memory of 1384 1680 backup.exe 37 PID 1680 wrote to memory of 1384 1680 backup.exe 37 PID 1680 wrote to memory of 1384 1680 backup.exe 37 PID 1680 wrote to memory of 1384 1680 backup.exe 37 PID 1492 wrote to memory of 1368 1492 backup.exe 38 PID 1492 wrote to memory of 1368 1492 backup.exe 38 PID 1492 wrote to memory of 1368 1492 backup.exe 38 PID 1492 wrote to memory of 1368 1492 backup.exe 38 PID 1368 wrote to memory of 1788 1368 backup.exe 39 PID 1368 wrote to memory of 1788 1368 backup.exe 39 PID 1368 wrote to memory of 1788 1368 backup.exe 39 PID 1368 wrote to memory of 1788 1368 backup.exe 39 PID 1788 wrote to memory of 852 1788 backup.exe 41 PID 1788 wrote to memory of 852 1788 backup.exe 41 PID 1788 wrote to memory of 852 1788 backup.exe 41 PID 1788 wrote to memory of 852 1788 backup.exe 41 PID 1788 wrote to memory of 1252 1788 backup.exe 42 PID 1788 wrote to memory of 1252 1788 backup.exe 42 PID 1788 wrote to memory of 1252 1788 backup.exe 42 PID 1788 wrote to memory of 1252 1788 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe"C:\Users\Admin\AppData\Local\Temp\4f450013623f10aeb4d8d9d45ccc0ea705ab6bfaa698d2274e7fd0335bfc50ff.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\3489733310\backup.exeC:\Users\Admin\AppData\Local\Temp\3489733310\backup.exe C:\Users\Admin\AppData\Local\Temp\3489733310\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1968 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1548 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:336 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1492 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1368 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1788 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1252 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1556
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Executes dropped EXE
PID:1360
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Executes dropped EXE
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵PID:112
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵PID:528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:848
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:628 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
PID:1412
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
PID:460
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1152
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1812
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
PID:1580
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
PID:1300
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:872
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1168
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1724
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2004
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
PID:1956
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Executes dropped EXE
PID:1604
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724 -
C:\Program Files\Google\Chrome\System Restore.exe"C:\Program Files\Google\Chrome\System Restore.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
PID:1608
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵
- Executes dropped EXE
PID:664
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1064
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1184
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:948
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1896 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2044 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:948
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:580
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1796 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1472
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:956
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Executes dropped EXE
PID:1448
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Executes dropped EXE
PID:780
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1884
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:976
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:288
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1952 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:1960
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1640
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:996
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
-
-
C:\Program Files (x86)\Common Files\data.exe"C:\Program Files (x86)\Common Files\data.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵
- Executes dropped EXE
PID:972
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:660
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:740 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
C:\Users\Public\System Restore.exe"C:\Users\Public\System Restore.exe" C:\Users\Public\5⤵
- Executes dropped EXE
PID:1180
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d06dc1b3f2f3c4c069dacbb1fe33cb95
SHA1394728c9a68b86c23f6039942155c261535228cb
SHA25687bc72e215da1283f203a00ef35ac96516ac0d121ad8d5f2317634c954108e86
SHA512c44d1c2a2023fef93fcafe2493a26b1247caaefb872b5cecb72c7513cffc86be0b3118e74a0b8e1dc4961285ad8d0f470ef91abd9c25ddc3ac283e852d3e9314
-
Filesize
72KB
MD5fdd8c5b1f816622a60eb8e000dc37787
SHA170916aad533367479bb38c2b847b6264a9b52de9
SHA256102c33f6e3418851289efdfd63918ef5e785d29ec17162547bb1dec87ada6e81
SHA5122cf2c0875a085f9896b191fe87a4fd1b001ab31afbf04e70cd93739978b90082d168c9b4605120c6c3087b9b35f119ed9daaac05eb3872ec80f02b57596d9fcb
-
Filesize
72KB
MD5fdd8c5b1f816622a60eb8e000dc37787
SHA170916aad533367479bb38c2b847b6264a9b52de9
SHA256102c33f6e3418851289efdfd63918ef5e785d29ec17162547bb1dec87ada6e81
SHA5122cf2c0875a085f9896b191fe87a4fd1b001ab31afbf04e70cd93739978b90082d168c9b4605120c6c3087b9b35f119ed9daaac05eb3872ec80f02b57596d9fcb
-
Filesize
72KB
MD5db7a3a2e7631fe5e6a60e5e4ac9eaabe
SHA139719a54b406b03910d4c1d52ad14671c16e3caf
SHA256b1473f17afcbcb9fcaa394559a93c1f3374ec7ffc28f450f1cb935efd161b7ed
SHA51222500312d6d37dfefc11bac452685d0ab43e11d90735780fa5e618d692ff9844ba222b4224e04ce69d4d05c99eca0a4e7511fb203c40dddaca51098d26ff03af
-
Filesize
72KB
MD5db7a3a2e7631fe5e6a60e5e4ac9eaabe
SHA139719a54b406b03910d4c1d52ad14671c16e3caf
SHA256b1473f17afcbcb9fcaa394559a93c1f3374ec7ffc28f450f1cb935efd161b7ed
SHA51222500312d6d37dfefc11bac452685d0ab43e11d90735780fa5e618d692ff9844ba222b4224e04ce69d4d05c99eca0a4e7511fb203c40dddaca51098d26ff03af
-
Filesize
72KB
MD5c5827232c54f4c37c712610d32ca8560
SHA12f6270505263266b3c5cbe7b93965d8102908aa4
SHA2563560b8768a2e6cb210a5c822da8b53e23247a9129dbd19fc1631dfe7db2188c1
SHA512b8e23aab4cb1132ade8a5620972fe6f93ec79d7690b3f12eb47b689ee5627ab8cd1c08a15ed4aa01bae51350cc780704398eb4636e4fbffdbeb5cfac8ad07ab8
-
Filesize
72KB
MD5cd8dcf08db1fb72638a22e2d8ff014c0
SHA166d1cab2920938aa65b4300c0c1eb8db9503cdd4
SHA256d6f17e0a510f94c4aed9efc20edb7e06a4641e9e771207f9c6f7e2df5b12acbb
SHA51235b86843393cdb394a4ffd8728be3e5cf23996cac0818e8a498bfa318793f24c42b71ab76338c1c9e3ed2664329e31a1ce366a63455301bf4f9098c0012c32a7
-
Filesize
72KB
MD5cd8dcf08db1fb72638a22e2d8ff014c0
SHA166d1cab2920938aa65b4300c0c1eb8db9503cdd4
SHA256d6f17e0a510f94c4aed9efc20edb7e06a4641e9e771207f9c6f7e2df5b12acbb
SHA51235b86843393cdb394a4ffd8728be3e5cf23996cac0818e8a498bfa318793f24c42b71ab76338c1c9e3ed2664329e31a1ce366a63455301bf4f9098c0012c32a7
-
Filesize
72KB
MD517105e620ee124f3a3ec9c0454c29119
SHA1c9746ce9c85d06bd7e19d1395936ba74496b81bf
SHA256ebabb6d0aebb1606fb44ed61f4bf1afff5c3689173e6fb6882e2eacdc43b7a2e
SHA5123ca4728a45bf0687913f43e7995a753dc4721e2549be96e1974b156723c4e2c0504baced8cff14bf240cf74b2e5cd8e4b0ff29f691c82222a5859bb48f74902d
-
Filesize
72KB
MD56700bbcd01ce55a0a24e6e6dc3efd968
SHA1112c6e99ff405c81a528a5676423719b937e143d
SHA2561624b033dc0b91c8a933a5b2112ef7a99a715222cda29c767739ed5a7edfaa45
SHA5127c219f4aa500f871c673b25b83662c21b976dbc6ea6f7b5049298f91abcac82ee8841b6d8265210c29f2f5dd0f4769bb0f207379274c53b5496c7fbb03999ea8
-
Filesize
72KB
MD56700bbcd01ce55a0a24e6e6dc3efd968
SHA1112c6e99ff405c81a528a5676423719b937e143d
SHA2561624b033dc0b91c8a933a5b2112ef7a99a715222cda29c767739ed5a7edfaa45
SHA5127c219f4aa500f871c673b25b83662c21b976dbc6ea6f7b5049298f91abcac82ee8841b6d8265210c29f2f5dd0f4769bb0f207379274c53b5496c7fbb03999ea8
-
Filesize
72KB
MD5c4f9289d33e461c6387de7dbc8f1b501
SHA13aa6dc7f78fe5fa10d7b75d87c2e39dba069f150
SHA2562b93788b723bdf20388118a2bb4ce399189c4863c5a08b804009d4cc2107c4ef
SHA51296418900eb9cec5aa91459d896455ca753a73c67adbb9fbc89256512cb21adb924827ce37b0038b0d4c9cb3692ef0e18773a7445ec0e60b3924cc633002040ec
-
Filesize
72KB
MD5c4f9289d33e461c6387de7dbc8f1b501
SHA13aa6dc7f78fe5fa10d7b75d87c2e39dba069f150
SHA2562b93788b723bdf20388118a2bb4ce399189c4863c5a08b804009d4cc2107c4ef
SHA51296418900eb9cec5aa91459d896455ca753a73c67adbb9fbc89256512cb21adb924827ce37b0038b0d4c9cb3692ef0e18773a7445ec0e60b3924cc633002040ec
-
Filesize
72KB
MD54fcf1253cde05d25c79d33b0cc7f86f6
SHA1a55d85b5c3fb58c8b87d14d138c8b257f8a586b3
SHA25677437075fd63d815c8928a08d249b45cfddefcd70562da03c2eff1ff7df44e87
SHA512e56139c6f460ac9f68e20fde112b582b1175b71cc3fddcb12cf68c86dbaee66408a07d9112737cd49180c08874759ca4a5738fcbe73e6288ecd14b61e8f16e33
-
Filesize
72KB
MD55694dc08973df803675708330c5ca82e
SHA13ed83994c56ea665f2f096f08fc293dfc131c683
SHA256bf42e5cdf74071d4f0d40bd68277cf245d2687e7c4aad0ac2732ffc11f0dc410
SHA512e661f2d914a96f8e1922377cd0cb85fc4e007a0767a7825cf941d5b5389400c6f45cc6a6352d0400a884168b81b22f449b826af57ca360f6cfcdb8d03740bbc2
-
Filesize
72KB
MD55694dc08973df803675708330c5ca82e
SHA13ed83994c56ea665f2f096f08fc293dfc131c683
SHA256bf42e5cdf74071d4f0d40bd68277cf245d2687e7c4aad0ac2732ffc11f0dc410
SHA512e661f2d914a96f8e1922377cd0cb85fc4e007a0767a7825cf941d5b5389400c6f45cc6a6352d0400a884168b81b22f449b826af57ca360f6cfcdb8d03740bbc2
-
Filesize
72KB
MD5115f0b1bc888d460279572104bdc347c
SHA189cd7f361ad98263a8cc7027de2ad60246b07030
SHA2560f4f0feed0d5367d0020ebcbfeeab49c1227a0f5fb9e9c43cb99f9de59c636e5
SHA5129846def779a600513a42641560e6088bef447e1321339aa584890dec6cc28042376658a4c8c333b264c348e4b37798ea290b69cc2626aab8d669529d0ceef26e
-
Filesize
72KB
MD5115f0b1bc888d460279572104bdc347c
SHA189cd7f361ad98263a8cc7027de2ad60246b07030
SHA2560f4f0feed0d5367d0020ebcbfeeab49c1227a0f5fb9e9c43cb99f9de59c636e5
SHA5129846def779a600513a42641560e6088bef447e1321339aa584890dec6cc28042376658a4c8c333b264c348e4b37798ea290b69cc2626aab8d669529d0ceef26e
-
Filesize
72KB
MD56a8fadc29874c3f79d349c37777055e3
SHA170dcaa80fc03b696a262809168f5c08344adbc66
SHA256eb55efd759e0c09a7b932faaf097d4767761af934108f4a65b10dfae0dde3108
SHA512ea834547468b966e576d1a39eb07e5569b6b086d60e868958c0962cfb585558b5560e4761cf6780168e926f1d899e0e9dd6fde86a176b7706e387dd4f6335d60
-
Filesize
72KB
MD56a8fadc29874c3f79d349c37777055e3
SHA170dcaa80fc03b696a262809168f5c08344adbc66
SHA256eb55efd759e0c09a7b932faaf097d4767761af934108f4a65b10dfae0dde3108
SHA512ea834547468b966e576d1a39eb07e5569b6b086d60e868958c0962cfb585558b5560e4761cf6780168e926f1d899e0e9dd6fde86a176b7706e387dd4f6335d60
-
Filesize
72KB
MD58fac9d09847d5b025e9534fb7776eac1
SHA1d69432911c302a1b2554e43f4581caa2cd56e7e9
SHA2560c30adc3ad79f366f3c26ce0fdc64736fc86c7e538081b8306c98460a2885e3b
SHA5120fb6dcd1d01ae68fb3313d93854ffcc74b7d2330782f80b679ec75ca7e39c4d526b87de29ce2f8ceccf8f9e9e47670112953dbc8aac2827d40132113ddd59388
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD51d1953e4febcbf201b6ed4f855a741fa
SHA12fdd95fee185d53d860ba6b51ab3a8af7baa56fe
SHA256a7a93c9e8f3786fdcf126b0755751ccf603d82a798ba2ef64d2d98d1de679661
SHA512274b0b93ad230b9cfbcdaf6ac40473772267183c2cf4896027d295bc04ec7be73c3cd0dfed4892e63e6c7550d629fac9cfad7df6c105f50605b0ee93c39cb3c9
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD537e0e2dd89de68901d4429186d4a3abd
SHA1ce87d3518233672e3161680b201fea5967db2241
SHA25600c0ca26cbf2d4d36cd651bb91da35db2b755e61c4bf29d4a3f9177007dd7553
SHA5121adce2253123b8a48cbd891d5b4af5c010a3234299f5c21b2460e79b174ccc7f73c9ecd153a38d86cb5438b38d7967c7abb1577be416114b6984141eabfbd067
-
Filesize
72KB
MD562d023a10a39c8077ba9c79aaa1fd4f8
SHA150cf81b79d39ed39b43bf80d442b027ae2db01e2
SHA256a3598c47dd44953d54f785f06541bb131f8e356e5d7fd8e055bdf7f986c10012
SHA512212153c62d33542ce293c7a8e155bf0d261a95386426b64b3335b184d0393e51713c0a34d5727acb8de4811ca44b1a55e6439cf16ac90e3b30507d8f975e1f10
-
Filesize
72KB
MD562d023a10a39c8077ba9c79aaa1fd4f8
SHA150cf81b79d39ed39b43bf80d442b027ae2db01e2
SHA256a3598c47dd44953d54f785f06541bb131f8e356e5d7fd8e055bdf7f986c10012
SHA512212153c62d33542ce293c7a8e155bf0d261a95386426b64b3335b184d0393e51713c0a34d5727acb8de4811ca44b1a55e6439cf16ac90e3b30507d8f975e1f10
-
Filesize
72KB
MD54acc8863121ac8a26970ab049a05be71
SHA1efa61d069d022930b3d67022224b5b310090727c
SHA256c293655afa6cc9835dfa6c08b685c0c36251a04a07b8bffc7906efc9739b7b1d
SHA51242f6d6c007dede4d0415b8af8d73903b0b7936e4bd343b429c3aeaff20b758d2b1bb7c0fa12886ee778acdfd3f1f5f8e1ae0e078a138e2b4d442f0f60c80ff8d
-
Filesize
72KB
MD537e0e2dd89de68901d4429186d4a3abd
SHA1ce87d3518233672e3161680b201fea5967db2241
SHA25600c0ca26cbf2d4d36cd651bb91da35db2b755e61c4bf29d4a3f9177007dd7553
SHA5121adce2253123b8a48cbd891d5b4af5c010a3234299f5c21b2460e79b174ccc7f73c9ecd153a38d86cb5438b38d7967c7abb1577be416114b6984141eabfbd067
-
Filesize
72KB
MD5e0926acf5164f2dea0ed9c5a035e5e5f
SHA103a0890492d2d945f75018944125536418d210be
SHA256c9736916e68eaee83851d61fd406c1e00a834358cba4c2c994f608dd363e35db
SHA5120898a9651d9d664cb310996812451ffdc93ed528e0e84afa5aa330464697c7b5bdcfc3b0b99f79c906bb7689df22a1242a0f3c94241008920e39b5c7d40cc6e1
-
Filesize
72KB
MD5e0926acf5164f2dea0ed9c5a035e5e5f
SHA103a0890492d2d945f75018944125536418d210be
SHA256c9736916e68eaee83851d61fd406c1e00a834358cba4c2c994f608dd363e35db
SHA5120898a9651d9d664cb310996812451ffdc93ed528e0e84afa5aa330464697c7b5bdcfc3b0b99f79c906bb7689df22a1242a0f3c94241008920e39b5c7d40cc6e1
-
Filesize
72KB
MD5d06dc1b3f2f3c4c069dacbb1fe33cb95
SHA1394728c9a68b86c23f6039942155c261535228cb
SHA25687bc72e215da1283f203a00ef35ac96516ac0d121ad8d5f2317634c954108e86
SHA512c44d1c2a2023fef93fcafe2493a26b1247caaefb872b5cecb72c7513cffc86be0b3118e74a0b8e1dc4961285ad8d0f470ef91abd9c25ddc3ac283e852d3e9314
-
Filesize
72KB
MD5d06dc1b3f2f3c4c069dacbb1fe33cb95
SHA1394728c9a68b86c23f6039942155c261535228cb
SHA25687bc72e215da1283f203a00ef35ac96516ac0d121ad8d5f2317634c954108e86
SHA512c44d1c2a2023fef93fcafe2493a26b1247caaefb872b5cecb72c7513cffc86be0b3118e74a0b8e1dc4961285ad8d0f470ef91abd9c25ddc3ac283e852d3e9314
-
Filesize
72KB
MD5fdd8c5b1f816622a60eb8e000dc37787
SHA170916aad533367479bb38c2b847b6264a9b52de9
SHA256102c33f6e3418851289efdfd63918ef5e785d29ec17162547bb1dec87ada6e81
SHA5122cf2c0875a085f9896b191fe87a4fd1b001ab31afbf04e70cd93739978b90082d168c9b4605120c6c3087b9b35f119ed9daaac05eb3872ec80f02b57596d9fcb
-
Filesize
72KB
MD5fdd8c5b1f816622a60eb8e000dc37787
SHA170916aad533367479bb38c2b847b6264a9b52de9
SHA256102c33f6e3418851289efdfd63918ef5e785d29ec17162547bb1dec87ada6e81
SHA5122cf2c0875a085f9896b191fe87a4fd1b001ab31afbf04e70cd93739978b90082d168c9b4605120c6c3087b9b35f119ed9daaac05eb3872ec80f02b57596d9fcb
-
Filesize
72KB
MD544a10d561baf338a985bb94c6415c7a8
SHA16fe4591c9209e9c7de4e4ae0f70aebe2fa0b8e74
SHA256b18bfafe3accd5612bb5d444735179b1d78641c42c65cf7d37097a0cd941954f
SHA512455346af386f445a84b2abf143b25d188a8ddc2912529bcf45011301032e64da55971b83a0039fecc7636f623ab86376f41ec49f0db4821cf185a66a80c5069b
-
Filesize
72KB
MD5db7a3a2e7631fe5e6a60e5e4ac9eaabe
SHA139719a54b406b03910d4c1d52ad14671c16e3caf
SHA256b1473f17afcbcb9fcaa394559a93c1f3374ec7ffc28f450f1cb935efd161b7ed
SHA51222500312d6d37dfefc11bac452685d0ab43e11d90735780fa5e618d692ff9844ba222b4224e04ce69d4d05c99eca0a4e7511fb203c40dddaca51098d26ff03af
-
Filesize
72KB
MD5db7a3a2e7631fe5e6a60e5e4ac9eaabe
SHA139719a54b406b03910d4c1d52ad14671c16e3caf
SHA256b1473f17afcbcb9fcaa394559a93c1f3374ec7ffc28f450f1cb935efd161b7ed
SHA51222500312d6d37dfefc11bac452685d0ab43e11d90735780fa5e618d692ff9844ba222b4224e04ce69d4d05c99eca0a4e7511fb203c40dddaca51098d26ff03af
-
Filesize
72KB
MD5c5827232c54f4c37c712610d32ca8560
SHA12f6270505263266b3c5cbe7b93965d8102908aa4
SHA2563560b8768a2e6cb210a5c822da8b53e23247a9129dbd19fc1631dfe7db2188c1
SHA512b8e23aab4cb1132ade8a5620972fe6f93ec79d7690b3f12eb47b689ee5627ab8cd1c08a15ed4aa01bae51350cc780704398eb4636e4fbffdbeb5cfac8ad07ab8
-
Filesize
72KB
MD5c5827232c54f4c37c712610d32ca8560
SHA12f6270505263266b3c5cbe7b93965d8102908aa4
SHA2563560b8768a2e6cb210a5c822da8b53e23247a9129dbd19fc1631dfe7db2188c1
SHA512b8e23aab4cb1132ade8a5620972fe6f93ec79d7690b3f12eb47b689ee5627ab8cd1c08a15ed4aa01bae51350cc780704398eb4636e4fbffdbeb5cfac8ad07ab8
-
Filesize
72KB
MD5cd8dcf08db1fb72638a22e2d8ff014c0
SHA166d1cab2920938aa65b4300c0c1eb8db9503cdd4
SHA256d6f17e0a510f94c4aed9efc20edb7e06a4641e9e771207f9c6f7e2df5b12acbb
SHA51235b86843393cdb394a4ffd8728be3e5cf23996cac0818e8a498bfa318793f24c42b71ab76338c1c9e3ed2664329e31a1ce366a63455301bf4f9098c0012c32a7
-
Filesize
72KB
MD5cd8dcf08db1fb72638a22e2d8ff014c0
SHA166d1cab2920938aa65b4300c0c1eb8db9503cdd4
SHA256d6f17e0a510f94c4aed9efc20edb7e06a4641e9e771207f9c6f7e2df5b12acbb
SHA51235b86843393cdb394a4ffd8728be3e5cf23996cac0818e8a498bfa318793f24c42b71ab76338c1c9e3ed2664329e31a1ce366a63455301bf4f9098c0012c32a7
-
Filesize
72KB
MD517105e620ee124f3a3ec9c0454c29119
SHA1c9746ce9c85d06bd7e19d1395936ba74496b81bf
SHA256ebabb6d0aebb1606fb44ed61f4bf1afff5c3689173e6fb6882e2eacdc43b7a2e
SHA5123ca4728a45bf0687913f43e7995a753dc4721e2549be96e1974b156723c4e2c0504baced8cff14bf240cf74b2e5cd8e4b0ff29f691c82222a5859bb48f74902d
-
Filesize
72KB
MD517105e620ee124f3a3ec9c0454c29119
SHA1c9746ce9c85d06bd7e19d1395936ba74496b81bf
SHA256ebabb6d0aebb1606fb44ed61f4bf1afff5c3689173e6fb6882e2eacdc43b7a2e
SHA5123ca4728a45bf0687913f43e7995a753dc4721e2549be96e1974b156723c4e2c0504baced8cff14bf240cf74b2e5cd8e4b0ff29f691c82222a5859bb48f74902d
-
Filesize
72KB
MD56700bbcd01ce55a0a24e6e6dc3efd968
SHA1112c6e99ff405c81a528a5676423719b937e143d
SHA2561624b033dc0b91c8a933a5b2112ef7a99a715222cda29c767739ed5a7edfaa45
SHA5127c219f4aa500f871c673b25b83662c21b976dbc6ea6f7b5049298f91abcac82ee8841b6d8265210c29f2f5dd0f4769bb0f207379274c53b5496c7fbb03999ea8
-
Filesize
72KB
MD56700bbcd01ce55a0a24e6e6dc3efd968
SHA1112c6e99ff405c81a528a5676423719b937e143d
SHA2561624b033dc0b91c8a933a5b2112ef7a99a715222cda29c767739ed5a7edfaa45
SHA5127c219f4aa500f871c673b25b83662c21b976dbc6ea6f7b5049298f91abcac82ee8841b6d8265210c29f2f5dd0f4769bb0f207379274c53b5496c7fbb03999ea8
-
Filesize
72KB
MD5c4f9289d33e461c6387de7dbc8f1b501
SHA13aa6dc7f78fe5fa10d7b75d87c2e39dba069f150
SHA2562b93788b723bdf20388118a2bb4ce399189c4863c5a08b804009d4cc2107c4ef
SHA51296418900eb9cec5aa91459d896455ca753a73c67adbb9fbc89256512cb21adb924827ce37b0038b0d4c9cb3692ef0e18773a7445ec0e60b3924cc633002040ec
-
Filesize
72KB
MD54fcf1253cde05d25c79d33b0cc7f86f6
SHA1a55d85b5c3fb58c8b87d14d138c8b257f8a586b3
SHA25677437075fd63d815c8928a08d249b45cfddefcd70562da03c2eff1ff7df44e87
SHA512e56139c6f460ac9f68e20fde112b582b1175b71cc3fddcb12cf68c86dbaee66408a07d9112737cd49180c08874759ca4a5738fcbe73e6288ecd14b61e8f16e33
-
Filesize
72KB
MD54fcf1253cde05d25c79d33b0cc7f86f6
SHA1a55d85b5c3fb58c8b87d14d138c8b257f8a586b3
SHA25677437075fd63d815c8928a08d249b45cfddefcd70562da03c2eff1ff7df44e87
SHA512e56139c6f460ac9f68e20fde112b582b1175b71cc3fddcb12cf68c86dbaee66408a07d9112737cd49180c08874759ca4a5738fcbe73e6288ecd14b61e8f16e33
-
Filesize
72KB
MD55694dc08973df803675708330c5ca82e
SHA13ed83994c56ea665f2f096f08fc293dfc131c683
SHA256bf42e5cdf74071d4f0d40bd68277cf245d2687e7c4aad0ac2732ffc11f0dc410
SHA512e661f2d914a96f8e1922377cd0cb85fc4e007a0767a7825cf941d5b5389400c6f45cc6a6352d0400a884168b81b22f449b826af57ca360f6cfcdb8d03740bbc2
-
Filesize
72KB
MD55694dc08973df803675708330c5ca82e
SHA13ed83994c56ea665f2f096f08fc293dfc131c683
SHA256bf42e5cdf74071d4f0d40bd68277cf245d2687e7c4aad0ac2732ffc11f0dc410
SHA512e661f2d914a96f8e1922377cd0cb85fc4e007a0767a7825cf941d5b5389400c6f45cc6a6352d0400a884168b81b22f449b826af57ca360f6cfcdb8d03740bbc2
-
Filesize
72KB
MD5115f0b1bc888d460279572104bdc347c
SHA189cd7f361ad98263a8cc7027de2ad60246b07030
SHA2560f4f0feed0d5367d0020ebcbfeeab49c1227a0f5fb9e9c43cb99f9de59c636e5
SHA5129846def779a600513a42641560e6088bef447e1321339aa584890dec6cc28042376658a4c8c333b264c348e4b37798ea290b69cc2626aab8d669529d0ceef26e
-
Filesize
72KB
MD5115f0b1bc888d460279572104bdc347c
SHA189cd7f361ad98263a8cc7027de2ad60246b07030
SHA2560f4f0feed0d5367d0020ebcbfeeab49c1227a0f5fb9e9c43cb99f9de59c636e5
SHA5129846def779a600513a42641560e6088bef447e1321339aa584890dec6cc28042376658a4c8c333b264c348e4b37798ea290b69cc2626aab8d669529d0ceef26e
-
Filesize
72KB
MD56a8fadc29874c3f79d349c37777055e3
SHA170dcaa80fc03b696a262809168f5c08344adbc66
SHA256eb55efd759e0c09a7b932faaf097d4767761af934108f4a65b10dfae0dde3108
SHA512ea834547468b966e576d1a39eb07e5569b6b086d60e868958c0962cfb585558b5560e4761cf6780168e926f1d899e0e9dd6fde86a176b7706e387dd4f6335d60
-
Filesize
72KB
MD56a8fadc29874c3f79d349c37777055e3
SHA170dcaa80fc03b696a262809168f5c08344adbc66
SHA256eb55efd759e0c09a7b932faaf097d4767761af934108f4a65b10dfae0dde3108
SHA512ea834547468b966e576d1a39eb07e5569b6b086d60e868958c0962cfb585558b5560e4761cf6780168e926f1d899e0e9dd6fde86a176b7706e387dd4f6335d60
-
Filesize
72KB
MD58fac9d09847d5b025e9534fb7776eac1
SHA1d69432911c302a1b2554e43f4581caa2cd56e7e9
SHA2560c30adc3ad79f366f3c26ce0fdc64736fc86c7e538081b8306c98460a2885e3b
SHA5120fb6dcd1d01ae68fb3313d93854ffcc74b7d2330782f80b679ec75ca7e39c4d526b87de29ce2f8ceccf8f9e9e47670112953dbc8aac2827d40132113ddd59388
-
Filesize
72KB
MD58fac9d09847d5b025e9534fb7776eac1
SHA1d69432911c302a1b2554e43f4581caa2cd56e7e9
SHA2560c30adc3ad79f366f3c26ce0fdc64736fc86c7e538081b8306c98460a2885e3b
SHA5120fb6dcd1d01ae68fb3313d93854ffcc74b7d2330782f80b679ec75ca7e39c4d526b87de29ce2f8ceccf8f9e9e47670112953dbc8aac2827d40132113ddd59388
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD51d1953e4febcbf201b6ed4f855a741fa
SHA12fdd95fee185d53d860ba6b51ab3a8af7baa56fe
SHA256a7a93c9e8f3786fdcf126b0755751ccf603d82a798ba2ef64d2d98d1de679661
SHA512274b0b93ad230b9cfbcdaf6ac40473772267183c2cf4896027d295bc04ec7be73c3cd0dfed4892e63e6c7550d629fac9cfad7df6c105f50605b0ee93c39cb3c9
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD51d1953e4febcbf201b6ed4f855a741fa
SHA12fdd95fee185d53d860ba6b51ab3a8af7baa56fe
SHA256a7a93c9e8f3786fdcf126b0755751ccf603d82a798ba2ef64d2d98d1de679661
SHA512274b0b93ad230b9cfbcdaf6ac40473772267183c2cf4896027d295bc04ec7be73c3cd0dfed4892e63e6c7550d629fac9cfad7df6c105f50605b0ee93c39cb3c9
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD537e0e2dd89de68901d4429186d4a3abd
SHA1ce87d3518233672e3161680b201fea5967db2241
SHA25600c0ca26cbf2d4d36cd651bb91da35db2b755e61c4bf29d4a3f9177007dd7553
SHA5121adce2253123b8a48cbd891d5b4af5c010a3234299f5c21b2460e79b174ccc7f73c9ecd153a38d86cb5438b38d7967c7abb1577be416114b6984141eabfbd067
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD537e0e2dd89de68901d4429186d4a3abd
SHA1ce87d3518233672e3161680b201fea5967db2241
SHA25600c0ca26cbf2d4d36cd651bb91da35db2b755e61c4bf29d4a3f9177007dd7553
SHA5121adce2253123b8a48cbd891d5b4af5c010a3234299f5c21b2460e79b174ccc7f73c9ecd153a38d86cb5438b38d7967c7abb1577be416114b6984141eabfbd067
-
Filesize
72KB
MD562d023a10a39c8077ba9c79aaa1fd4f8
SHA150cf81b79d39ed39b43bf80d442b027ae2db01e2
SHA256a3598c47dd44953d54f785f06541bb131f8e356e5d7fd8e055bdf7f986c10012
SHA512212153c62d33542ce293c7a8e155bf0d261a95386426b64b3335b184d0393e51713c0a34d5727acb8de4811ca44b1a55e6439cf16ac90e3b30507d8f975e1f10
-
Filesize
72KB
MD54acc8863121ac8a26970ab049a05be71
SHA1efa61d069d022930b3d67022224b5b310090727c
SHA256c293655afa6cc9835dfa6c08b685c0c36251a04a07b8bffc7906efc9739b7b1d
SHA51242f6d6c007dede4d0415b8af8d73903b0b7936e4bd343b429c3aeaff20b758d2b1bb7c0fa12886ee778acdfd3f1f5f8e1ae0e078a138e2b4d442f0f60c80ff8d
-
Filesize
72KB
MD54acc8863121ac8a26970ab049a05be71
SHA1efa61d069d022930b3d67022224b5b310090727c
SHA256c293655afa6cc9835dfa6c08b685c0c36251a04a07b8bffc7906efc9739b7b1d
SHA51242f6d6c007dede4d0415b8af8d73903b0b7936e4bd343b429c3aeaff20b758d2b1bb7c0fa12886ee778acdfd3f1f5f8e1ae0e078a138e2b4d442f0f60c80ff8d
-
Filesize
72KB
MD537e0e2dd89de68901d4429186d4a3abd
SHA1ce87d3518233672e3161680b201fea5967db2241
SHA25600c0ca26cbf2d4d36cd651bb91da35db2b755e61c4bf29d4a3f9177007dd7553
SHA5121adce2253123b8a48cbd891d5b4af5c010a3234299f5c21b2460e79b174ccc7f73c9ecd153a38d86cb5438b38d7967c7abb1577be416114b6984141eabfbd067
-
Filesize
72KB
MD537e0e2dd89de68901d4429186d4a3abd
SHA1ce87d3518233672e3161680b201fea5967db2241
SHA25600c0ca26cbf2d4d36cd651bb91da35db2b755e61c4bf29d4a3f9177007dd7553
SHA5121adce2253123b8a48cbd891d5b4af5c010a3234299f5c21b2460e79b174ccc7f73c9ecd153a38d86cb5438b38d7967c7abb1577be416114b6984141eabfbd067