Analysis
-
max time kernel
307s -
max time network
259s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:14
Static task
static1
Behavioral task
behavioral1
Sample
af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe
Resource
win10v2004-20221111-en
General
-
Target
af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe
-
Size
72KB
-
MD5
34ba56f583d310aac853d29c3a27ecc2
-
SHA1
45118975c834414c5cb0f89b58f4b448aad487c7
-
SHA256
af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471
-
SHA512
982246b3d61a4240448b39ec221487ec8486ed45784da3dc670e6e7e1d855f2217d60d388d406e64d8d535fa8923a0e85810f950ea5ceb629bc5d973d79ccef2
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf26:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr0f
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 27 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exeSystem Restore.exebackup.exebackup.exeaf3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 54 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exebackup.exebackup.exeaf3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exeSystem Restore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 42 IoCs
Processes:
backup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exeSystem Restore.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exeupdate.exebackup.exebackup.exepid process 4852 backup.exe 2360 backup.exe 3352 backup.exe 1532 System Restore.exe 1668 backup.exe 5108 backup.exe 3452 System Restore.exe 3196 backup.exe 2216 data.exe 2196 backup.exe 4820 backup.exe 4652 backup.exe 4680 backup.exe 1296 backup.exe 3664 backup.exe 3640 backup.exe 3668 backup.exe 5004 backup.exe 4860 backup.exe 2096 backup.exe 1380 backup.exe 3160 System Restore.exe 968 System Restore.exe 1236 backup.exe 3788 backup.exe 676 backup.exe 4376 backup.exe 4408 backup.exe 4108 backup.exe 4944 update.exe 520 backup.exe 3680 backup.exe 4448 backup.exe 2656 backup.exe 4812 backup.exe 2116 backup.exe 1128 backup.exe 2320 update.exe 4304 backup.exe 5068 update.exe 3224 backup.exe 612 backup.exe -
Drops file in Program Files directory 28 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exedescription ioc process File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\System Restore.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\update.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\System Restore.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\backup.exe System Restore.exe -
Drops file in Windows directory 3 IoCs
Processes:
System Restore.exebackup.exedescription ioc process File opened for modification C:\Windows\backup.exe System Restore.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 43 IoCs
Processes:
af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exeSystem Restore.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exebackup.exebackup.exepid process 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe 4852 backup.exe 2360 backup.exe 3352 backup.exe 1532 System Restore.exe 1668 backup.exe 5108 backup.exe 3452 System Restore.exe 3196 backup.exe 2216 data.exe 2196 backup.exe 4820 backup.exe 4680 backup.exe 4652 backup.exe 3664 backup.exe 1296 backup.exe 3640 backup.exe 3668 backup.exe 3160 System Restore.exe 1380 backup.exe 968 System Restore.exe 4860 backup.exe 2096 backup.exe 5004 backup.exe 4376 backup.exe 676 backup.exe 3788 backup.exe 1236 backup.exe 4408 backup.exe 5068 update.exe 3224 backup.exe 2116 backup.exe 4812 backup.exe 4304 backup.exe 2320 update.exe 4108 backup.exe 3680 backup.exe 1128 backup.exe 4944 update.exe 2656 backup.exe 520 backup.exe 4448 backup.exe 612 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription pid process target process PID 208 wrote to memory of 4852 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 4852 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 4852 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 2360 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 2360 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 2360 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 3352 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 3352 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 3352 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 1532 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe System Restore.exe PID 208 wrote to memory of 1532 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe System Restore.exe PID 208 wrote to memory of 1532 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe System Restore.exe PID 208 wrote to memory of 1668 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 1668 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 1668 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 4852 wrote to memory of 3452 4852 backup.exe System Restore.exe PID 4852 wrote to memory of 3452 4852 backup.exe System Restore.exe PID 4852 wrote to memory of 3452 4852 backup.exe System Restore.exe PID 208 wrote to memory of 5108 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 5108 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 5108 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 3196 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 3196 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 208 wrote to memory of 3196 208 af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe backup.exe PID 3452 wrote to memory of 2216 3452 System Restore.exe data.exe PID 3452 wrote to memory of 2216 3452 System Restore.exe data.exe PID 3452 wrote to memory of 2216 3452 System Restore.exe data.exe PID 3452 wrote to memory of 2196 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 2196 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 2196 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 4820 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 4820 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 4820 3452 System Restore.exe backup.exe PID 4820 wrote to memory of 4680 4820 backup.exe backup.exe PID 4820 wrote to memory of 4680 4820 backup.exe backup.exe PID 4820 wrote to memory of 4680 4820 backup.exe backup.exe PID 3452 wrote to memory of 4652 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 4652 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 4652 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 3664 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 3664 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 3664 3452 System Restore.exe backup.exe PID 4820 wrote to memory of 1296 4820 backup.exe backup.exe PID 4820 wrote to memory of 1296 4820 backup.exe backup.exe PID 4820 wrote to memory of 1296 4820 backup.exe backup.exe PID 4652 wrote to memory of 3640 4652 backup.exe backup.exe PID 4652 wrote to memory of 3640 4652 backup.exe backup.exe PID 4652 wrote to memory of 3640 4652 backup.exe backup.exe PID 4680 wrote to memory of 5004 4680 backup.exe backup.exe PID 4680 wrote to memory of 5004 4680 backup.exe backup.exe PID 4680 wrote to memory of 5004 4680 backup.exe backup.exe PID 3664 wrote to memory of 3668 3664 backup.exe backup.exe PID 3664 wrote to memory of 3668 3664 backup.exe backup.exe PID 3664 wrote to memory of 3668 3664 backup.exe backup.exe PID 4820 wrote to memory of 2096 4820 backup.exe backup.exe PID 4820 wrote to memory of 2096 4820 backup.exe backup.exe PID 4820 wrote to memory of 2096 4820 backup.exe backup.exe PID 4652 wrote to memory of 4860 4652 backup.exe backup.exe PID 4652 wrote to memory of 4860 4652 backup.exe backup.exe PID 4652 wrote to memory of 4860 4652 backup.exe backup.exe PID 3452 wrote to memory of 1380 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 1380 3452 System Restore.exe backup.exe PID 3452 wrote to memory of 1380 3452 System Restore.exe backup.exe PID 3640 wrote to memory of 3160 3640 backup.exe System Restore.exe -
System policy modification 1 TTPs 64 IoCs
Processes:
backup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exeSystem Restore.exeaf3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe"C:\Users\Admin\AppData\Local\Temp\af3b14968c82b46caa3e77d7f60b2202af8f30b59833840d3823c7b343963471.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:208 -
C:\Users\Admin\AppData\Local\Temp\504571822\backup.exeC:\Users\Admin\AppData\Local\Temp\504571822\backup.exe C:\Users\Admin\AppData\Local\Temp\504571822\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4852 -
C:\System Restore.exe"\System Restore.exe" \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3452 -
C:\odt\data.exeC:\odt\data.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2196 -
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4820 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4680 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5004 -
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1296 -
C:\Program Files\Common Files\DESIGNER\System Restore.exe"C:\Program Files\Common Files\DESIGNER\System Restore.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968 -
C:\Program Files\Common Files\microsoft shared\update.exe"C:\Program Files\Common Files\microsoft shared\update.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\Program Files\Common Files\Services\update.exe"C:\Program Files\Common Files\Services\update.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2096 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3680 -
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1236 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3224 -
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4812 -
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4652 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3640 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3160 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4408 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4448 -
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4860 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:520 -
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3788 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304 -
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3664 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3668 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4376 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:676 -
C:\Users\Public\Documents\update.exeC:\Users\Public\Documents\update.exe C:\Users\Public\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5068 -
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4108 -
C:\Windows\appcompat\backup.exeC:\Windows\appcompat\backup.exe C:\Windows\appcompat\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Low\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\Low\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5ee86fda7bff531ad582cf6be8378926f
SHA1fb0d7f0577ac76a210eabcd2f673a4d5a947fba1
SHA256b148a191a3ba3546a5250b6720207730ddf2e27aa537122d6fc1b97a286a6356
SHA51203a38f2b0a1875993054ac8839ccb73a51948ad607b48641de3212a80b5ced81d60ad67d6b1364d020964afca3074c52cb091e27800b15e0f618ebec7e1f367e
-
Filesize
72KB
MD5ee86fda7bff531ad582cf6be8378926f
SHA1fb0d7f0577ac76a210eabcd2f673a4d5a947fba1
SHA256b148a191a3ba3546a5250b6720207730ddf2e27aa537122d6fc1b97a286a6356
SHA51203a38f2b0a1875993054ac8839ccb73a51948ad607b48641de3212a80b5ced81d60ad67d6b1364d020964afca3074c52cb091e27800b15e0f618ebec7e1f367e
-
Filesize
72KB
MD5aba4d59a7e6da3af5ec9c8e7f00c8228
SHA1849e3df597bcac528579913267269d160a1cd0ec
SHA256d2bc4dc271f796fb0f7af99c0d6e911c51a2eb99bf80320ecda67fed5803f955
SHA5125af9d7666318d731878d51a195eb8ca3f72a563b55d57a027e3911e71f96c6145a61fef2143bf0b1f48b78b3b37e0df2130e8bceb71ebfc8ca06a251190dfa76
-
Filesize
72KB
MD5aba4d59a7e6da3af5ec9c8e7f00c8228
SHA1849e3df597bcac528579913267269d160a1cd0ec
SHA256d2bc4dc271f796fb0f7af99c0d6e911c51a2eb99bf80320ecda67fed5803f955
SHA5125af9d7666318d731878d51a195eb8ca3f72a563b55d57a027e3911e71f96c6145a61fef2143bf0b1f48b78b3b37e0df2130e8bceb71ebfc8ca06a251190dfa76
-
Filesize
72KB
MD56faec31ab68686e930cda34d14925469
SHA1da88907b9807d923863b28bfba522c2b02958d7f
SHA256ece67fce2296d86ad1a5bcef7376d8c4c509b7ee84ce32d4a2c7b44f9f31b5ff
SHA51284f8c918edc8d75723b6811f8d9fbd4636e7280d1d74eddd25d04ba3eab647920246e2c4c4e6e2db779698393c33e9b8d0474a4b11610518faa83bfddb3a1871
-
Filesize
72KB
MD5f3c2feda2e6bd3ef62532bb7a382426f
SHA1ccd814ebfebb5ac7fa379bc85f48c8394760c19c
SHA256a9b0ec45a60e92a4fa556490d9c76daa6d7fd4cffa895eb146865e6aedbaaaa0
SHA512a52971cc81acbb4034980b6233359ed7f678964978ace96e1f229b5a7937c1fac237c49f2bd545a4208e7a32e9f67b1572e7179a26ee0005c8ca78f827740d2f
-
Filesize
72KB
MD5f3c2feda2e6bd3ef62532bb7a382426f
SHA1ccd814ebfebb5ac7fa379bc85f48c8394760c19c
SHA256a9b0ec45a60e92a4fa556490d9c76daa6d7fd4cffa895eb146865e6aedbaaaa0
SHA512a52971cc81acbb4034980b6233359ed7f678964978ace96e1f229b5a7937c1fac237c49f2bd545a4208e7a32e9f67b1572e7179a26ee0005c8ca78f827740d2f
-
Filesize
72KB
MD5a6ca457b611ae85e5081daff22f457dc
SHA1c90da22c72be863cc199aebaedc63810f0eabf49
SHA2564b3bc2ba23bde73889adc5c405682217fdeba8529ff1e33aaa8544d3969d7ce6
SHA512b8f1290af7e9d15841b03074dbbdab128cc4164abcb4911fc0130581c9fc01afa4acdbfb09cad7fe81f9cff9364226458c1d2a9b479f7a3b460b1f7a65eb1032
-
Filesize
72KB
MD5a6ca457b611ae85e5081daff22f457dc
SHA1c90da22c72be863cc199aebaedc63810f0eabf49
SHA2564b3bc2ba23bde73889adc5c405682217fdeba8529ff1e33aaa8544d3969d7ce6
SHA512b8f1290af7e9d15841b03074dbbdab128cc4164abcb4911fc0130581c9fc01afa4acdbfb09cad7fe81f9cff9364226458c1d2a9b479f7a3b460b1f7a65eb1032
-
Filesize
72KB
MD58022e0add0ae6dc8c954c257e7e267ab
SHA1a08f6ca0bf72ce58229299b66bec51a213a0a3a1
SHA25614e786f7f3da9bf2db7aa6c6b0c434a085efae331d569fdb10df98d9f2090819
SHA5124b6cafc9d0491fc6f6330bf161e8a21ba4315343f84432775ed68db48d439db97b17daacc2cc459a6cf119dc479594ca0a960c856eaa0a39b01ace566a89dafa
-
Filesize
72KB
MD5edeff2772e725cfeede02f8687d44214
SHA1e74f9ba1046fa6bcc859c14bf9845444d7bf39b6
SHA256b857a986f25c25f162e9a62479af9dbe01e5e29178f28fdafa3a8bd0d0e3dde1
SHA512f57a7eec6a8c4f2c6061b5fb99677575a5a7f675ec4dab063ed613d4ecb005ae5be46fa433edc9bad60849eba04338abfffa27645fea0fb94fc4c75a19dfa8d5
-
Filesize
72KB
MD52c5a2dfa9f706473d3060d2dee62fa5c
SHA16296cbe3d02bac4cdc85907e7d2b6795f5f82959
SHA256c03d0b21e8a5e3c68f5f6ab98380757dd88390be35828b90753da2361dff2ea5
SHA512303564e60691d32c674d7231658c0ad336ff2a787683f3ba9bb461d615f6bab52eeff1eafdca5f01159b83331136c6bec2d22cd9e8b1fe7a070f84c6b9844304
-
Filesize
72KB
MD52c5a2dfa9f706473d3060d2dee62fa5c
SHA16296cbe3d02bac4cdc85907e7d2b6795f5f82959
SHA256c03d0b21e8a5e3c68f5f6ab98380757dd88390be35828b90753da2361dff2ea5
SHA512303564e60691d32c674d7231658c0ad336ff2a787683f3ba9bb461d615f6bab52eeff1eafdca5f01159b83331136c6bec2d22cd9e8b1fe7a070f84c6b9844304
-
Filesize
72KB
MD5da62d4a7089a573951737a9e83e0a44b
SHA12f038862222803a403786493e30100324044b12b
SHA256c32d0e7d80e9a228c407ae7834d7825fd394affd7e85e02dea32ab3075a97dcc
SHA51233ba22a8fd5ac7111f8b5f7721cb6ffb29f2f1ead44210469f79ac469a11e7454db8174a324b68418c80f8a6d8b04b7cc408f87ba696ad4cbde39bdc3c17904c
-
Filesize
72KB
MD5da62d4a7089a573951737a9e83e0a44b
SHA12f038862222803a403786493e30100324044b12b
SHA256c32d0e7d80e9a228c407ae7834d7825fd394affd7e85e02dea32ab3075a97dcc
SHA51233ba22a8fd5ac7111f8b5f7721cb6ffb29f2f1ead44210469f79ac469a11e7454db8174a324b68418c80f8a6d8b04b7cc408f87ba696ad4cbde39bdc3c17904c
-
Filesize
72KB
MD59c582795aae932d9a88330d6addaa8a9
SHA1f798b769cdefdd50a8f798be2eaa5982335619b3
SHA2567cd86dea5b8ec7cfd9474fa35e8225d448cc7493369e330a650ea54ac1c33ca4
SHA5129f0b033f966b2c2da0f47bc486f3b74389ece5c64ebd5126a761ac87630376b93ac3ab271a95efc6c2d3e0c21b6093bebf3db5bf100e4f3015c17eb2d864b9b5
-
Filesize
72KB
MD59c582795aae932d9a88330d6addaa8a9
SHA1f798b769cdefdd50a8f798be2eaa5982335619b3
SHA2567cd86dea5b8ec7cfd9474fa35e8225d448cc7493369e330a650ea54ac1c33ca4
SHA5129f0b033f966b2c2da0f47bc486f3b74389ece5c64ebd5126a761ac87630376b93ac3ab271a95efc6c2d3e0c21b6093bebf3db5bf100e4f3015c17eb2d864b9b5
-
Filesize
72KB
MD5950e344b6f664228651c4c5ebb48003e
SHA14740a36a7f84bee7dace55777b6d5f3330a07784
SHA256cc39dd3badebae4da53a5c253df5ecd8cdd945475ec2a80c204c93dca57e4649
SHA51219406b85eb0187e52d69a5efa2b855f6e100dbbec10a10bf7a26237c6decb1651ae24015aa48228f8f2d2bbd25c9f5c2aa0edfd38258c5e72c875292a7c907ae
-
Filesize
72KB
MD5950e344b6f664228651c4c5ebb48003e
SHA14740a36a7f84bee7dace55777b6d5f3330a07784
SHA256cc39dd3badebae4da53a5c253df5ecd8cdd945475ec2a80c204c93dca57e4649
SHA51219406b85eb0187e52d69a5efa2b855f6e100dbbec10a10bf7a26237c6decb1651ae24015aa48228f8f2d2bbd25c9f5c2aa0edfd38258c5e72c875292a7c907ae
-
Filesize
72KB
MD573afc1332056370bc194f07522d0773a
SHA10e420fa52b4bdc8b11c5af1d113f651c72dbece8
SHA256e2a882721a6674b73be3cc755fdb03ed1972641b63baa970f334e08718a452b7
SHA512d641fd330c05050df50a7920193a7274de3ca4f7117b5b36c9c1359d1a9fcc146b4e8cd22b5437f9bb833b62383fa4af87288d2cf34052ba760f39986dc949c8
-
Filesize
72KB
MD573afc1332056370bc194f07522d0773a
SHA10e420fa52b4bdc8b11c5af1d113f651c72dbece8
SHA256e2a882721a6674b73be3cc755fdb03ed1972641b63baa970f334e08718a452b7
SHA512d641fd330c05050df50a7920193a7274de3ca4f7117b5b36c9c1359d1a9fcc146b4e8cd22b5437f9bb833b62383fa4af87288d2cf34052ba760f39986dc949c8
-
Filesize
72KB
MD5656a2149fdddd28d267dd046527e2c25
SHA1de90d8fd6adfd36911f00b9a74d663c6ba3db2a5
SHA256eff62e91d382797d5c10a379177b41562d85696e54aa3c328e34b252433e5457
SHA512f12c229fcc220695c95711c4cf3ae4265cdecc3e44ee02a1bec1eebfa0aaeaa89018cf76ea1e137163868877566332f333caa8aa8ebf6e60f69a2a507fc6c6a5
-
Filesize
72KB
MD5656a2149fdddd28d267dd046527e2c25
SHA1de90d8fd6adfd36911f00b9a74d663c6ba3db2a5
SHA256eff62e91d382797d5c10a379177b41562d85696e54aa3c328e34b252433e5457
SHA512f12c229fcc220695c95711c4cf3ae4265cdecc3e44ee02a1bec1eebfa0aaeaa89018cf76ea1e137163868877566332f333caa8aa8ebf6e60f69a2a507fc6c6a5
-
Filesize
72KB
MD5cbfb11dd0ed6d4a372ffa939fc59f27d
SHA1bc85c9d7ba10ddafa6bed8b3e02fe04ab33a160d
SHA2568681007ffb8cfc79300dd5d2666a50c21b3ac94d1bfdc24d91f12746ca2ab439
SHA51265d01287d04f60972cf5ab5918d2fcb03eb6c9fa6c85bd1afe88226a3f39acd6ef8e04dae7ac2218307c4a88f501689d79ea2965988b15ed39ea7499d336e867
-
Filesize
72KB
MD5cbfb11dd0ed6d4a372ffa939fc59f27d
SHA1bc85c9d7ba10ddafa6bed8b3e02fe04ab33a160d
SHA2568681007ffb8cfc79300dd5d2666a50c21b3ac94d1bfdc24d91f12746ca2ab439
SHA51265d01287d04f60972cf5ab5918d2fcb03eb6c9fa6c85bd1afe88226a3f39acd6ef8e04dae7ac2218307c4a88f501689d79ea2965988b15ed39ea7499d336e867
-
Filesize
72KB
MD5198723e9935b4b07d08d1d437383a7ec
SHA1d37656a30a6bd866e1d3e0ec0c43c7a577726b51
SHA256f2b31411689a22dc1a6289a97654ab4ded1184f84228f6f00559af744df51277
SHA5129f6bcd8a0592d3d9c1ce7f0fc8c07083bde433ddb172343f72c03ccd42b2bc196d72ea68b76297941e9276bb637eb2f8d9b4c69bd64e6cc043c213850110a0ac
-
Filesize
72KB
MD56eaa78336ed477c50ba352456e4845f5
SHA133ca43fc11c9b25778af4c3e502e503b42580d30
SHA256dfc979400cfcc8bd45d3dc5eafe2a1ba88e8176ebf2d00fea63e43aeb9b5e816
SHA51212a9dc85629366b889dadcd9a7d987807da78df07e5ba60790d6d629232736eb7d43310d29b5504ea420e789a714189819950e05d1a2e2eaa9d0ad9208f0aec1
-
Filesize
72KB
MD59f5298915234a4beb0e51c65d654722a
SHA1e216e90aaa01d3a0f9fd0d5848e8ce9c45ebc622
SHA2561b0d420ded15b2e6e0910f6f137c3432cf4f155fb6fbf5e41c14984956208ce6
SHA512fdb341fe208f107ffa75bba184258ff1a48ba1f69e5345bbab47c9403aa36b2f39672339bfc55a7fafcb45e0358d88b13960bffd95aa20a6ea7bb8ea7aa8837a
-
Filesize
72KB
MD59f5298915234a4beb0e51c65d654722a
SHA1e216e90aaa01d3a0f9fd0d5848e8ce9c45ebc622
SHA2561b0d420ded15b2e6e0910f6f137c3432cf4f155fb6fbf5e41c14984956208ce6
SHA512fdb341fe208f107ffa75bba184258ff1a48ba1f69e5345bbab47c9403aa36b2f39672339bfc55a7fafcb45e0358d88b13960bffd95aa20a6ea7bb8ea7aa8837a
-
Filesize
72KB
MD5d789942bf0d325bf27e821ac054096d1
SHA1557eee0ea11a78dd9621cfea5b61a9fe6dfb9f1e
SHA2568edcfc64c6dd3d7f19113ebac1421b00e62e7bbefb44a5056f7b6e97ce211890
SHA512b546d129651c381dc4e18c86c44adea640581b296262819585d18c6f3799ff483de5b423f35b5471913da475dbfd229269fb9eb1af4f7c960b5fa24eda98c8b0
-
Filesize
72KB
MD5d789942bf0d325bf27e821ac054096d1
SHA1557eee0ea11a78dd9621cfea5b61a9fe6dfb9f1e
SHA2568edcfc64c6dd3d7f19113ebac1421b00e62e7bbefb44a5056f7b6e97ce211890
SHA512b546d129651c381dc4e18c86c44adea640581b296262819585d18c6f3799ff483de5b423f35b5471913da475dbfd229269fb9eb1af4f7c960b5fa24eda98c8b0
-
Filesize
72KB
MD57896ad78ce5b2ee2c67b62ecd27ef88f
SHA1465c141b69491e4fb699a98869057cee8e5a2c11
SHA256dc71704f34a917e8aad8a1f13b74236c6b5b8189386c7e39305fa80309da65bc
SHA5121ed143745dc8bb1d8a42398e62d3f5cba476896ce663d677c44746ce90ee8345ced3db015ac2cb12188dcd6d76b9275e7dcaacea7b2e20847d27433415a224cf
-
Filesize
72KB
MD5ee86fda7bff531ad582cf6be8378926f
SHA1fb0d7f0577ac76a210eabcd2f673a4d5a947fba1
SHA256b148a191a3ba3546a5250b6720207730ddf2e27aa537122d6fc1b97a286a6356
SHA51203a38f2b0a1875993054ac8839ccb73a51948ad607b48641de3212a80b5ced81d60ad67d6b1364d020964afca3074c52cb091e27800b15e0f618ebec7e1f367e
-
Filesize
72KB
MD5ee86fda7bff531ad582cf6be8378926f
SHA1fb0d7f0577ac76a210eabcd2f673a4d5a947fba1
SHA256b148a191a3ba3546a5250b6720207730ddf2e27aa537122d6fc1b97a286a6356
SHA51203a38f2b0a1875993054ac8839ccb73a51948ad607b48641de3212a80b5ced81d60ad67d6b1364d020964afca3074c52cb091e27800b15e0f618ebec7e1f367e
-
Filesize
72KB
MD54683d7c3d9c23c995071110041cd259e
SHA1783e9d4f4d4c18e9b21447db84fa85449471a859
SHA25657857b8300b3cf7ff0db3af1f45f2c04b05847f8ef06ff185f5ba62722e298a4
SHA512b61d2305eb0916d457ec1a1f6fa64671e0270013c02b8a7476680d4dbce93c05dc1a3b06edd639a2118f015ad35f65f036da314f6494303bf9c0521432f648cb
-
Filesize
72KB
MD54683d7c3d9c23c995071110041cd259e
SHA1783e9d4f4d4c18e9b21447db84fa85449471a859
SHA25657857b8300b3cf7ff0db3af1f45f2c04b05847f8ef06ff185f5ba62722e298a4
SHA512b61d2305eb0916d457ec1a1f6fa64671e0270013c02b8a7476680d4dbce93c05dc1a3b06edd639a2118f015ad35f65f036da314f6494303bf9c0521432f648cb
-
Filesize
72KB
MD5f4ecce2f7005b0f878469465d8cc6a76
SHA19909baa119e90d015f979de4043b3afba1301dd7
SHA25696546b6d51505c4e417947396ec3a6bb6710272f8d636a559aab24b7c606221e
SHA512deef07586c9f4423e0722d63db68621163ad235bc331950d9291e1534548347204b84c0fc1801bdb74609fe52da53741ffc54e194b3b3f7d92909641d207d48b
-
Filesize
72KB
MD5f4ecce2f7005b0f878469465d8cc6a76
SHA19909baa119e90d015f979de4043b3afba1301dd7
SHA25696546b6d51505c4e417947396ec3a6bb6710272f8d636a559aab24b7c606221e
SHA512deef07586c9f4423e0722d63db68621163ad235bc331950d9291e1534548347204b84c0fc1801bdb74609fe52da53741ffc54e194b3b3f7d92909641d207d48b
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50eed869a873e797f3af20e7294951d22
SHA1b211db318ede2437a132fdbdc3845cf97daef2e6
SHA256fbc84e54628e2e2575b35ee021f146c8c5d40d0b1706a20c5d5846418aa1abbd
SHA51257b4cc9baa0d9621b8adda31dd0c216a12352947fc8dd2a5c5b73452ee2fa366d0cbb4b0ff2e92ad929e2b4f24b9a0596718ca67f7afca115a23b7390f264c3d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50eed869a873e797f3af20e7294951d22
SHA1b211db318ede2437a132fdbdc3845cf97daef2e6
SHA256fbc84e54628e2e2575b35ee021f146c8c5d40d0b1706a20c5d5846418aa1abbd
SHA51257b4cc9baa0d9621b8adda31dd0c216a12352947fc8dd2a5c5b73452ee2fa366d0cbb4b0ff2e92ad929e2b4f24b9a0596718ca67f7afca115a23b7390f264c3d
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
Filesize
72KB
MD52ea40b5604d7e5ebefc99771b4bc3f33
SHA1cba0e8f171657566a954b67281d803c9790912d2
SHA256ade81a6f9c078133cb6a3f38b3917a3bd939844816d4446882cc32f226c148a5
SHA512774c4c7e8c2251dcc58f63112287774030ad12c229ef438dd8ffb5d25f5a59607a3942822c87d7a5f2e8b6a48ad8abaaa4aff1bc0d461e7ee8b138b287b2770b
-
Filesize
72KB
MD50eed869a873e797f3af20e7294951d22
SHA1b211db318ede2437a132fdbdc3845cf97daef2e6
SHA256fbc84e54628e2e2575b35ee021f146c8c5d40d0b1706a20c5d5846418aa1abbd
SHA51257b4cc9baa0d9621b8adda31dd0c216a12352947fc8dd2a5c5b73452ee2fa366d0cbb4b0ff2e92ad929e2b4f24b9a0596718ca67f7afca115a23b7390f264c3d
-
Filesize
72KB
MD50eed869a873e797f3af20e7294951d22
SHA1b211db318ede2437a132fdbdc3845cf97daef2e6
SHA256fbc84e54628e2e2575b35ee021f146c8c5d40d0b1706a20c5d5846418aa1abbd
SHA51257b4cc9baa0d9621b8adda31dd0c216a12352947fc8dd2a5c5b73452ee2fa366d0cbb4b0ff2e92ad929e2b4f24b9a0596718ca67f7afca115a23b7390f264c3d
-
Filesize
72KB
MD599690bda116956d6027abd8311469529
SHA13abad098012639d09bbbcf8aaebde2baebfdda69
SHA2560011a0206d981704a9f49a50f653e73d11a69e36483bcb7f0898ff52e67a4d7e
SHA51236fa2724a8f92343a5de6f245f0aca9b0aad6c9bfd62c50984055a9ee5929138ae2a2a88ff4ba3af9c699b2b7e16843a8b02756fb71a27f2e339f25735619c15
-
Filesize
72KB
MD591d17cb4413d9250403452bdc8db0f11
SHA16f1f7333dd20ee95a544181e6af68ad11008056c
SHA256382d9b0e9ceb5dde8e8ef6f7258bccf6c8604d8451d2d75c9de3d05ce07c0097
SHA5129e8ec5c45d5f9941a69cdc669d66f3ada5234db6efa8fed33e9f55513a2a3eb753170d87147a22003167c7b06ebbed3e669e1f539cf9bca6af68196bbbc22c79
-
Filesize
72KB
MD591d17cb4413d9250403452bdc8db0f11
SHA16f1f7333dd20ee95a544181e6af68ad11008056c
SHA256382d9b0e9ceb5dde8e8ef6f7258bccf6c8604d8451d2d75c9de3d05ce07c0097
SHA5129e8ec5c45d5f9941a69cdc669d66f3ada5234db6efa8fed33e9f55513a2a3eb753170d87147a22003167c7b06ebbed3e669e1f539cf9bca6af68196bbbc22c79
-
Filesize
72KB
MD5ae995651916d34b27984d4c776028371
SHA1017a373ad3fc736103c6b16c077eab72f2182daa
SHA2569a66688e4e9e6946ae285801cd1d85e8955b99a335417bcee20232c7d225aae8
SHA512bef1d8d963261786a677212a3251c029b04e581cce054d32fe33659c51c2ba5411981b40d308fd2817524f53061d0173bf2d157f846c216289910a36f6521334
-
Filesize
72KB
MD5ae995651916d34b27984d4c776028371
SHA1017a373ad3fc736103c6b16c077eab72f2182daa
SHA2569a66688e4e9e6946ae285801cd1d85e8955b99a335417bcee20232c7d225aae8
SHA512bef1d8d963261786a677212a3251c029b04e581cce054d32fe33659c51c2ba5411981b40d308fd2817524f53061d0173bf2d157f846c216289910a36f6521334
-
Filesize
72KB
MD5d8a80c7272a0aa6f71a33d36fcfd9c8b
SHA1d319b3f64df983ef0c67d728228c96667bc78af8
SHA25657b337dcece4677cb25a22d17d5c3327b07ec5c07b87e39afb3d6061780c1e09
SHA5122caf54839c91bc63977378005b3b1311d514eef6c6452e623615be6b10422840d4af649d8fa3c20c84b7ab2fdabfe3ae16124df698d87bdf5fb0542530f52a64
-
Filesize
72KB
MD5d8a80c7272a0aa6f71a33d36fcfd9c8b
SHA1d319b3f64df983ef0c67d728228c96667bc78af8
SHA25657b337dcece4677cb25a22d17d5c3327b07ec5c07b87e39afb3d6061780c1e09
SHA5122caf54839c91bc63977378005b3b1311d514eef6c6452e623615be6b10422840d4af649d8fa3c20c84b7ab2fdabfe3ae16124df698d87bdf5fb0542530f52a64
-
Filesize
72KB
MD5bd45d6e15f2b7332ec3c8b8290ddce7a
SHA1ac7ff14bc7bbee97885f220f44a5ed33bc3978a1
SHA256bf4e2ab867130182e5d0f221b324aaf930fab37605b82d592a08d7d4ef3b31f9
SHA512d14084a98ac138b340b3ef9ef2c265b9cc31b6f623194204eaf6e99b29eca4e94cfe7d4d010d8a8ee10504c3d827c8e7f762a88f57d8a7f358312fb2064fe3a5
-
Filesize
72KB
MD5c71f3a7da987c0fae0b7ff5c516cde5b
SHA10101010789340249f557efaf513741adc0056b6a
SHA256f61d6e3a500541720909263ae640fde92d3f06cc325555125562012fdbeeb650
SHA5129a68a2824b637388b1f6dc58ef2cbc5ebfdde13032013c352c1eddc190175638098d691b5047c9bbddb42ee1509314fed5853498de20c5a00b2cb466cadcd163
-
Filesize
72KB
MD5c71f3a7da987c0fae0b7ff5c516cde5b
SHA10101010789340249f557efaf513741adc0056b6a
SHA256f61d6e3a500541720909263ae640fde92d3f06cc325555125562012fdbeeb650
SHA5129a68a2824b637388b1f6dc58ef2cbc5ebfdde13032013c352c1eddc190175638098d691b5047c9bbddb42ee1509314fed5853498de20c5a00b2cb466cadcd163
-
Filesize
72KB
MD58856f2d767fcff908f6b9f9be6abb3ee
SHA1a3f22923b098d60498a3b8c12ac4f036887e77dd
SHA25695f454e68c70815f704e0fa6cad7bc66667bc52ca0e964039241f1231144b02f
SHA512527a99007c6be3e67523a795090451b20db9c31a7780bcd3c873f3b55b6a7854717ff2909083a2ccc54b67eeddd71ea57234111ae31321d0996d73d91695d223
-
Filesize
72KB
MD58856f2d767fcff908f6b9f9be6abb3ee
SHA1a3f22923b098d60498a3b8c12ac4f036887e77dd
SHA25695f454e68c70815f704e0fa6cad7bc66667bc52ca0e964039241f1231144b02f
SHA512527a99007c6be3e67523a795090451b20db9c31a7780bcd3c873f3b55b6a7854717ff2909083a2ccc54b67eeddd71ea57234111ae31321d0996d73d91695d223