Analysis
-
max time kernel
90s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe
Resource
win10v2004-20220812-en
General
-
Target
5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe
-
Size
72KB
-
MD5
0861aa0640176d7118fd72d946c5a8c4
-
SHA1
5d7913b5b1d9c600e3db78baad351ab3b78691c6
-
SHA256
5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8
-
SHA512
49c5b04c758294362e4fe5338dd1e298cb8d259f0e60f24da79545735980e6cfa86ab3c70b0d309737b873884191c5ee367ab8aea31ca1c0f01e600835820b2d
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2Z:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr1
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe -
Executes dropped EXE 54 IoCs
pid Process 892 update.exe 1712 backup.exe 1996 backup.exe 1936 backup.exe 2016 backup.exe 516 backup.exe 1812 backup.exe 1696 backup.exe 1028 backup.exe 460 backup.exe 1096 backup.exe 1056 backup.exe 1544 backup.exe 1624 backup.exe 2012 backup.exe 944 backup.exe 1984 backup.exe 1940 data.exe 1020 update.exe 1876 backup.exe 888 backup.exe 516 backup.exe 1480 backup.exe 1116 backup.exe 788 backup.exe 1792 backup.exe 1908 backup.exe 580 backup.exe 1208 update.exe 964 backup.exe 1184 backup.exe 1540 backup.exe 1916 backup.exe 2024 backup.exe 1452 backup.exe 1676 backup.exe 740 backup.exe 1260 backup.exe 2000 data.exe 1416 backup.exe 944 data.exe 1828 backup.exe 1876 backup.exe 2016 update.exe 564 backup.exe 1936 backup.exe 888 backup.exe 2036 backup.exe 1592 backup.exe 516 backup.exe 828 backup.exe 1444 backup.exe 1208 backup.exe 1108 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 892 update.exe 892 update.exe 892 update.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 1696 backup.exe 1696 backup.exe 1028 backup.exe 1028 backup.exe 1028 backup.exe 1696 backup.exe 1696 backup.exe 460 backup.exe 460 backup.exe 460 backup.exe 1028 backup.exe 1028 backup.exe 1096 backup.exe 1096 backup.exe 1096 backup.exe 460 backup.exe 460 backup.exe 1056 backup.exe 1056 backup.exe 1056 backup.exe 1056 backup.exe 1056 backup.exe 1544 backup.exe 1544 backup.exe 1544 backup.exe 460 backup.exe 460 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 2012 backup.exe 2012 backup.exe 2012 backup.exe 2012 backup.exe 2012 backup.exe 944 backup.exe 944 backup.exe 944 backup.exe 2012 backup.exe 2012 backup.exe 1984 backup.exe 1984 backup.exe 1984 backup.exe 1984 backup.exe 1984 backup.exe 1940 data.exe -
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\update.exe update.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 892 update.exe 1712 backup.exe 1996 backup.exe 1936 backup.exe 2016 backup.exe 516 backup.exe 1812 backup.exe 1696 backup.exe 1028 backup.exe 460 backup.exe 1096 backup.exe 1056 backup.exe 1544 backup.exe 1624 backup.exe 2012 backup.exe 944 backup.exe 1984 backup.exe 1940 data.exe 1020 update.exe 1876 backup.exe 888 backup.exe 516 backup.exe 1480 backup.exe 1116 backup.exe 788 backup.exe 1792 backup.exe 1908 backup.exe 580 backup.exe 1208 update.exe 964 backup.exe 1184 backup.exe 1540 backup.exe 1916 backup.exe 2024 backup.exe 1452 backup.exe 1676 backup.exe 740 backup.exe 2000 data.exe 1260 backup.exe 1416 backup.exe 944 data.exe 2016 update.exe 564 backup.exe 2036 backup.exe 1592 backup.exe 1936 backup.exe 888 backup.exe 516 backup.exe 1444 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 960 wrote to memory of 892 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 28 PID 960 wrote to memory of 892 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 28 PID 960 wrote to memory of 892 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 28 PID 960 wrote to memory of 892 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 28 PID 960 wrote to memory of 892 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 28 PID 960 wrote to memory of 892 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 28 PID 960 wrote to memory of 892 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 28 PID 960 wrote to memory of 1712 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 29 PID 960 wrote to memory of 1712 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 29 PID 960 wrote to memory of 1712 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 29 PID 960 wrote to memory of 1712 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 29 PID 960 wrote to memory of 1996 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 30 PID 960 wrote to memory of 1996 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 30 PID 960 wrote to memory of 1996 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 30 PID 960 wrote to memory of 1996 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 30 PID 960 wrote to memory of 1936 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 31 PID 960 wrote to memory of 1936 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 31 PID 960 wrote to memory of 1936 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 31 PID 960 wrote to memory of 1936 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 31 PID 960 wrote to memory of 2016 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 32 PID 960 wrote to memory of 2016 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 32 PID 960 wrote to memory of 2016 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 32 PID 960 wrote to memory of 2016 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 32 PID 960 wrote to memory of 516 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 33 PID 960 wrote to memory of 516 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 33 PID 960 wrote to memory of 516 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 33 PID 960 wrote to memory of 516 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 33 PID 960 wrote to memory of 1812 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 34 PID 960 wrote to memory of 1812 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 34 PID 960 wrote to memory of 1812 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 34 PID 960 wrote to memory of 1812 960 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe 34 PID 892 wrote to memory of 1696 892 update.exe 35 PID 892 wrote to memory of 1696 892 update.exe 35 PID 892 wrote to memory of 1696 892 update.exe 35 PID 892 wrote to memory of 1696 892 update.exe 35 PID 892 wrote to memory of 1696 892 update.exe 35 PID 892 wrote to memory of 1696 892 update.exe 35 PID 892 wrote to memory of 1696 892 update.exe 35 PID 1696 wrote to memory of 1028 1696 backup.exe 36 PID 1696 wrote to memory of 1028 1696 backup.exe 36 PID 1696 wrote to memory of 1028 1696 backup.exe 36 PID 1696 wrote to memory of 1028 1696 backup.exe 36 PID 1696 wrote to memory of 1028 1696 backup.exe 36 PID 1696 wrote to memory of 1028 1696 backup.exe 36 PID 1696 wrote to memory of 1028 1696 backup.exe 36 PID 1696 wrote to memory of 460 1696 backup.exe 37 PID 1696 wrote to memory of 460 1696 backup.exe 37 PID 1696 wrote to memory of 460 1696 backup.exe 37 PID 1696 wrote to memory of 460 1696 backup.exe 37 PID 1696 wrote to memory of 460 1696 backup.exe 37 PID 1696 wrote to memory of 460 1696 backup.exe 37 PID 1696 wrote to memory of 460 1696 backup.exe 37 PID 1028 wrote to memory of 1096 1028 backup.exe 38 PID 1028 wrote to memory of 1096 1028 backup.exe 38 PID 1028 wrote to memory of 1096 1028 backup.exe 38 PID 1028 wrote to memory of 1096 1028 backup.exe 38 PID 1028 wrote to memory of 1096 1028 backup.exe 38 PID 1028 wrote to memory of 1096 1028 backup.exe 38 PID 1028 wrote to memory of 1096 1028 backup.exe 38 PID 460 wrote to memory of 1056 460 backup.exe 39 PID 460 wrote to memory of 1056 460 backup.exe 39 PID 460 wrote to memory of 1056 460 backup.exe 39 PID 460 wrote to memory of 1056 460 backup.exe 39 PID 460 wrote to memory of 1056 460 backup.exe 39 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe"C:\Users\Admin\AppData\Local\Temp\5f22fc800fd35963b53656d0f63ca1f2572fd282684aefa747681bae0dc043a8.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:960 -
C:\Users\Admin\AppData\Local\Temp\2802723565\update.exeC:\Users\Admin\AppData\Local\Temp\2802723565\update.exe C:\Users\Admin\AppData\Local\Temp\2802723565\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:892 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1696 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1028 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1096
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:460 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2012 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:888
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:516
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1116
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1792
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1208
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1916
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1260 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:1944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵PID:1148
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:516
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1448
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Executes dropped EXE
PID:1876 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:2020
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1396
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888
-
-
C:\Program Files\Common Files\SpeechEngines\data.exe"C:\Program Files\Common Files\SpeechEngines\data.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:560
-
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵PID:1816
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:1416
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
PID:1208
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵PID:1992
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1872
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1488
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:1372
-
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1096
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:768
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1980
-
-
-
C:\Program Files (x86)\update.exe"C:\Program Files (x86)\update.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1020 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1480 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:788 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1184
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:564 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Executes dropped EXE
PID:828
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1524
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1544
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:1104
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵PID:1756
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1700
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:324
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:1896
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1712
-
-
-
-
C:\Program Files (x86)\Common Files\update.exe"C:\Program Files (x86)\Common Files\update.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:1528
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵PID:1864
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:1908
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1604
-
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\7⤵PID:1296
-
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1564
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1928
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:840
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:752
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
PID:1828
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1460
-
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:924
-
-
C:\Windows\AppCompat\data.exeC:\Windows\AppCompat\data.exe C:\Windows\AppCompat\5⤵PID:1944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5bd82e4237ed59f49c49f0db3776a6253
SHA158c70e814a4717fbe5966e36ddcd9fa3da63324f
SHA2560166f9af78ecdb6176e039b1e0b77cb8cc5aa437b2bdd0eaffb69a3eb583e3f7
SHA512b800601f054f8823c6affaf25c7b0e4b6702384f74220b7d2c41a9ea2e5508aab6576f4d53b3ea9692022c3393291397f4260e0da0973db51b2ea6a458e75391
-
Filesize
72KB
MD5bd82e4237ed59f49c49f0db3776a6253
SHA158c70e814a4717fbe5966e36ddcd9fa3da63324f
SHA2560166f9af78ecdb6176e039b1e0b77cb8cc5aa437b2bdd0eaffb69a3eb583e3f7
SHA512b800601f054f8823c6affaf25c7b0e4b6702384f74220b7d2c41a9ea2e5508aab6576f4d53b3ea9692022c3393291397f4260e0da0973db51b2ea6a458e75391
-
Filesize
72KB
MD5fe2223eae2aeec2becb49195bc441439
SHA1549f46546442e5dceb82a7a654dedf9b1646a6e1
SHA256b13570481af89299cf3ba94cd7ed0ca5119c998547a6cdf161f1e460f0b9c613
SHA512944d24650dc5ce7e5859897d78e7fdba4979d85b48f3d264090b65caee3ecb8555d9b7d1219d6914db7254729fc848c3722b00ebd1206bcc6961fc3a0c1cd76f
-
Filesize
72KB
MD5fe2223eae2aeec2becb49195bc441439
SHA1549f46546442e5dceb82a7a654dedf9b1646a6e1
SHA256b13570481af89299cf3ba94cd7ed0ca5119c998547a6cdf161f1e460f0b9c613
SHA512944d24650dc5ce7e5859897d78e7fdba4979d85b48f3d264090b65caee3ecb8555d9b7d1219d6914db7254729fc848c3722b00ebd1206bcc6961fc3a0c1cd76f
-
Filesize
72KB
MD5035522c1d80c588fc67f9d8b42795fab
SHA128067a5559fc6a843a83abf36810421703a10846
SHA256fc52cd15795ee10ca271d4bd8600db6d00a862ac9c25c9d67a748cffd862ee35
SHA512af021a18fc6de89b9b3731624200747d2542da7cf3f14fb82e5c4c1ebc707d85276827f40eff3d560baa8f43dfe4d83c73cc3fa0ce4b4c0ff6ee5e64f4aa327b
-
Filesize
72KB
MD5035522c1d80c588fc67f9d8b42795fab
SHA128067a5559fc6a843a83abf36810421703a10846
SHA256fc52cd15795ee10ca271d4bd8600db6d00a862ac9c25c9d67a748cffd862ee35
SHA512af021a18fc6de89b9b3731624200747d2542da7cf3f14fb82e5c4c1ebc707d85276827f40eff3d560baa8f43dfe4d83c73cc3fa0ce4b4c0ff6ee5e64f4aa327b
-
Filesize
72KB
MD5d7f31f54b82610662325a97af25cdd90
SHA1c43566ef44537a381b89248dc9bf2c5e2dc65fa7
SHA256ea08b66efbc03f84266338525a944340aef941a9b39f8b3a0f2d51fd583de646
SHA5122719d57e54a08f6400c4d87d69f88225ad6bc38e06a012f26d589cb663ab8c99d206c3ad68dc6c4b2e37189006d9e05e4fe7b262128d198ea2f0e94920334523
-
Filesize
72KB
MD5d7f31f54b82610662325a97af25cdd90
SHA1c43566ef44537a381b89248dc9bf2c5e2dc65fa7
SHA256ea08b66efbc03f84266338525a944340aef941a9b39f8b3a0f2d51fd583de646
SHA5122719d57e54a08f6400c4d87d69f88225ad6bc38e06a012f26d589cb663ab8c99d206c3ad68dc6c4b2e37189006d9e05e4fe7b262128d198ea2f0e94920334523
-
Filesize
72KB
MD5e67152db5b6ff3d72abcd4275e96552e
SHA13e402cd2d822bf75be6c5f52f2b3dd6a3823e59c
SHA25639a3ebeae04f55603b373a84bb42212dfc732984cdd89b7920a3ae1cdee3f059
SHA5120aed595e99383601b954cae7275de1db83513fa45d86fa90dcd9e47861a7419c9c317b3252407e632bd4cc5d687816fe3c10a8406a4f16565ac35cca9c12686d
-
Filesize
72KB
MD5accc0cc75fd4813e82bbf6d86275ad82
SHA1b8644674e868cdebc323c2e92272f1866989c077
SHA256cbde7c4ea7ed7014bb860c8ffe4cfae00cd28c755ac908b8a224a5c4488c65d3
SHA512df1cb97c5d37b4f206101df2458287a1556f318daec1954037917a71937da9e2ffa7f6908b04d8a25aa35a92c56a7028da0bc87b4515869bc0683f8139392d82
-
Filesize
72KB
MD5accc0cc75fd4813e82bbf6d86275ad82
SHA1b8644674e868cdebc323c2e92272f1866989c077
SHA256cbde7c4ea7ed7014bb860c8ffe4cfae00cd28c755ac908b8a224a5c4488c65d3
SHA512df1cb97c5d37b4f206101df2458287a1556f318daec1954037917a71937da9e2ffa7f6908b04d8a25aa35a92c56a7028da0bc87b4515869bc0683f8139392d82
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
Filesize
72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
Filesize
72KB
MD5c4f55576805b591b2c5793bcdf56c4ca
SHA159328d778b339ec294ceff78ccf014b040498c87
SHA2566e9a966db59b87fe4d436568d72cb250c7073ad505b1e8a067a08acece7e79f5
SHA512d6d232c0f5c94daedbfc873c7c624f8c768b30bde30d59fc8c7c5bc26fddfbe25f43f88afbc4b374198ff56c6e691e9c3b2bc90386ba6cff6e44815ce315a8dc
-
Filesize
72KB
MD5c4f55576805b591b2c5793bcdf56c4ca
SHA159328d778b339ec294ceff78ccf014b040498c87
SHA2566e9a966db59b87fe4d436568d72cb250c7073ad505b1e8a067a08acece7e79f5
SHA512d6d232c0f5c94daedbfc873c7c624f8c768b30bde30d59fc8c7c5bc26fddfbe25f43f88afbc4b374198ff56c6e691e9c3b2bc90386ba6cff6e44815ce315a8dc
-
Filesize
72KB
MD5bd82e4237ed59f49c49f0db3776a6253
SHA158c70e814a4717fbe5966e36ddcd9fa3da63324f
SHA2560166f9af78ecdb6176e039b1e0b77cb8cc5aa437b2bdd0eaffb69a3eb583e3f7
SHA512b800601f054f8823c6affaf25c7b0e4b6702384f74220b7d2c41a9ea2e5508aab6576f4d53b3ea9692022c3393291397f4260e0da0973db51b2ea6a458e75391
-
Filesize
72KB
MD5bd82e4237ed59f49c49f0db3776a6253
SHA158c70e814a4717fbe5966e36ddcd9fa3da63324f
SHA2560166f9af78ecdb6176e039b1e0b77cb8cc5aa437b2bdd0eaffb69a3eb583e3f7
SHA512b800601f054f8823c6affaf25c7b0e4b6702384f74220b7d2c41a9ea2e5508aab6576f4d53b3ea9692022c3393291397f4260e0da0973db51b2ea6a458e75391
-
Filesize
72KB
MD5bd82e4237ed59f49c49f0db3776a6253
SHA158c70e814a4717fbe5966e36ddcd9fa3da63324f
SHA2560166f9af78ecdb6176e039b1e0b77cb8cc5aa437b2bdd0eaffb69a3eb583e3f7
SHA512b800601f054f8823c6affaf25c7b0e4b6702384f74220b7d2c41a9ea2e5508aab6576f4d53b3ea9692022c3393291397f4260e0da0973db51b2ea6a458e75391
-
Filesize
72KB
MD5bd82e4237ed59f49c49f0db3776a6253
SHA158c70e814a4717fbe5966e36ddcd9fa3da63324f
SHA2560166f9af78ecdb6176e039b1e0b77cb8cc5aa437b2bdd0eaffb69a3eb583e3f7
SHA512b800601f054f8823c6affaf25c7b0e4b6702384f74220b7d2c41a9ea2e5508aab6576f4d53b3ea9692022c3393291397f4260e0da0973db51b2ea6a458e75391
-
Filesize
72KB
MD5bd82e4237ed59f49c49f0db3776a6253
SHA158c70e814a4717fbe5966e36ddcd9fa3da63324f
SHA2560166f9af78ecdb6176e039b1e0b77cb8cc5aa437b2bdd0eaffb69a3eb583e3f7
SHA512b800601f054f8823c6affaf25c7b0e4b6702384f74220b7d2c41a9ea2e5508aab6576f4d53b3ea9692022c3393291397f4260e0da0973db51b2ea6a458e75391
-
Filesize
72KB
MD5fe2223eae2aeec2becb49195bc441439
SHA1549f46546442e5dceb82a7a654dedf9b1646a6e1
SHA256b13570481af89299cf3ba94cd7ed0ca5119c998547a6cdf161f1e460f0b9c613
SHA512944d24650dc5ce7e5859897d78e7fdba4979d85b48f3d264090b65caee3ecb8555d9b7d1219d6914db7254729fc848c3722b00ebd1206bcc6961fc3a0c1cd76f
-
Filesize
72KB
MD5fe2223eae2aeec2becb49195bc441439
SHA1549f46546442e5dceb82a7a654dedf9b1646a6e1
SHA256b13570481af89299cf3ba94cd7ed0ca5119c998547a6cdf161f1e460f0b9c613
SHA512944d24650dc5ce7e5859897d78e7fdba4979d85b48f3d264090b65caee3ecb8555d9b7d1219d6914db7254729fc848c3722b00ebd1206bcc6961fc3a0c1cd76f
-
Filesize
72KB
MD5fe2223eae2aeec2becb49195bc441439
SHA1549f46546442e5dceb82a7a654dedf9b1646a6e1
SHA256b13570481af89299cf3ba94cd7ed0ca5119c998547a6cdf161f1e460f0b9c613
SHA512944d24650dc5ce7e5859897d78e7fdba4979d85b48f3d264090b65caee3ecb8555d9b7d1219d6914db7254729fc848c3722b00ebd1206bcc6961fc3a0c1cd76f
-
Filesize
72KB
MD5fe2223eae2aeec2becb49195bc441439
SHA1549f46546442e5dceb82a7a654dedf9b1646a6e1
SHA256b13570481af89299cf3ba94cd7ed0ca5119c998547a6cdf161f1e460f0b9c613
SHA512944d24650dc5ce7e5859897d78e7fdba4979d85b48f3d264090b65caee3ecb8555d9b7d1219d6914db7254729fc848c3722b00ebd1206bcc6961fc3a0c1cd76f
-
Filesize
72KB
MD5fe2223eae2aeec2becb49195bc441439
SHA1549f46546442e5dceb82a7a654dedf9b1646a6e1
SHA256b13570481af89299cf3ba94cd7ed0ca5119c998547a6cdf161f1e460f0b9c613
SHA512944d24650dc5ce7e5859897d78e7fdba4979d85b48f3d264090b65caee3ecb8555d9b7d1219d6914db7254729fc848c3722b00ebd1206bcc6961fc3a0c1cd76f
-
Filesize
72KB
MD5035522c1d80c588fc67f9d8b42795fab
SHA128067a5559fc6a843a83abf36810421703a10846
SHA256fc52cd15795ee10ca271d4bd8600db6d00a862ac9c25c9d67a748cffd862ee35
SHA512af021a18fc6de89b9b3731624200747d2542da7cf3f14fb82e5c4c1ebc707d85276827f40eff3d560baa8f43dfe4d83c73cc3fa0ce4b4c0ff6ee5e64f4aa327b
-
Filesize
72KB
MD5035522c1d80c588fc67f9d8b42795fab
SHA128067a5559fc6a843a83abf36810421703a10846
SHA256fc52cd15795ee10ca271d4bd8600db6d00a862ac9c25c9d67a748cffd862ee35
SHA512af021a18fc6de89b9b3731624200747d2542da7cf3f14fb82e5c4c1ebc707d85276827f40eff3d560baa8f43dfe4d83c73cc3fa0ce4b4c0ff6ee5e64f4aa327b
-
Filesize
72KB
MD5035522c1d80c588fc67f9d8b42795fab
SHA128067a5559fc6a843a83abf36810421703a10846
SHA256fc52cd15795ee10ca271d4bd8600db6d00a862ac9c25c9d67a748cffd862ee35
SHA512af021a18fc6de89b9b3731624200747d2542da7cf3f14fb82e5c4c1ebc707d85276827f40eff3d560baa8f43dfe4d83c73cc3fa0ce4b4c0ff6ee5e64f4aa327b
-
Filesize
72KB
MD5035522c1d80c588fc67f9d8b42795fab
SHA128067a5559fc6a843a83abf36810421703a10846
SHA256fc52cd15795ee10ca271d4bd8600db6d00a862ac9c25c9d67a748cffd862ee35
SHA512af021a18fc6de89b9b3731624200747d2542da7cf3f14fb82e5c4c1ebc707d85276827f40eff3d560baa8f43dfe4d83c73cc3fa0ce4b4c0ff6ee5e64f4aa327b
-
Filesize
72KB
MD5035522c1d80c588fc67f9d8b42795fab
SHA128067a5559fc6a843a83abf36810421703a10846
SHA256fc52cd15795ee10ca271d4bd8600db6d00a862ac9c25c9d67a748cffd862ee35
SHA512af021a18fc6de89b9b3731624200747d2542da7cf3f14fb82e5c4c1ebc707d85276827f40eff3d560baa8f43dfe4d83c73cc3fa0ce4b4c0ff6ee5e64f4aa327b
-
Filesize
72KB
MD5d7f31f54b82610662325a97af25cdd90
SHA1c43566ef44537a381b89248dc9bf2c5e2dc65fa7
SHA256ea08b66efbc03f84266338525a944340aef941a9b39f8b3a0f2d51fd583de646
SHA5122719d57e54a08f6400c4d87d69f88225ad6bc38e06a012f26d589cb663ab8c99d206c3ad68dc6c4b2e37189006d9e05e4fe7b262128d198ea2f0e94920334523
-
Filesize
72KB
MD5d7f31f54b82610662325a97af25cdd90
SHA1c43566ef44537a381b89248dc9bf2c5e2dc65fa7
SHA256ea08b66efbc03f84266338525a944340aef941a9b39f8b3a0f2d51fd583de646
SHA5122719d57e54a08f6400c4d87d69f88225ad6bc38e06a012f26d589cb663ab8c99d206c3ad68dc6c4b2e37189006d9e05e4fe7b262128d198ea2f0e94920334523
-
Filesize
72KB
MD5d7f31f54b82610662325a97af25cdd90
SHA1c43566ef44537a381b89248dc9bf2c5e2dc65fa7
SHA256ea08b66efbc03f84266338525a944340aef941a9b39f8b3a0f2d51fd583de646
SHA5122719d57e54a08f6400c4d87d69f88225ad6bc38e06a012f26d589cb663ab8c99d206c3ad68dc6c4b2e37189006d9e05e4fe7b262128d198ea2f0e94920334523
-
Filesize
72KB
MD5d7f31f54b82610662325a97af25cdd90
SHA1c43566ef44537a381b89248dc9bf2c5e2dc65fa7
SHA256ea08b66efbc03f84266338525a944340aef941a9b39f8b3a0f2d51fd583de646
SHA5122719d57e54a08f6400c4d87d69f88225ad6bc38e06a012f26d589cb663ab8c99d206c3ad68dc6c4b2e37189006d9e05e4fe7b262128d198ea2f0e94920334523
-
Filesize
72KB
MD5d7f31f54b82610662325a97af25cdd90
SHA1c43566ef44537a381b89248dc9bf2c5e2dc65fa7
SHA256ea08b66efbc03f84266338525a944340aef941a9b39f8b3a0f2d51fd583de646
SHA5122719d57e54a08f6400c4d87d69f88225ad6bc38e06a012f26d589cb663ab8c99d206c3ad68dc6c4b2e37189006d9e05e4fe7b262128d198ea2f0e94920334523
-
Filesize
72KB
MD5e67152db5b6ff3d72abcd4275e96552e
SHA13e402cd2d822bf75be6c5f52f2b3dd6a3823e59c
SHA25639a3ebeae04f55603b373a84bb42212dfc732984cdd89b7920a3ae1cdee3f059
SHA5120aed595e99383601b954cae7275de1db83513fa45d86fa90dcd9e47861a7419c9c317b3252407e632bd4cc5d687816fe3c10a8406a4f16565ac35cca9c12686d
-
Filesize
72KB
MD5e67152db5b6ff3d72abcd4275e96552e
SHA13e402cd2d822bf75be6c5f52f2b3dd6a3823e59c
SHA25639a3ebeae04f55603b373a84bb42212dfc732984cdd89b7920a3ae1cdee3f059
SHA5120aed595e99383601b954cae7275de1db83513fa45d86fa90dcd9e47861a7419c9c317b3252407e632bd4cc5d687816fe3c10a8406a4f16565ac35cca9c12686d
-
Filesize
72KB
MD5accc0cc75fd4813e82bbf6d86275ad82
SHA1b8644674e868cdebc323c2e92272f1866989c077
SHA256cbde7c4ea7ed7014bb860c8ffe4cfae00cd28c755ac908b8a224a5c4488c65d3
SHA512df1cb97c5d37b4f206101df2458287a1556f318daec1954037917a71937da9e2ffa7f6908b04d8a25aa35a92c56a7028da0bc87b4515869bc0683f8139392d82
-
Filesize
72KB
MD5accc0cc75fd4813e82bbf6d86275ad82
SHA1b8644674e868cdebc323c2e92272f1866989c077
SHA256cbde7c4ea7ed7014bb860c8ffe4cfae00cd28c755ac908b8a224a5c4488c65d3
SHA512df1cb97c5d37b4f206101df2458287a1556f318daec1954037917a71937da9e2ffa7f6908b04d8a25aa35a92c56a7028da0bc87b4515869bc0683f8139392d82
-
Filesize
72KB
MD5accc0cc75fd4813e82bbf6d86275ad82
SHA1b8644674e868cdebc323c2e92272f1866989c077
SHA256cbde7c4ea7ed7014bb860c8ffe4cfae00cd28c755ac908b8a224a5c4488c65d3
SHA512df1cb97c5d37b4f206101df2458287a1556f318daec1954037917a71937da9e2ffa7f6908b04d8a25aa35a92c56a7028da0bc87b4515869bc0683f8139392d82
-
Filesize
72KB
MD5accc0cc75fd4813e82bbf6d86275ad82
SHA1b8644674e868cdebc323c2e92272f1866989c077
SHA256cbde7c4ea7ed7014bb860c8ffe4cfae00cd28c755ac908b8a224a5c4488c65d3
SHA512df1cb97c5d37b4f206101df2458287a1556f318daec1954037917a71937da9e2ffa7f6908b04d8a25aa35a92c56a7028da0bc87b4515869bc0683f8139392d82
-
Filesize
72KB
MD5accc0cc75fd4813e82bbf6d86275ad82
SHA1b8644674e868cdebc323c2e92272f1866989c077
SHA256cbde7c4ea7ed7014bb860c8ffe4cfae00cd28c755ac908b8a224a5c4488c65d3
SHA512df1cb97c5d37b4f206101df2458287a1556f318daec1954037917a71937da9e2ffa7f6908b04d8a25aa35a92c56a7028da0bc87b4515869bc0683f8139392d82
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
Filesize
72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
Filesize
72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD572d51a7644559c55093514f97b6b8b1a
SHA1d972518e9652390dd3cfee3df0533c89105ea1d7
SHA2561d1914b109aa34d1b4ecec70e6f8aa93efeb0d0ef0f1d15fef53d6cfde582c75
SHA51233663ee7c6454d116b6ca2d62d3a2bfedc8e82bd3813b6a6de5857bf8138fabdaa12da1216cc8e0dc6cbcaaa8bcf48b9ef20368d775273d911ed53dcf176d62e
-
Filesize
72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67
-
Filesize
72KB
MD525e84b2d7711a1b54f1febbb61e8173a
SHA10bf25bee6511c49c27926e01b0d8f8aaa02a6ba9
SHA256b333a765c13647e45054058eccf766c321b5e3639549881ec7ec0549c8bcea5d
SHA5123692e18480c8690b3c9877c2af9c7a12bbce27b93bd296f7c6b50fcfe5b8c1188fc7030a2dee2e3fc1e00ed86d18f858ec16670bfe6b9247e1c3c9460e777e67