Analysis
-
max time kernel
200s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe
Resource
win10v2004-20221111-en
General
-
Target
b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe
-
Size
72KB
-
MD5
02ea688550447b3a847de49caf566e58
-
SHA1
adc0650377842e9597183f4f2540fd3045d053d6
-
SHA256
b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22
-
SHA512
311cc77dc7b62e0d638c8cb726c14f22502848dc0cc5934b902b1751db31f07eba36f609c9531a4db0eaac99eccc924bd42ca6158a8d2e82d3665b976d2eac6f
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2d:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 44 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe -
Executes dropped EXE 64 IoCs
pid Process 1504 backup.exe 668 backup.exe 1424 backup.exe 1580 backup.exe 1288 backup.exe 1300 backup.exe 1204 backup.exe 1120 update.exe 1872 backup.exe 568 backup.exe 796 backup.exe 1576 backup.exe 1900 backup.exe 328 backup.exe 1144 data.exe 956 backup.exe 1388 backup.exe 1572 backup.exe 1124 backup.exe 1384 backup.exe 1668 backup.exe 1768 backup.exe 1756 backup.exe 1288 backup.exe 1636 backup.exe 1396 backup.exe 1100 backup.exe 1912 backup.exe 108 backup.exe 964 backup.exe 1612 backup.exe 2012 backup.exe 1520 backup.exe 428 backup.exe 1296 backup.exe 1228 backup.exe 1172 backup.exe 2008 backup.exe 2040 backup.exe 1944 backup.exe 956 backup.exe 1608 update.exe 1700 backup.exe 268 backup.exe 1568 backup.exe 560 backup.exe 580 backup.exe 868 backup.exe 2036 backup.exe 1616 backup.exe 996 backup.exe 2024 System Restore.exe 1656 backup.exe 808 backup.exe 1808 backup.exe 1624 backup.exe 1596 backup.exe 1632 backup.exe 1496 backup.exe 832 backup.exe 1100 backup.exe 1180 System Restore.exe 904 backup.exe 1760 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 1300 backup.exe 1300 backup.exe 1204 backup.exe 1204 backup.exe 1300 backup.exe 1300 backup.exe 568 backup.exe 568 backup.exe 796 backup.exe 796 backup.exe 568 backup.exe 568 backup.exe 1900 backup.exe 1900 backup.exe 1120 update.exe 1120 update.exe 1120 update.exe 328 backup.exe 328 backup.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 328 backup.exe 328 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 328 backup.exe 1900 backup.exe 1300 backup.exe 1900 backup.exe 1300 backup.exe 328 backup.exe 1388 backup.exe 568 backup.exe 1388 backup.exe 568 backup.exe 1900 backup.exe 1900 backup.exe 1300 backup.exe 1300 backup.exe 1388 backup.exe 568 backup.exe 328 backup.exe 328 backup.exe 1388 backup.exe 568 backup.exe 1396 backup.exe 1396 backup.exe 1636 backup.exe 1636 backup.exe 1768 backup.exe 1768 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe update.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 60 IoCs
pid Process 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 1504 backup.exe 668 backup.exe 1424 backup.exe 1580 backup.exe 1288 backup.exe 1300 backup.exe 1204 backup.exe 1872 backup.exe 568 backup.exe 796 backup.exe 1576 backup.exe 1900 backup.exe 328 backup.exe 1120 update.exe 1144 data.exe 956 backup.exe 1388 backup.exe 1572 backup.exe 1124 backup.exe 1668 backup.exe 1768 backup.exe 1384 backup.exe 1756 backup.exe 1288 backup.exe 1636 backup.exe 1396 backup.exe 108 backup.exe 1912 backup.exe 964 backup.exe 1100 backup.exe 1612 backup.exe 2012 backup.exe 1520 backup.exe 428 backup.exe 2008 backup.exe 1296 backup.exe 2040 backup.exe 956 backup.exe 1944 backup.exe 1172 backup.exe 1608 update.exe 1700 backup.exe 560 backup.exe 580 backup.exe 268 backup.exe 2036 backup.exe 868 backup.exe 1656 backup.exe 1624 backup.exe 996 backup.exe 1616 backup.exe 1808 backup.exe 1496 backup.exe 832 backup.exe 1180 System Restore.exe 1968 backup.exe 904 backup.exe 2024 System Restore.exe 1760 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 576 wrote to memory of 1504 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 28 PID 576 wrote to memory of 1504 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 28 PID 576 wrote to memory of 1504 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 28 PID 576 wrote to memory of 1504 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 28 PID 576 wrote to memory of 668 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 29 PID 576 wrote to memory of 668 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 29 PID 576 wrote to memory of 668 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 29 PID 576 wrote to memory of 668 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 29 PID 576 wrote to memory of 1424 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 30 PID 576 wrote to memory of 1424 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 30 PID 576 wrote to memory of 1424 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 30 PID 576 wrote to memory of 1424 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 30 PID 576 wrote to memory of 1580 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 31 PID 576 wrote to memory of 1580 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 31 PID 576 wrote to memory of 1580 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 31 PID 576 wrote to memory of 1580 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 31 PID 576 wrote to memory of 1288 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 32 PID 576 wrote to memory of 1288 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 32 PID 576 wrote to memory of 1288 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 32 PID 576 wrote to memory of 1288 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 32 PID 1504 wrote to memory of 1300 1504 backup.exe 33 PID 1504 wrote to memory of 1300 1504 backup.exe 33 PID 1504 wrote to memory of 1300 1504 backup.exe 33 PID 1504 wrote to memory of 1300 1504 backup.exe 33 PID 1300 wrote to memory of 1204 1300 backup.exe 35 PID 1300 wrote to memory of 1204 1300 backup.exe 35 PID 1300 wrote to memory of 1204 1300 backup.exe 35 PID 1300 wrote to memory of 1204 1300 backup.exe 35 PID 576 wrote to memory of 1120 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 34 PID 576 wrote to memory of 1120 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 34 PID 576 wrote to memory of 1120 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 34 PID 576 wrote to memory of 1120 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 34 PID 576 wrote to memory of 1120 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 34 PID 576 wrote to memory of 1120 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 34 PID 576 wrote to memory of 1120 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 34 PID 1204 wrote to memory of 1872 1204 backup.exe 36 PID 1204 wrote to memory of 1872 1204 backup.exe 36 PID 1204 wrote to memory of 1872 1204 backup.exe 36 PID 1204 wrote to memory of 1872 1204 backup.exe 36 PID 1300 wrote to memory of 568 1300 backup.exe 37 PID 1300 wrote to memory of 568 1300 backup.exe 37 PID 1300 wrote to memory of 568 1300 backup.exe 37 PID 1300 wrote to memory of 568 1300 backup.exe 37 PID 568 wrote to memory of 796 568 backup.exe 38 PID 568 wrote to memory of 796 568 backup.exe 38 PID 568 wrote to memory of 796 568 backup.exe 38 PID 568 wrote to memory of 796 568 backup.exe 38 PID 796 wrote to memory of 1576 796 backup.exe 39 PID 796 wrote to memory of 1576 796 backup.exe 39 PID 796 wrote to memory of 1576 796 backup.exe 39 PID 796 wrote to memory of 1576 796 backup.exe 39 PID 568 wrote to memory of 1900 568 backup.exe 40 PID 568 wrote to memory of 1900 568 backup.exe 40 PID 568 wrote to memory of 1900 568 backup.exe 40 PID 568 wrote to memory of 1900 568 backup.exe 40 PID 1900 wrote to memory of 328 1900 backup.exe 41 PID 1900 wrote to memory of 328 1900 backup.exe 41 PID 1900 wrote to memory of 328 1900 backup.exe 41 PID 1900 wrote to memory of 328 1900 backup.exe 41 PID 328 wrote to memory of 1144 328 backup.exe 42 PID 328 wrote to memory of 1144 328 backup.exe 42 PID 328 wrote to memory of 1144 328 backup.exe 42 PID 328 wrote to memory of 1144 328 backup.exe 42 PID 576 wrote to memory of 956 576 b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe"C:\Users\Admin\AppData\Local\Temp\b9ecdf86fc08dc8dd2a8f56fe3cad6c42aabaee4e3388ce417f1cfcc82311a22.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:576 -
C:\Users\Admin\AppData\Local\Temp\4279663918\backup.exeC:\Users\Admin\AppData\Local\Temp\4279663918\backup.exe C:\Users\Admin\AppData\Local\Temp\4279663918\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1504 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1300 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1204 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1872
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:568 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1900 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:328 -
C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1144
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1388 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1124
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1756
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:1612
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2012
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2008
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1120
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1100 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:868
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:904
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\data.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\data.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:692
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1688
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1636 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1296 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:996
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Executes dropped EXE
PID:1100
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1636
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:1912
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1288 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1520
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
C:\Program Files\DVD Maker\fr-FR\System Restore.exe"C:\Program Files\DVD Maker\fr-FR\System Restore.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1592
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1752
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:632
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:108 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
PID:1228
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1668
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1124
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:796
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:428 -
C:\Program Files (x86)\Adobe\Reader 9.0\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
PID:808
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1652
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1708
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1232
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:428
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1396 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Executes dropped EXE
PID:1568
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Users\Admin\Downloads\System Restore.exe"C:\Users\Admin\Downloads\System Restore.exe" C:\Users\Admin\Downloads\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:956
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:836
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
PID:1632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5a038bd1ff98d111b822293bdfada5ffc
SHA1069c43b58952f0f6691b39daeb22c9e138d88bae
SHA2563b8af35dd9e15cd49d124b14a92a60cfe562835ff963cc32afdfbd5dd405e730
SHA512c90b9bc8ca75715c7b420c78047ccc7e13c4720c5400124d38b078b3c1ba0bbf06c9f904d166f013d5822798132ac496b4f8775d294b72a3f31c6c8d84970208
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD519ecb541e3064b6a87be8f5e49d22df9
SHA1d8d4c3a61abf37018a9aff968c449fd23c0b2fcf
SHA256f459c2103ca23ba314309d0521b930115b5d20352dd85b3a51bc4a2f236cf21b
SHA5129f4205b0282a9091c66b159afd89983102fd0dad00ac6562c7d1bee955992674fdaa91b2a5432665a251510ab2d394ea452a96ab1563ea2d1ff4a1d22bd548b3
-
Filesize
72KB
MD5a038bd1ff98d111b822293bdfada5ffc
SHA1069c43b58952f0f6691b39daeb22c9e138d88bae
SHA2563b8af35dd9e15cd49d124b14a92a60cfe562835ff963cc32afdfbd5dd405e730
SHA512c90b9bc8ca75715c7b420c78047ccc7e13c4720c5400124d38b078b3c1ba0bbf06c9f904d166f013d5822798132ac496b4f8775d294b72a3f31c6c8d84970208
-
Filesize
72KB
MD5a038bd1ff98d111b822293bdfada5ffc
SHA1069c43b58952f0f6691b39daeb22c9e138d88bae
SHA2563b8af35dd9e15cd49d124b14a92a60cfe562835ff963cc32afdfbd5dd405e730
SHA512c90b9bc8ca75715c7b420c78047ccc7e13c4720c5400124d38b078b3c1ba0bbf06c9f904d166f013d5822798132ac496b4f8775d294b72a3f31c6c8d84970208
-
Filesize
72KB
MD5ee7efa96aa34fdb8c6b3ff721379a3f1
SHA1cec21b3bca73f4f88b618b27743db94be76b71cf
SHA25679f377a064fe44fde1a07d2ae57e13fd3a35c792c81149bbf17d884781bc3beb
SHA5122160efed2672b9d13b312cc4a9e174c49537bc906e5f41cd3d9ad55f9dcc6569e48cfde5ea379afa9aa2f579a221d312cf8f1f3e174ab158a25085ce69780718
-
Filesize
72KB
MD5df2c7bffcc87aa035c74de870fa7b593
SHA16ed617480bc4ae6a2f88b00468b402c0750dd30f
SHA256dd8fc58fc490c2b4f18cefa5e731a5e43f7218f3860cc6ac6dd532c37c37c821
SHA512569d32d0a2f7a731d8854399d50bda5ac2d153841e988902179c69dbbedcd62cce763d20c90dcfad331254f2f9d0a8fd8b8e166908aeb849194f0c8db5d197d8
-
Filesize
72KB
MD5df2c7bffcc87aa035c74de870fa7b593
SHA16ed617480bc4ae6a2f88b00468b402c0750dd30f
SHA256dd8fc58fc490c2b4f18cefa5e731a5e43f7218f3860cc6ac6dd532c37c37c821
SHA512569d32d0a2f7a731d8854399d50bda5ac2d153841e988902179c69dbbedcd62cce763d20c90dcfad331254f2f9d0a8fd8b8e166908aeb849194f0c8db5d197d8
-
Filesize
72KB
MD5752cdb752268b58c8809b1bfc7407356
SHA15450770e24fa2132f39af1e0554d837bd3bfd117
SHA2566da33d5dbdb1f46f96308a42071d16c8b92e5ed0d288d517ddc5bd271e7af7a0
SHA5122eed475fa953058e3ec9d04fd73342eadc0b1dbfff4b39a1cb45145ea327107b27175300c16f36f1ea7664ca8d2285b5b0fa73a07412dc2a8e0e77279ac49f0d
-
Filesize
72KB
MD5ee7efa96aa34fdb8c6b3ff721379a3f1
SHA1cec21b3bca73f4f88b618b27743db94be76b71cf
SHA25679f377a064fe44fde1a07d2ae57e13fd3a35c792c81149bbf17d884781bc3beb
SHA5122160efed2672b9d13b312cc4a9e174c49537bc906e5f41cd3d9ad55f9dcc6569e48cfde5ea379afa9aa2f579a221d312cf8f1f3e174ab158a25085ce69780718
-
Filesize
72KB
MD5ee7efa96aa34fdb8c6b3ff721379a3f1
SHA1cec21b3bca73f4f88b618b27743db94be76b71cf
SHA25679f377a064fe44fde1a07d2ae57e13fd3a35c792c81149bbf17d884781bc3beb
SHA5122160efed2672b9d13b312cc4a9e174c49537bc906e5f41cd3d9ad55f9dcc6569e48cfde5ea379afa9aa2f579a221d312cf8f1f3e174ab158a25085ce69780718
-
Filesize
72KB
MD5e0ac6d124886647ed618440fbd0812c5
SHA136f2d3933ae9a2b490cb9da57a60fbad3a9d9308
SHA2567bf5ab4414cfb844fb261f9dd5e405dca475b131565d374216202b04af59a149
SHA5128dce34c83b5376464ac4883445ca60d770be5158df7fbbd67798c875772157b91dda8f33437fd0ea3f92926cb968b1409046007df23850b06ffebe6151289a94
-
Filesize
72KB
MD5e0ac6d124886647ed618440fbd0812c5
SHA136f2d3933ae9a2b490cb9da57a60fbad3a9d9308
SHA2567bf5ab4414cfb844fb261f9dd5e405dca475b131565d374216202b04af59a149
SHA5128dce34c83b5376464ac4883445ca60d770be5158df7fbbd67798c875772157b91dda8f33437fd0ea3f92926cb968b1409046007df23850b06ffebe6151289a94
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD565605fcb4a40e28c023188864af0aa53
SHA13223bdbc08fbf3979e4988bc70785108be106d7f
SHA256485ca1128a62bf32956e40dccea6d7b9e44ffa0b7d68c69079e05f158b1fe174
SHA512770ebfc94d90d07642c7dd8a5db9c12765e2abf17b52bfc6fc16fd59727ba6f02832ef2f261d4bedb2588597971253e069e8fd7650a78b86096d318403a0f0c5
-
Filesize
72KB
MD565605fcb4a40e28c023188864af0aa53
SHA13223bdbc08fbf3979e4988bc70785108be106d7f
SHA256485ca1128a62bf32956e40dccea6d7b9e44ffa0b7d68c69079e05f158b1fe174
SHA512770ebfc94d90d07642c7dd8a5db9c12765e2abf17b52bfc6fc16fd59727ba6f02832ef2f261d4bedb2588597971253e069e8fd7650a78b86096d318403a0f0c5
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD5ffd43449db0acb5d81266eef12322ebf
SHA1d67bdcb4d974d1a65d0cf7e1e5d41c2ce1356617
SHA256a3b1d6482bdadd652923164eafc201ad1da8f4b95b48032e540e5614c7fc1d25
SHA512c538f6ebe259f49ab91a472a308312592286c8894f1fc2ef99a578125046e6febbb9d1902f5a264155e2d158a1762c1ade6964a678eb2bfeb40e268fb6a7f528
-
Filesize
72KB
MD565605fcb4a40e28c023188864af0aa53
SHA13223bdbc08fbf3979e4988bc70785108be106d7f
SHA256485ca1128a62bf32956e40dccea6d7b9e44ffa0b7d68c69079e05f158b1fe174
SHA512770ebfc94d90d07642c7dd8a5db9c12765e2abf17b52bfc6fc16fd59727ba6f02832ef2f261d4bedb2588597971253e069e8fd7650a78b86096d318403a0f0c5
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD5086dba95ded1584c3616c79a2010eccd
SHA1d8f1eaee52840a293b1efaebb90b36397c56f8a8
SHA256e16bdc4ff9c848413797fd4614392e84985dbc17da94c1b2dc524b0fdb664407
SHA512c8a4ee6637e0d94b098abc5adf02a7637912c9d1fc11a5b005cc88746e89b774953df5e2449fc1fdfa62f477e5d5e24e9d130729e7e1e2cfb000cd868252a657
-
Filesize
72KB
MD5086dba95ded1584c3616c79a2010eccd
SHA1d8f1eaee52840a293b1efaebb90b36397c56f8a8
SHA256e16bdc4ff9c848413797fd4614392e84985dbc17da94c1b2dc524b0fdb664407
SHA512c8a4ee6637e0d94b098abc5adf02a7637912c9d1fc11a5b005cc88746e89b774953df5e2449fc1fdfa62f477e5d5e24e9d130729e7e1e2cfb000cd868252a657
-
Filesize
72KB
MD5a038bd1ff98d111b822293bdfada5ffc
SHA1069c43b58952f0f6691b39daeb22c9e138d88bae
SHA2563b8af35dd9e15cd49d124b14a92a60cfe562835ff963cc32afdfbd5dd405e730
SHA512c90b9bc8ca75715c7b420c78047ccc7e13c4720c5400124d38b078b3c1ba0bbf06c9f904d166f013d5822798132ac496b4f8775d294b72a3f31c6c8d84970208
-
Filesize
72KB
MD5a038bd1ff98d111b822293bdfada5ffc
SHA1069c43b58952f0f6691b39daeb22c9e138d88bae
SHA2563b8af35dd9e15cd49d124b14a92a60cfe562835ff963cc32afdfbd5dd405e730
SHA512c90b9bc8ca75715c7b420c78047ccc7e13c4720c5400124d38b078b3c1ba0bbf06c9f904d166f013d5822798132ac496b4f8775d294b72a3f31c6c8d84970208
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD519ecb541e3064b6a87be8f5e49d22df9
SHA1d8d4c3a61abf37018a9aff968c449fd23c0b2fcf
SHA256f459c2103ca23ba314309d0521b930115b5d20352dd85b3a51bc4a2f236cf21b
SHA5129f4205b0282a9091c66b159afd89983102fd0dad00ac6562c7d1bee955992674fdaa91b2a5432665a251510ab2d394ea452a96ab1563ea2d1ff4a1d22bd548b3
-
Filesize
72KB
MD519ecb541e3064b6a87be8f5e49d22df9
SHA1d8d4c3a61abf37018a9aff968c449fd23c0b2fcf
SHA256f459c2103ca23ba314309d0521b930115b5d20352dd85b3a51bc4a2f236cf21b
SHA5129f4205b0282a9091c66b159afd89983102fd0dad00ac6562c7d1bee955992674fdaa91b2a5432665a251510ab2d394ea452a96ab1563ea2d1ff4a1d22bd548b3
-
Filesize
72KB
MD5a038bd1ff98d111b822293bdfada5ffc
SHA1069c43b58952f0f6691b39daeb22c9e138d88bae
SHA2563b8af35dd9e15cd49d124b14a92a60cfe562835ff963cc32afdfbd5dd405e730
SHA512c90b9bc8ca75715c7b420c78047ccc7e13c4720c5400124d38b078b3c1ba0bbf06c9f904d166f013d5822798132ac496b4f8775d294b72a3f31c6c8d84970208
-
Filesize
72KB
MD5a038bd1ff98d111b822293bdfada5ffc
SHA1069c43b58952f0f6691b39daeb22c9e138d88bae
SHA2563b8af35dd9e15cd49d124b14a92a60cfe562835ff963cc32afdfbd5dd405e730
SHA512c90b9bc8ca75715c7b420c78047ccc7e13c4720c5400124d38b078b3c1ba0bbf06c9f904d166f013d5822798132ac496b4f8775d294b72a3f31c6c8d84970208
-
Filesize
72KB
MD5ee7efa96aa34fdb8c6b3ff721379a3f1
SHA1cec21b3bca73f4f88b618b27743db94be76b71cf
SHA25679f377a064fe44fde1a07d2ae57e13fd3a35c792c81149bbf17d884781bc3beb
SHA5122160efed2672b9d13b312cc4a9e174c49537bc906e5f41cd3d9ad55f9dcc6569e48cfde5ea379afa9aa2f579a221d312cf8f1f3e174ab158a25085ce69780718
-
Filesize
72KB
MD5ee7efa96aa34fdb8c6b3ff721379a3f1
SHA1cec21b3bca73f4f88b618b27743db94be76b71cf
SHA25679f377a064fe44fde1a07d2ae57e13fd3a35c792c81149bbf17d884781bc3beb
SHA5122160efed2672b9d13b312cc4a9e174c49537bc906e5f41cd3d9ad55f9dcc6569e48cfde5ea379afa9aa2f579a221d312cf8f1f3e174ab158a25085ce69780718
-
Filesize
72KB
MD5df2c7bffcc87aa035c74de870fa7b593
SHA16ed617480bc4ae6a2f88b00468b402c0750dd30f
SHA256dd8fc58fc490c2b4f18cefa5e731a5e43f7218f3860cc6ac6dd532c37c37c821
SHA512569d32d0a2f7a731d8854399d50bda5ac2d153841e988902179c69dbbedcd62cce763d20c90dcfad331254f2f9d0a8fd8b8e166908aeb849194f0c8db5d197d8
-
Filesize
72KB
MD5df2c7bffcc87aa035c74de870fa7b593
SHA16ed617480bc4ae6a2f88b00468b402c0750dd30f
SHA256dd8fc58fc490c2b4f18cefa5e731a5e43f7218f3860cc6ac6dd532c37c37c821
SHA512569d32d0a2f7a731d8854399d50bda5ac2d153841e988902179c69dbbedcd62cce763d20c90dcfad331254f2f9d0a8fd8b8e166908aeb849194f0c8db5d197d8
-
Filesize
72KB
MD5752cdb752268b58c8809b1bfc7407356
SHA15450770e24fa2132f39af1e0554d837bd3bfd117
SHA2566da33d5dbdb1f46f96308a42071d16c8b92e5ed0d288d517ddc5bd271e7af7a0
SHA5122eed475fa953058e3ec9d04fd73342eadc0b1dbfff4b39a1cb45145ea327107b27175300c16f36f1ea7664ca8d2285b5b0fa73a07412dc2a8e0e77279ac49f0d
-
Filesize
72KB
MD5752cdb752268b58c8809b1bfc7407356
SHA15450770e24fa2132f39af1e0554d837bd3bfd117
SHA2566da33d5dbdb1f46f96308a42071d16c8b92e5ed0d288d517ddc5bd271e7af7a0
SHA5122eed475fa953058e3ec9d04fd73342eadc0b1dbfff4b39a1cb45145ea327107b27175300c16f36f1ea7664ca8d2285b5b0fa73a07412dc2a8e0e77279ac49f0d
-
Filesize
72KB
MD5ee7efa96aa34fdb8c6b3ff721379a3f1
SHA1cec21b3bca73f4f88b618b27743db94be76b71cf
SHA25679f377a064fe44fde1a07d2ae57e13fd3a35c792c81149bbf17d884781bc3beb
SHA5122160efed2672b9d13b312cc4a9e174c49537bc906e5f41cd3d9ad55f9dcc6569e48cfde5ea379afa9aa2f579a221d312cf8f1f3e174ab158a25085ce69780718
-
Filesize
72KB
MD5ee7efa96aa34fdb8c6b3ff721379a3f1
SHA1cec21b3bca73f4f88b618b27743db94be76b71cf
SHA25679f377a064fe44fde1a07d2ae57e13fd3a35c792c81149bbf17d884781bc3beb
SHA5122160efed2672b9d13b312cc4a9e174c49537bc906e5f41cd3d9ad55f9dcc6569e48cfde5ea379afa9aa2f579a221d312cf8f1f3e174ab158a25085ce69780718
-
Filesize
72KB
MD5752cdb752268b58c8809b1bfc7407356
SHA15450770e24fa2132f39af1e0554d837bd3bfd117
SHA2566da33d5dbdb1f46f96308a42071d16c8b92e5ed0d288d517ddc5bd271e7af7a0
SHA5122eed475fa953058e3ec9d04fd73342eadc0b1dbfff4b39a1cb45145ea327107b27175300c16f36f1ea7664ca8d2285b5b0fa73a07412dc2a8e0e77279ac49f0d
-
Filesize
72KB
MD5e0ac6d124886647ed618440fbd0812c5
SHA136f2d3933ae9a2b490cb9da57a60fbad3a9d9308
SHA2567bf5ab4414cfb844fb261f9dd5e405dca475b131565d374216202b04af59a149
SHA5128dce34c83b5376464ac4883445ca60d770be5158df7fbbd67798c875772157b91dda8f33437fd0ea3f92926cb968b1409046007df23850b06ffebe6151289a94
-
Filesize
72KB
MD5e0ac6d124886647ed618440fbd0812c5
SHA136f2d3933ae9a2b490cb9da57a60fbad3a9d9308
SHA2567bf5ab4414cfb844fb261f9dd5e405dca475b131565d374216202b04af59a149
SHA5128dce34c83b5376464ac4883445ca60d770be5158df7fbbd67798c875772157b91dda8f33437fd0ea3f92926cb968b1409046007df23850b06ffebe6151289a94
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD5ca2751fecd8732bda16b0abc121807dc
SHA15c32eab0629369f89575d5b51ae357feee36aae8
SHA256af46c3d22c9e45fbbc373b87957a64c3ea8a7037c6e1401942ed68e7da7860c0
SHA51280e8dfa5f1c20c25c5e5b80ba0337efc26c7919b5df7011bf842c938cf54d9af9a20a58fc90b2f100a4a364a0e7fa786dbff84c5f26a0f7619620ef88e09d706
-
Filesize
72KB
MD565605fcb4a40e28c023188864af0aa53
SHA13223bdbc08fbf3979e4988bc70785108be106d7f
SHA256485ca1128a62bf32956e40dccea6d7b9e44ffa0b7d68c69079e05f158b1fe174
SHA512770ebfc94d90d07642c7dd8a5db9c12765e2abf17b52bfc6fc16fd59727ba6f02832ef2f261d4bedb2588597971253e069e8fd7650a78b86096d318403a0f0c5
-
Filesize
72KB
MD565605fcb4a40e28c023188864af0aa53
SHA13223bdbc08fbf3979e4988bc70785108be106d7f
SHA256485ca1128a62bf32956e40dccea6d7b9e44ffa0b7d68c69079e05f158b1fe174
SHA512770ebfc94d90d07642c7dd8a5db9c12765e2abf17b52bfc6fc16fd59727ba6f02832ef2f261d4bedb2588597971253e069e8fd7650a78b86096d318403a0f0c5
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD5ffd43449db0acb5d81266eef12322ebf
SHA1d67bdcb4d974d1a65d0cf7e1e5d41c2ce1356617
SHA256a3b1d6482bdadd652923164eafc201ad1da8f4b95b48032e540e5614c7fc1d25
SHA512c538f6ebe259f49ab91a472a308312592286c8894f1fc2ef99a578125046e6febbb9d1902f5a264155e2d158a1762c1ade6964a678eb2bfeb40e268fb6a7f528
-
Filesize
72KB
MD5ffd43449db0acb5d81266eef12322ebf
SHA1d67bdcb4d974d1a65d0cf7e1e5d41c2ce1356617
SHA256a3b1d6482bdadd652923164eafc201ad1da8f4b95b48032e540e5614c7fc1d25
SHA512c538f6ebe259f49ab91a472a308312592286c8894f1fc2ef99a578125046e6febbb9d1902f5a264155e2d158a1762c1ade6964a678eb2bfeb40e268fb6a7f528
-
Filesize
72KB
MD565605fcb4a40e28c023188864af0aa53
SHA13223bdbc08fbf3979e4988bc70785108be106d7f
SHA256485ca1128a62bf32956e40dccea6d7b9e44ffa0b7d68c69079e05f158b1fe174
SHA512770ebfc94d90d07642c7dd8a5db9c12765e2abf17b52bfc6fc16fd59727ba6f02832ef2f261d4bedb2588597971253e069e8fd7650a78b86096d318403a0f0c5
-
Filesize
72KB
MD565605fcb4a40e28c023188864af0aa53
SHA13223bdbc08fbf3979e4988bc70785108be106d7f
SHA256485ca1128a62bf32956e40dccea6d7b9e44ffa0b7d68c69079e05f158b1fe174
SHA512770ebfc94d90d07642c7dd8a5db9c12765e2abf17b52bfc6fc16fd59727ba6f02832ef2f261d4bedb2588597971253e069e8fd7650a78b86096d318403a0f0c5
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0
-
Filesize
72KB
MD55f145f84cd7438df46dcfac7771313b2
SHA16e4f0dac01bd52c442a415ac8825e10b96802e8b
SHA256f619a83e775d115f78dce0ffbc2d3bfbee17bc36c02b1c1d900f6e9f7439152f
SHA5126f3517244e104d2b8106e0cc6dbfe0abdd3059e40cfba85ba047da90e4a6e7fa524a51767b6d80aafef95b5108a98307093cc452c58606571043925b45d506a0