Analysis
-
max time kernel
158s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 12:29
Static task
static1
Behavioral task
behavioral1
Sample
964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe
Resource
win10v2004-20220901-en
General
-
Target
964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe
-
Size
72KB
-
MD5
0ce90a1e92ce68dcb85a237352f96288
-
SHA1
438f7bfaa624b4eea08c32c8cd31f08de471436e
-
SHA256
964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e
-
SHA512
d6870a8f0f8a3579d64e2d5f7cc3597dc4b8fe6bb2754d93db82ae160f074988969a56befbb31a70860ec506e0eb05b4ffed974ff0311cd00e44f7421b53cde4
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2q:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrm
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1708 backup.exe 908 backup.exe 1376 backup.exe 1204 backup.exe 1960 update.exe 1056 backup.exe 860 backup.exe 2044 data.exe 288 backup.exe 2032 backup.exe 1380 backup.exe 864 backup.exe 688 backup.exe 1456 backup.exe 592 backup.exe 1072 backup.exe 1580 backup.exe 800 backup.exe 912 backup.exe 1528 backup.exe 1944 backup.exe 1332 backup.exe 1112 backup.exe 832 backup.exe 1760 backup.exe 1764 data.exe 1780 backup.exe 2028 backup.exe 1048 backup.exe 1520 backup.exe 1736 backup.exe 1972 backup.exe 1280 backup.exe 2000 backup.exe 1436 update.exe 1504 System Restore.exe 1712 backup.exe 560 backup.exe 1536 backup.exe 1104 update.exe 1176 backup.exe 1116 backup.exe 1868 System Restore.exe 1556 backup.exe 1940 backup.exe 912 backup.exe 1416 backup.exe 1920 backup.exe 1132 backup.exe 1720 backup.exe 1800 backup.exe 860 backup.exe 1400 backup.exe 1212 backup.exe 1412 backup.exe 1256 backup.exe 1520 backup.exe 320 backup.exe 956 backup.exe 1076 backup.exe 580 backup.exe 764 backup.exe 1632 backup.exe 1332 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 1960 update.exe 1960 update.exe 288 backup.exe 288 backup.exe 288 backup.exe 288 backup.exe 288 backup.exe 2032 backup.exe 2032 backup.exe 2032 backup.exe 1960 update.exe 1960 update.exe 1380 backup.exe 1380 backup.exe 1380 backup.exe 1380 backup.exe 1380 backup.exe 864 backup.exe 864 backup.exe 864 backup.exe 864 backup.exe 864 backup.exe 688 backup.exe 688 backup.exe 688 backup.exe 1380 backup.exe 1380 backup.exe 1456 backup.exe 1456 backup.exe 1456 backup.exe 1456 backup.exe 1456 backup.exe 592 backup.exe 592 backup.exe 592 backup.exe 592 backup.exe 592 backup.exe 1072 backup.exe 1072 backup.exe 1072 backup.exe 592 backup.exe 592 backup.exe 1580 backup.exe 1580 backup.exe 1580 backup.exe 1580 backup.exe 1580 backup.exe 800 backup.exe 800 backup.exe 800 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe update.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe data.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\update.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe data.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe data.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe update.exe File opened for modification C:\Windows\addins\System Restore.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 63 IoCs
pid Process 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 1708 backup.exe 908 backup.exe 1376 backup.exe 1204 backup.exe 1056 backup.exe 860 backup.exe 2044 data.exe 1960 update.exe 288 backup.exe 2032 backup.exe 1380 backup.exe 864 backup.exe 688 backup.exe 1456 backup.exe 592 backup.exe 1072 backup.exe 1580 backup.exe 800 backup.exe 912 backup.exe 1528 backup.exe 1944 backup.exe 1332 backup.exe 1112 backup.exe 832 backup.exe 1760 backup.exe 1764 data.exe 1780 backup.exe 2028 backup.exe 1048 backup.exe 1520 backup.exe 1736 backup.exe 1972 backup.exe 1280 backup.exe 2000 backup.exe 560 backup.exe 1504 System Restore.exe 1712 backup.exe 1104 update.exe 1176 backup.exe 1116 backup.exe 1868 System Restore.exe 1556 backup.exe 1940 backup.exe 912 backup.exe 1720 backup.exe 1132 backup.exe 1800 backup.exe 1920 backup.exe 1212 backup.exe 320 backup.exe 1400 backup.exe 1520 backup.exe 1332 backup.exe 1416 backup.exe 1076 backup.exe 1412 backup.exe 956 backup.exe 1632 backup.exe 1972 backup.exe 304 backup.exe 972 backup.exe 1976 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 364 wrote to memory of 1708 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 26 PID 364 wrote to memory of 1708 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 26 PID 364 wrote to memory of 1708 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 26 PID 364 wrote to memory of 1708 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 26 PID 364 wrote to memory of 908 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 27 PID 364 wrote to memory of 908 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 27 PID 364 wrote to memory of 908 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 27 PID 364 wrote to memory of 908 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 27 PID 364 wrote to memory of 1376 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 29 PID 364 wrote to memory of 1376 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 29 PID 364 wrote to memory of 1376 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 29 PID 364 wrote to memory of 1376 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 29 PID 364 wrote to memory of 1204 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 30 PID 364 wrote to memory of 1204 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 30 PID 364 wrote to memory of 1204 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 30 PID 364 wrote to memory of 1204 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 30 PID 1708 wrote to memory of 1960 1708 backup.exe 28 PID 1708 wrote to memory of 1960 1708 backup.exe 28 PID 1708 wrote to memory of 1960 1708 backup.exe 28 PID 1708 wrote to memory of 1960 1708 backup.exe 28 PID 1708 wrote to memory of 1960 1708 backup.exe 28 PID 1708 wrote to memory of 1960 1708 backup.exe 28 PID 1708 wrote to memory of 1960 1708 backup.exe 28 PID 364 wrote to memory of 1056 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 31 PID 364 wrote to memory of 1056 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 31 PID 364 wrote to memory of 1056 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 31 PID 364 wrote to memory of 1056 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 31 PID 364 wrote to memory of 860 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 32 PID 364 wrote to memory of 860 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 32 PID 364 wrote to memory of 860 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 32 PID 364 wrote to memory of 860 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 32 PID 364 wrote to memory of 2044 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 33 PID 364 wrote to memory of 2044 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 33 PID 364 wrote to memory of 2044 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 33 PID 364 wrote to memory of 2044 364 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe 33 PID 1960 wrote to memory of 288 1960 update.exe 34 PID 1960 wrote to memory of 288 1960 update.exe 34 PID 1960 wrote to memory of 288 1960 update.exe 34 PID 1960 wrote to memory of 288 1960 update.exe 34 PID 1960 wrote to memory of 288 1960 update.exe 34 PID 1960 wrote to memory of 288 1960 update.exe 34 PID 1960 wrote to memory of 288 1960 update.exe 34 PID 288 wrote to memory of 2032 288 backup.exe 35 PID 288 wrote to memory of 2032 288 backup.exe 35 PID 288 wrote to memory of 2032 288 backup.exe 35 PID 288 wrote to memory of 2032 288 backup.exe 35 PID 288 wrote to memory of 2032 288 backup.exe 35 PID 288 wrote to memory of 2032 288 backup.exe 35 PID 288 wrote to memory of 2032 288 backup.exe 35 PID 1960 wrote to memory of 1380 1960 update.exe 36 PID 1960 wrote to memory of 1380 1960 update.exe 36 PID 1960 wrote to memory of 1380 1960 update.exe 36 PID 1960 wrote to memory of 1380 1960 update.exe 36 PID 1960 wrote to memory of 1380 1960 update.exe 36 PID 1960 wrote to memory of 1380 1960 update.exe 36 PID 1960 wrote to memory of 1380 1960 update.exe 36 PID 1380 wrote to memory of 864 1380 backup.exe 37 PID 1380 wrote to memory of 864 1380 backup.exe 37 PID 1380 wrote to memory of 864 1380 backup.exe 37 PID 1380 wrote to memory of 864 1380 backup.exe 37 PID 1380 wrote to memory of 864 1380 backup.exe 37 PID 1380 wrote to memory of 864 1380 backup.exe 37 PID 1380 wrote to memory of 864 1380 backup.exe 37 PID 864 wrote to memory of 688 864 backup.exe 38 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe"C:\Users\Admin\AppData\Local\Temp\964b65be6df45d596d8aaee3f474630eec72aaaecbc91ab3774c76d80333058e.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:364 -
C:\Users\Admin\AppData\Local\Temp\1628246561\backup.exeC:\Users\Admin\AppData\Local\Temp\1628246561\backup.exe C:\Users\Admin\AppData\Local\Temp\1628246561\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1708 -
C:\update.exe\update.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1960 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:288 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1380 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:864 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1456 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:592 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1072
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:800
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1112
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2028
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Executes dropped EXE
PID:1436
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:2004
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Suspicious use of SetWindowsHookEx
PID:972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:836
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:952
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1176
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1520
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1648
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:912 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:2012
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:996
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1736 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1920 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1644
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1964
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1552
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:2028
-
-
-
-
C:\Program Files\DVD Maker\data.exe"C:\Program Files\DVD Maker\data.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1280
-
-
C:\Program Files\DVD Maker\es-ES\System Restore.exe"C:\Program Files\DVD Maker\es-ES\System Restore.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1116
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1528
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1848
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1700
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:396
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1192
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1864
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1332 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:832 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1520
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1868
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1056
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1208
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:928
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1984
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
PID:860
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
PID:1536
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:1052
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:1292
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1524
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Executes dropped EXE
PID:764
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:1592
-
-
-
C:\Users\update.exeC:\Users\update.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1104 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
PID:1256
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Suspicious use of SetWindowsHookEx
PID:304
-
-
C:\Users\Admin\Documents\data.exeC:\Users\Admin\Documents\data.exe C:\Users\Admin\Documents\6⤵PID:1996
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1664
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1980
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1400 -
C:\Windows\addins\System Restore.exe"C:\Windows\addins\System Restore.exe" C:\Windows\addins\5⤵PID:1140
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\data.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\data.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d2eb62da9d8a88cb70d67d9ffd63ae92
SHA1b6a8c1832cb759b4a47760164fc37a9ee5ad6e72
SHA256396efc00534b9a439b9342e6462c2f0f647cedef7114a029f7797b122b12b4ae
SHA51211e34bbcabdc5adf1266c63ecf92a91965fa586093e198816b02029f000cf580a63040ed2839f7f89effb12847a7a284270e618f326b3bd1da11a082bfd22c36
-
Filesize
72KB
MD5d2eb62da9d8a88cb70d67d9ffd63ae92
SHA1b6a8c1832cb759b4a47760164fc37a9ee5ad6e72
SHA256396efc00534b9a439b9342e6462c2f0f647cedef7114a029f7797b122b12b4ae
SHA51211e34bbcabdc5adf1266c63ecf92a91965fa586093e198816b02029f000cf580a63040ed2839f7f89effb12847a7a284270e618f326b3bd1da11a082bfd22c36
-
Filesize
72KB
MD5fb6c0c53f4d07d785ae97a4f67b6d1b2
SHA14fc21a98572aa337f575b5fff1fb03807020b416
SHA256a66216dd0b432f98966188868fab13b614dd580b5c91ea4eb9d5821c560da661
SHA512a71b490f947c8ddbbae12fff22d12ebcb5ef4426fb6d3215ceb917bb3c0b364af76e217a98b6858b7bbf019437290cd03a7556b0a983d2122236037d5c68598c
-
Filesize
72KB
MD5fb6c0c53f4d07d785ae97a4f67b6d1b2
SHA14fc21a98572aa337f575b5fff1fb03807020b416
SHA256a66216dd0b432f98966188868fab13b614dd580b5c91ea4eb9d5821c560da661
SHA512a71b490f947c8ddbbae12fff22d12ebcb5ef4426fb6d3215ceb917bb3c0b364af76e217a98b6858b7bbf019437290cd03a7556b0a983d2122236037d5c68598c
-
Filesize
72KB
MD5109ad5c595630e3696161ed1b40ce314
SHA1e0ecfa45635dda553412462f578ef512cbd7de66
SHA256a0bcb0b1cee523fe322008739304fabf21cb2a5d0f845f4918a3c27cfc9cdce5
SHA512fb54288a5fd42eebdbca6b39470ed677242aae42ad9c1e3c55c94a5e5cb501be2913d4cf44e41daca98344c33b7348c2660975bcad66d2c0b802d2f984f55d6f
-
Filesize
72KB
MD5109ad5c595630e3696161ed1b40ce314
SHA1e0ecfa45635dda553412462f578ef512cbd7de66
SHA256a0bcb0b1cee523fe322008739304fabf21cb2a5d0f845f4918a3c27cfc9cdce5
SHA512fb54288a5fd42eebdbca6b39470ed677242aae42ad9c1e3c55c94a5e5cb501be2913d4cf44e41daca98344c33b7348c2660975bcad66d2c0b802d2f984f55d6f
-
Filesize
72KB
MD5d4714a3f5dc265a458259aa5ed24d248
SHA165712d0acfb0a592ced7b772c1b9e2636965acfa
SHA2562e04758326f945356203178efde22ce1a8334d9a28596c7862d136f3f3832faa
SHA5126a630ca29dcc1784ae5803e9deaaf38dd2f65e8b690dce514a75841aecf2236bb979c19ae3c86f2936bb242b5550e5435ec8f22319f13f07e70810694a8d4261
-
Filesize
72KB
MD5d4714a3f5dc265a458259aa5ed24d248
SHA165712d0acfb0a592ced7b772c1b9e2636965acfa
SHA2562e04758326f945356203178efde22ce1a8334d9a28596c7862d136f3f3832faa
SHA5126a630ca29dcc1784ae5803e9deaaf38dd2f65e8b690dce514a75841aecf2236bb979c19ae3c86f2936bb242b5550e5435ec8f22319f13f07e70810694a8d4261
-
Filesize
72KB
MD54b2913b2d21cd1e6d8421dfc95cc68a1
SHA10b9117958d3461b3b04a9eac5f7486162deb8ea9
SHA2569aa78fc24317d17c26211bb900178bc49eb3ea9716299dda1ac849bbc33793f9
SHA512f4805d865762d704a091cec7b4ba4f45a75034277c25b0e9b155795c94e52979528a24c5db593beb39ef216dfbf40ce31d6e0901e14320715ec276fa5207419a
-
Filesize
72KB
MD54b2913b2d21cd1e6d8421dfc95cc68a1
SHA10b9117958d3461b3b04a9eac5f7486162deb8ea9
SHA2569aa78fc24317d17c26211bb900178bc49eb3ea9716299dda1ac849bbc33793f9
SHA512f4805d865762d704a091cec7b4ba4f45a75034277c25b0e9b155795c94e52979528a24c5db593beb39ef216dfbf40ce31d6e0901e14320715ec276fa5207419a
-
Filesize
72KB
MD55702dfaa36289a37063d0017943ac921
SHA1676bd6cdce6e5e0935546e9e2f1a56efea6d9d18
SHA256ca0bc5e0ea47079c4542880f5eb67d95a09576a2221cbaee76d82c13a03d153a
SHA512809272ec627555cf55c94a9d0f3415be249480d70b77c6bdda107adc5391a201ce90d60389c6b278e41ca0bb0f6dcd771476ae4c5e4969418c1cf8b38cfd3b57
-
Filesize
72KB
MD55702dfaa36289a37063d0017943ac921
SHA1676bd6cdce6e5e0935546e9e2f1a56efea6d9d18
SHA256ca0bc5e0ea47079c4542880f5eb67d95a09576a2221cbaee76d82c13a03d153a
SHA512809272ec627555cf55c94a9d0f3415be249480d70b77c6bdda107adc5391a201ce90d60389c6b278e41ca0bb0f6dcd771476ae4c5e4969418c1cf8b38cfd3b57
-
Filesize
72KB
MD583fec9c419870a0963d254794eb460f3
SHA110e819ad66c314e497e616a18619d5bcc16e9acb
SHA25685fa5c5a40e595c18ab41312a6ff83130d759447dbaf844d37b76da2af063e9c
SHA512b1099e86cb3fea17f914553922ec0c4fb38303f5999a0ee5289f8ed0c5444c4b4aa56397e369f60f56b6bea1b2435e797798a9a84b62eacd42ff2643c614c456
-
Filesize
72KB
MD583fec9c419870a0963d254794eb460f3
SHA110e819ad66c314e497e616a18619d5bcc16e9acb
SHA25685fa5c5a40e595c18ab41312a6ff83130d759447dbaf844d37b76da2af063e9c
SHA512b1099e86cb3fea17f914553922ec0c4fb38303f5999a0ee5289f8ed0c5444c4b4aa56397e369f60f56b6bea1b2435e797798a9a84b62eacd42ff2643c614c456
-
Filesize
72KB
MD52909bceaeb28ce85b71537b3cde080d3
SHA1d136215af32487601402dab52dc420bdb64042ff
SHA256629424a1a9073efda13877958dfdb9b4f9857ff233fe10cf87dd1849d4728c94
SHA51247158ee129d50184d0759b3e7c2b5f299fdfb8ab325d1a1d66e16835d96390a19066a4af079311d737a100a8e27120cb67b7451a0572d8b0f76816650bef9730
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5656457661e5458306220ef890c5e63e1
SHA1f44dc70360a0413b0297864cf9749efe6bd5d937
SHA2562b6fc1759d25fb14fe9d2547fbd4a2857880231739d474ef3b1830d22ddf8d6c
SHA5128e52099500cc53b22eb6cd35f88645d519a4b4072206aab36614c59b97656fbd2c702a14aaa0fb4053d03cf5ce3b6fb3aeab3094d2a958f726ffcb82c70b85fd
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cb981e0f813b447f43a9b2f04c238ddd
SHA1f751bc5d689e8e417894fa7f4da55606fa1ccc30
SHA256aba842fcbef0be76718c9ea073f1cc8dad357c107530d60499c32bdff3185f58
SHA512719dcef49cd9fb363bec269f07457e4630efe07a72365eb5eaa980054afaa4c00db11dbeeac878078324cdf6c1c0b12b8f40b2c1f5e400abd30c3025df407071
-
Filesize
72KB
MD578b27d6dd4f342814e80a5462dda0db9
SHA1bf88cf9aa7156749dc7746757a1de3c2888d74cc
SHA256f2e02b2cf7180660f852a69ee9f887bc281dc9b9fcd9b2c02d31a3f0c520524d
SHA512a9e4f00cf959e7850174d8c528c31a8b33131549d528d22bd775e9b4232acece1a0ae4e140c58103d3f5111027084f9caf8c6fe14d66a032a210e8f48081bcab
-
Filesize
72KB
MD5e858f7d3a6e1ce1191eb7332051b65ca
SHA1d31e9f8098fc3d362cd0e1d1e086fb04689ce5a0
SHA256a551367bd7faae9dd47fd5f9da95c005c6864ec497f305243bd7bc54e1e8700e
SHA512ae99922f1f4d0cacf96338ee809782a2b6571c99c847c75df07a31c8a8794e77171f89ef57fc038747a2c31b372cd95deb5545f01df1ea62883667eecd6b0716
-
Filesize
72KB
MD578b27d6dd4f342814e80a5462dda0db9
SHA1bf88cf9aa7156749dc7746757a1de3c2888d74cc
SHA256f2e02b2cf7180660f852a69ee9f887bc281dc9b9fcd9b2c02d31a3f0c520524d
SHA512a9e4f00cf959e7850174d8c528c31a8b33131549d528d22bd775e9b4232acece1a0ae4e140c58103d3f5111027084f9caf8c6fe14d66a032a210e8f48081bcab
-
Filesize
72KB
MD5d08c61833c866576833397b3eeefde85
SHA199dfe1bc1d750db316dbf76217be9247878c0843
SHA25631ed68b57b19216886557f4ecf6c78e6f58b7dbd201374a3dda40b07781f71da
SHA51224f81ce50df0deb8bb510c2ce75b9c4567a1c0e8666f51e3d82ad7a1be8fb9d2a160a44af5c2f5f749540e6e960e62d3b014f837819d5bafe655f9827fd9090f
-
Filesize
72KB
MD5d08c61833c866576833397b3eeefde85
SHA199dfe1bc1d750db316dbf76217be9247878c0843
SHA25631ed68b57b19216886557f4ecf6c78e6f58b7dbd201374a3dda40b07781f71da
SHA51224f81ce50df0deb8bb510c2ce75b9c4567a1c0e8666f51e3d82ad7a1be8fb9d2a160a44af5c2f5f749540e6e960e62d3b014f837819d5bafe655f9827fd9090f
-
Filesize
72KB
MD5d2eb62da9d8a88cb70d67d9ffd63ae92
SHA1b6a8c1832cb759b4a47760164fc37a9ee5ad6e72
SHA256396efc00534b9a439b9342e6462c2f0f647cedef7114a029f7797b122b12b4ae
SHA51211e34bbcabdc5adf1266c63ecf92a91965fa586093e198816b02029f000cf580a63040ed2839f7f89effb12847a7a284270e618f326b3bd1da11a082bfd22c36
-
Filesize
72KB
MD5d2eb62da9d8a88cb70d67d9ffd63ae92
SHA1b6a8c1832cb759b4a47760164fc37a9ee5ad6e72
SHA256396efc00534b9a439b9342e6462c2f0f647cedef7114a029f7797b122b12b4ae
SHA51211e34bbcabdc5adf1266c63ecf92a91965fa586093e198816b02029f000cf580a63040ed2839f7f89effb12847a7a284270e618f326b3bd1da11a082bfd22c36
-
Filesize
72KB
MD5d2eb62da9d8a88cb70d67d9ffd63ae92
SHA1b6a8c1832cb759b4a47760164fc37a9ee5ad6e72
SHA256396efc00534b9a439b9342e6462c2f0f647cedef7114a029f7797b122b12b4ae
SHA51211e34bbcabdc5adf1266c63ecf92a91965fa586093e198816b02029f000cf580a63040ed2839f7f89effb12847a7a284270e618f326b3bd1da11a082bfd22c36
-
Filesize
72KB
MD5d2eb62da9d8a88cb70d67d9ffd63ae92
SHA1b6a8c1832cb759b4a47760164fc37a9ee5ad6e72
SHA256396efc00534b9a439b9342e6462c2f0f647cedef7114a029f7797b122b12b4ae
SHA51211e34bbcabdc5adf1266c63ecf92a91965fa586093e198816b02029f000cf580a63040ed2839f7f89effb12847a7a284270e618f326b3bd1da11a082bfd22c36
-
Filesize
72KB
MD5d2eb62da9d8a88cb70d67d9ffd63ae92
SHA1b6a8c1832cb759b4a47760164fc37a9ee5ad6e72
SHA256396efc00534b9a439b9342e6462c2f0f647cedef7114a029f7797b122b12b4ae
SHA51211e34bbcabdc5adf1266c63ecf92a91965fa586093e198816b02029f000cf580a63040ed2839f7f89effb12847a7a284270e618f326b3bd1da11a082bfd22c36
-
Filesize
72KB
MD5fb6c0c53f4d07d785ae97a4f67b6d1b2
SHA14fc21a98572aa337f575b5fff1fb03807020b416
SHA256a66216dd0b432f98966188868fab13b614dd580b5c91ea4eb9d5821c560da661
SHA512a71b490f947c8ddbbae12fff22d12ebcb5ef4426fb6d3215ceb917bb3c0b364af76e217a98b6858b7bbf019437290cd03a7556b0a983d2122236037d5c68598c
-
Filesize
72KB
MD5fb6c0c53f4d07d785ae97a4f67b6d1b2
SHA14fc21a98572aa337f575b5fff1fb03807020b416
SHA256a66216dd0b432f98966188868fab13b614dd580b5c91ea4eb9d5821c560da661
SHA512a71b490f947c8ddbbae12fff22d12ebcb5ef4426fb6d3215ceb917bb3c0b364af76e217a98b6858b7bbf019437290cd03a7556b0a983d2122236037d5c68598c
-
Filesize
72KB
MD5fb6c0c53f4d07d785ae97a4f67b6d1b2
SHA14fc21a98572aa337f575b5fff1fb03807020b416
SHA256a66216dd0b432f98966188868fab13b614dd580b5c91ea4eb9d5821c560da661
SHA512a71b490f947c8ddbbae12fff22d12ebcb5ef4426fb6d3215ceb917bb3c0b364af76e217a98b6858b7bbf019437290cd03a7556b0a983d2122236037d5c68598c
-
Filesize
72KB
MD5fb6c0c53f4d07d785ae97a4f67b6d1b2
SHA14fc21a98572aa337f575b5fff1fb03807020b416
SHA256a66216dd0b432f98966188868fab13b614dd580b5c91ea4eb9d5821c560da661
SHA512a71b490f947c8ddbbae12fff22d12ebcb5ef4426fb6d3215ceb917bb3c0b364af76e217a98b6858b7bbf019437290cd03a7556b0a983d2122236037d5c68598c
-
Filesize
72KB
MD5fb6c0c53f4d07d785ae97a4f67b6d1b2
SHA14fc21a98572aa337f575b5fff1fb03807020b416
SHA256a66216dd0b432f98966188868fab13b614dd580b5c91ea4eb9d5821c560da661
SHA512a71b490f947c8ddbbae12fff22d12ebcb5ef4426fb6d3215ceb917bb3c0b364af76e217a98b6858b7bbf019437290cd03a7556b0a983d2122236037d5c68598c
-
Filesize
72KB
MD5109ad5c595630e3696161ed1b40ce314
SHA1e0ecfa45635dda553412462f578ef512cbd7de66
SHA256a0bcb0b1cee523fe322008739304fabf21cb2a5d0f845f4918a3c27cfc9cdce5
SHA512fb54288a5fd42eebdbca6b39470ed677242aae42ad9c1e3c55c94a5e5cb501be2913d4cf44e41daca98344c33b7348c2660975bcad66d2c0b802d2f984f55d6f
-
Filesize
72KB
MD5109ad5c595630e3696161ed1b40ce314
SHA1e0ecfa45635dda553412462f578ef512cbd7de66
SHA256a0bcb0b1cee523fe322008739304fabf21cb2a5d0f845f4918a3c27cfc9cdce5
SHA512fb54288a5fd42eebdbca6b39470ed677242aae42ad9c1e3c55c94a5e5cb501be2913d4cf44e41daca98344c33b7348c2660975bcad66d2c0b802d2f984f55d6f
-
Filesize
72KB
MD5109ad5c595630e3696161ed1b40ce314
SHA1e0ecfa45635dda553412462f578ef512cbd7de66
SHA256a0bcb0b1cee523fe322008739304fabf21cb2a5d0f845f4918a3c27cfc9cdce5
SHA512fb54288a5fd42eebdbca6b39470ed677242aae42ad9c1e3c55c94a5e5cb501be2913d4cf44e41daca98344c33b7348c2660975bcad66d2c0b802d2f984f55d6f
-
Filesize
72KB
MD5109ad5c595630e3696161ed1b40ce314
SHA1e0ecfa45635dda553412462f578ef512cbd7de66
SHA256a0bcb0b1cee523fe322008739304fabf21cb2a5d0f845f4918a3c27cfc9cdce5
SHA512fb54288a5fd42eebdbca6b39470ed677242aae42ad9c1e3c55c94a5e5cb501be2913d4cf44e41daca98344c33b7348c2660975bcad66d2c0b802d2f984f55d6f
-
Filesize
72KB
MD5109ad5c595630e3696161ed1b40ce314
SHA1e0ecfa45635dda553412462f578ef512cbd7de66
SHA256a0bcb0b1cee523fe322008739304fabf21cb2a5d0f845f4918a3c27cfc9cdce5
SHA512fb54288a5fd42eebdbca6b39470ed677242aae42ad9c1e3c55c94a5e5cb501be2913d4cf44e41daca98344c33b7348c2660975bcad66d2c0b802d2f984f55d6f
-
Filesize
72KB
MD5d4714a3f5dc265a458259aa5ed24d248
SHA165712d0acfb0a592ced7b772c1b9e2636965acfa
SHA2562e04758326f945356203178efde22ce1a8334d9a28596c7862d136f3f3832faa
SHA5126a630ca29dcc1784ae5803e9deaaf38dd2f65e8b690dce514a75841aecf2236bb979c19ae3c86f2936bb242b5550e5435ec8f22319f13f07e70810694a8d4261
-
Filesize
72KB
MD5d4714a3f5dc265a458259aa5ed24d248
SHA165712d0acfb0a592ced7b772c1b9e2636965acfa
SHA2562e04758326f945356203178efde22ce1a8334d9a28596c7862d136f3f3832faa
SHA5126a630ca29dcc1784ae5803e9deaaf38dd2f65e8b690dce514a75841aecf2236bb979c19ae3c86f2936bb242b5550e5435ec8f22319f13f07e70810694a8d4261
-
Filesize
72KB
MD5d4714a3f5dc265a458259aa5ed24d248
SHA165712d0acfb0a592ced7b772c1b9e2636965acfa
SHA2562e04758326f945356203178efde22ce1a8334d9a28596c7862d136f3f3832faa
SHA5126a630ca29dcc1784ae5803e9deaaf38dd2f65e8b690dce514a75841aecf2236bb979c19ae3c86f2936bb242b5550e5435ec8f22319f13f07e70810694a8d4261
-
Filesize
72KB
MD5d4714a3f5dc265a458259aa5ed24d248
SHA165712d0acfb0a592ced7b772c1b9e2636965acfa
SHA2562e04758326f945356203178efde22ce1a8334d9a28596c7862d136f3f3832faa
SHA5126a630ca29dcc1784ae5803e9deaaf38dd2f65e8b690dce514a75841aecf2236bb979c19ae3c86f2936bb242b5550e5435ec8f22319f13f07e70810694a8d4261
-
Filesize
72KB
MD5d4714a3f5dc265a458259aa5ed24d248
SHA165712d0acfb0a592ced7b772c1b9e2636965acfa
SHA2562e04758326f945356203178efde22ce1a8334d9a28596c7862d136f3f3832faa
SHA5126a630ca29dcc1784ae5803e9deaaf38dd2f65e8b690dce514a75841aecf2236bb979c19ae3c86f2936bb242b5550e5435ec8f22319f13f07e70810694a8d4261
-
Filesize
72KB
MD54b2913b2d21cd1e6d8421dfc95cc68a1
SHA10b9117958d3461b3b04a9eac5f7486162deb8ea9
SHA2569aa78fc24317d17c26211bb900178bc49eb3ea9716299dda1ac849bbc33793f9
SHA512f4805d865762d704a091cec7b4ba4f45a75034277c25b0e9b155795c94e52979528a24c5db593beb39ef216dfbf40ce31d6e0901e14320715ec276fa5207419a
-
Filesize
72KB
MD54b2913b2d21cd1e6d8421dfc95cc68a1
SHA10b9117958d3461b3b04a9eac5f7486162deb8ea9
SHA2569aa78fc24317d17c26211bb900178bc49eb3ea9716299dda1ac849bbc33793f9
SHA512f4805d865762d704a091cec7b4ba4f45a75034277c25b0e9b155795c94e52979528a24c5db593beb39ef216dfbf40ce31d6e0901e14320715ec276fa5207419a
-
Filesize
72KB
MD54b2913b2d21cd1e6d8421dfc95cc68a1
SHA10b9117958d3461b3b04a9eac5f7486162deb8ea9
SHA2569aa78fc24317d17c26211bb900178bc49eb3ea9716299dda1ac849bbc33793f9
SHA512f4805d865762d704a091cec7b4ba4f45a75034277c25b0e9b155795c94e52979528a24c5db593beb39ef216dfbf40ce31d6e0901e14320715ec276fa5207419a
-
Filesize
72KB
MD55702dfaa36289a37063d0017943ac921
SHA1676bd6cdce6e5e0935546e9e2f1a56efea6d9d18
SHA256ca0bc5e0ea47079c4542880f5eb67d95a09576a2221cbaee76d82c13a03d153a
SHA512809272ec627555cf55c94a9d0f3415be249480d70b77c6bdda107adc5391a201ce90d60389c6b278e41ca0bb0f6dcd771476ae4c5e4969418c1cf8b38cfd3b57
-
Filesize
72KB
MD55702dfaa36289a37063d0017943ac921
SHA1676bd6cdce6e5e0935546e9e2f1a56efea6d9d18
SHA256ca0bc5e0ea47079c4542880f5eb67d95a09576a2221cbaee76d82c13a03d153a
SHA512809272ec627555cf55c94a9d0f3415be249480d70b77c6bdda107adc5391a201ce90d60389c6b278e41ca0bb0f6dcd771476ae4c5e4969418c1cf8b38cfd3b57
-
Filesize
72KB
MD55702dfaa36289a37063d0017943ac921
SHA1676bd6cdce6e5e0935546e9e2f1a56efea6d9d18
SHA256ca0bc5e0ea47079c4542880f5eb67d95a09576a2221cbaee76d82c13a03d153a
SHA512809272ec627555cf55c94a9d0f3415be249480d70b77c6bdda107adc5391a201ce90d60389c6b278e41ca0bb0f6dcd771476ae4c5e4969418c1cf8b38cfd3b57
-
Filesize
72KB
MD55702dfaa36289a37063d0017943ac921
SHA1676bd6cdce6e5e0935546e9e2f1a56efea6d9d18
SHA256ca0bc5e0ea47079c4542880f5eb67d95a09576a2221cbaee76d82c13a03d153a
SHA512809272ec627555cf55c94a9d0f3415be249480d70b77c6bdda107adc5391a201ce90d60389c6b278e41ca0bb0f6dcd771476ae4c5e4969418c1cf8b38cfd3b57
-
Filesize
72KB
MD55702dfaa36289a37063d0017943ac921
SHA1676bd6cdce6e5e0935546e9e2f1a56efea6d9d18
SHA256ca0bc5e0ea47079c4542880f5eb67d95a09576a2221cbaee76d82c13a03d153a
SHA512809272ec627555cf55c94a9d0f3415be249480d70b77c6bdda107adc5391a201ce90d60389c6b278e41ca0bb0f6dcd771476ae4c5e4969418c1cf8b38cfd3b57
-
Filesize
72KB
MD583fec9c419870a0963d254794eb460f3
SHA110e819ad66c314e497e616a18619d5bcc16e9acb
SHA25685fa5c5a40e595c18ab41312a6ff83130d759447dbaf844d37b76da2af063e9c
SHA512b1099e86cb3fea17f914553922ec0c4fb38303f5999a0ee5289f8ed0c5444c4b4aa56397e369f60f56b6bea1b2435e797798a9a84b62eacd42ff2643c614c456
-
Filesize
72KB
MD583fec9c419870a0963d254794eb460f3
SHA110e819ad66c314e497e616a18619d5bcc16e9acb
SHA25685fa5c5a40e595c18ab41312a6ff83130d759447dbaf844d37b76da2af063e9c
SHA512b1099e86cb3fea17f914553922ec0c4fb38303f5999a0ee5289f8ed0c5444c4b4aa56397e369f60f56b6bea1b2435e797798a9a84b62eacd42ff2643c614c456
-
Filesize
72KB
MD52909bceaeb28ce85b71537b3cde080d3
SHA1d136215af32487601402dab52dc420bdb64042ff
SHA256629424a1a9073efda13877958dfdb9b4f9857ff233fe10cf87dd1849d4728c94
SHA51247158ee129d50184d0759b3e7c2b5f299fdfb8ab325d1a1d66e16835d96390a19066a4af079311d737a100a8e27120cb67b7451a0572d8b0f76816650bef9730
-
Filesize
72KB
MD52909bceaeb28ce85b71537b3cde080d3
SHA1d136215af32487601402dab52dc420bdb64042ff
SHA256629424a1a9073efda13877958dfdb9b4f9857ff233fe10cf87dd1849d4728c94
SHA51247158ee129d50184d0759b3e7c2b5f299fdfb8ab325d1a1d66e16835d96390a19066a4af079311d737a100a8e27120cb67b7451a0572d8b0f76816650bef9730
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5656457661e5458306220ef890c5e63e1
SHA1f44dc70360a0413b0297864cf9749efe6bd5d937
SHA2562b6fc1759d25fb14fe9d2547fbd4a2857880231739d474ef3b1830d22ddf8d6c
SHA5128e52099500cc53b22eb6cd35f88645d519a4b4072206aab36614c59b97656fbd2c702a14aaa0fb4053d03cf5ce3b6fb3aeab3094d2a958f726ffcb82c70b85fd
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5656457661e5458306220ef890c5e63e1
SHA1f44dc70360a0413b0297864cf9749efe6bd5d937
SHA2562b6fc1759d25fb14fe9d2547fbd4a2857880231739d474ef3b1830d22ddf8d6c
SHA5128e52099500cc53b22eb6cd35f88645d519a4b4072206aab36614c59b97656fbd2c702a14aaa0fb4053d03cf5ce3b6fb3aeab3094d2a958f726ffcb82c70b85fd
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cb981e0f813b447f43a9b2f04c238ddd
SHA1f751bc5d689e8e417894fa7f4da55606fa1ccc30
SHA256aba842fcbef0be76718c9ea073f1cc8dad357c107530d60499c32bdff3185f58
SHA512719dcef49cd9fb363bec269f07457e4630efe07a72365eb5eaa980054afaa4c00db11dbeeac878078324cdf6c1c0b12b8f40b2c1f5e400abd30c3025df407071
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cb981e0f813b447f43a9b2f04c238ddd
SHA1f751bc5d689e8e417894fa7f4da55606fa1ccc30
SHA256aba842fcbef0be76718c9ea073f1cc8dad357c107530d60499c32bdff3185f58
SHA512719dcef49cd9fb363bec269f07457e4630efe07a72365eb5eaa980054afaa4c00db11dbeeac878078324cdf6c1c0b12b8f40b2c1f5e400abd30c3025df407071
-
Filesize
72KB
MD578b27d6dd4f342814e80a5462dda0db9
SHA1bf88cf9aa7156749dc7746757a1de3c2888d74cc
SHA256f2e02b2cf7180660f852a69ee9f887bc281dc9b9fcd9b2c02d31a3f0c520524d
SHA512a9e4f00cf959e7850174d8c528c31a8b33131549d528d22bd775e9b4232acece1a0ae4e140c58103d3f5111027084f9caf8c6fe14d66a032a210e8f48081bcab
-
Filesize
72KB
MD578b27d6dd4f342814e80a5462dda0db9
SHA1bf88cf9aa7156749dc7746757a1de3c2888d74cc
SHA256f2e02b2cf7180660f852a69ee9f887bc281dc9b9fcd9b2c02d31a3f0c520524d
SHA512a9e4f00cf959e7850174d8c528c31a8b33131549d528d22bd775e9b4232acece1a0ae4e140c58103d3f5111027084f9caf8c6fe14d66a032a210e8f48081bcab
-
Filesize
72KB
MD5e858f7d3a6e1ce1191eb7332051b65ca
SHA1d31e9f8098fc3d362cd0e1d1e086fb04689ce5a0
SHA256a551367bd7faae9dd47fd5f9da95c005c6864ec497f305243bd7bc54e1e8700e
SHA512ae99922f1f4d0cacf96338ee809782a2b6571c99c847c75df07a31c8a8794e77171f89ef57fc038747a2c31b372cd95deb5545f01df1ea62883667eecd6b0716
-
Filesize
72KB
MD5e858f7d3a6e1ce1191eb7332051b65ca
SHA1d31e9f8098fc3d362cd0e1d1e086fb04689ce5a0
SHA256a551367bd7faae9dd47fd5f9da95c005c6864ec497f305243bd7bc54e1e8700e
SHA512ae99922f1f4d0cacf96338ee809782a2b6571c99c847c75df07a31c8a8794e77171f89ef57fc038747a2c31b372cd95deb5545f01df1ea62883667eecd6b0716
-
Filesize
72KB
MD578b27d6dd4f342814e80a5462dda0db9
SHA1bf88cf9aa7156749dc7746757a1de3c2888d74cc
SHA256f2e02b2cf7180660f852a69ee9f887bc281dc9b9fcd9b2c02d31a3f0c520524d
SHA512a9e4f00cf959e7850174d8c528c31a8b33131549d528d22bd775e9b4232acece1a0ae4e140c58103d3f5111027084f9caf8c6fe14d66a032a210e8f48081bcab
-
Filesize
72KB
MD578b27d6dd4f342814e80a5462dda0db9
SHA1bf88cf9aa7156749dc7746757a1de3c2888d74cc
SHA256f2e02b2cf7180660f852a69ee9f887bc281dc9b9fcd9b2c02d31a3f0c520524d
SHA512a9e4f00cf959e7850174d8c528c31a8b33131549d528d22bd775e9b4232acece1a0ae4e140c58103d3f5111027084f9caf8c6fe14d66a032a210e8f48081bcab