Analysis
-
max time kernel
53s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 00:36
Static task
static1
Behavioral task
behavioral1
Sample
7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe
Resource
win10v2004-20220812-en
General
-
Target
7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe
-
Size
72KB
-
MD5
0d4a5c01d0c1971911192af1816bd7f3
-
SHA1
ad59fc2c9fec9aafb1c15f474078985c46fbd61a
-
SHA256
7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c
-
SHA512
28e3f5f8a128960366fa8173370bbf9b00670455de27bc07d0f59666cae0853b0ff383cb65f585713e3fd7a8c85d2d2d9e895464ed5d1b291b42a13434e7aba6
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2K:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrm
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 48 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 53 IoCs
pid Process 1600 backup.exe 1684 backup.exe 628 backup.exe 956 backup.exe 1784 backup.exe 564 backup.exe 872 backup.exe 1032 backup.exe 972 backup.exe 1508 backup.exe 1132 backup.exe 528 backup.exe 1804 backup.exe 1396 backup.exe 2024 update.exe 1832 backup.exe 1532 backup.exe 584 backup.exe 952 data.exe 1552 backup.exe 2004 update.exe 1688 backup.exe 1368 backup.exe 1616 backup.exe 1212 backup.exe 1168 backup.exe 1120 backup.exe 1324 backup.exe 608 backup.exe 1304 backup.exe 796 backup.exe 1112 backup.exe 2028 update.exe 1100 backup.exe 1700 backup.exe 700 backup.exe 1492 backup.exe 964 backup.exe 1384 backup.exe 592 backup.exe 788 backup.exe 1128 backup.exe 268 backup.exe 2004 backup.exe 1696 backup.exe 1988 backup.exe 1368 System Restore.exe 2012 backup.exe 960 backup.exe 108 backup.exe 972 backup.exe 1408 backup.exe 1656 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1032 backup.exe 1032 backup.exe 972 backup.exe 972 backup.exe 1032 backup.exe 1032 backup.exe 1132 backup.exe 1132 backup.exe 528 backup.exe 528 backup.exe 1132 backup.exe 1132 backup.exe 1396 backup.exe 2024 update.exe 2024 update.exe 2024 update.exe 2024 update.exe 2024 update.exe 1832 backup.exe 1832 backup.exe 1832 backup.exe 2024 update.exe 2024 update.exe 1532 backup.exe 1532 backup.exe 1532 backup.exe 1532 backup.exe 1532 backup.exe 584 backup.exe 584 backup.exe 584 backup.exe 1532 backup.exe 1532 backup.exe 952 data.exe 952 data.exe 952 data.exe 1532 backup.exe 1532 backup.exe 1552 backup.exe 1552 backup.exe 1552 backup.exe 1532 backup.exe 2004 update.exe 2004 update.exe 2004 update.exe 1532 backup.exe 1532 backup.exe 1688 backup.exe 1688 backup.exe 1688 backup.exe -
Drops file in Program Files directory 44 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe -
Suspicious use of SetWindowsHookEx 51 IoCs
pid Process 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 1600 backup.exe 1684 backup.exe 628 backup.exe 956 backup.exe 1784 backup.exe 564 backup.exe 872 backup.exe 1032 backup.exe 972 backup.exe 1508 backup.exe 1132 backup.exe 528 backup.exe 1804 backup.exe 1396 backup.exe 2024 update.exe 1832 backup.exe 1532 backup.exe 584 backup.exe 952 data.exe 1552 backup.exe 2004 update.exe 1688 backup.exe 1368 backup.exe 1616 backup.exe 1212 backup.exe 1168 backup.exe 1120 backup.exe 1324 backup.exe 608 backup.exe 1304 backup.exe 796 backup.exe 2028 update.exe 1112 backup.exe 1100 backup.exe 1700 backup.exe 700 backup.exe 964 backup.exe 1492 backup.exe 1384 backup.exe 1128 backup.exe 268 backup.exe 592 backup.exe 788 backup.exe 1696 backup.exe 2004 backup.exe 1988 backup.exe 960 backup.exe 1368 System Restore.exe 108 backup.exe 1408 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1600 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 28 PID 1808 wrote to memory of 1600 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 28 PID 1808 wrote to memory of 1600 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 28 PID 1808 wrote to memory of 1600 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 28 PID 1808 wrote to memory of 1684 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 29 PID 1808 wrote to memory of 1684 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 29 PID 1808 wrote to memory of 1684 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 29 PID 1808 wrote to memory of 1684 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 29 PID 1808 wrote to memory of 628 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 30 PID 1808 wrote to memory of 628 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 30 PID 1808 wrote to memory of 628 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 30 PID 1808 wrote to memory of 628 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 30 PID 1808 wrote to memory of 956 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 31 PID 1808 wrote to memory of 956 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 31 PID 1808 wrote to memory of 956 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 31 PID 1808 wrote to memory of 956 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 31 PID 1808 wrote to memory of 1784 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 32 PID 1808 wrote to memory of 1784 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 32 PID 1808 wrote to memory of 1784 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 32 PID 1808 wrote to memory of 1784 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 32 PID 1808 wrote to memory of 564 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 33 PID 1808 wrote to memory of 564 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 33 PID 1808 wrote to memory of 564 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 33 PID 1808 wrote to memory of 564 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 33 PID 1808 wrote to memory of 872 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 34 PID 1808 wrote to memory of 872 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 34 PID 1808 wrote to memory of 872 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 34 PID 1808 wrote to memory of 872 1808 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe 34 PID 1600 wrote to memory of 1032 1600 backup.exe 35 PID 1600 wrote to memory of 1032 1600 backup.exe 35 PID 1600 wrote to memory of 1032 1600 backup.exe 35 PID 1600 wrote to memory of 1032 1600 backup.exe 35 PID 1032 wrote to memory of 972 1032 backup.exe 36 PID 1032 wrote to memory of 972 1032 backup.exe 36 PID 1032 wrote to memory of 972 1032 backup.exe 36 PID 1032 wrote to memory of 972 1032 backup.exe 36 PID 972 wrote to memory of 1508 972 backup.exe 37 PID 972 wrote to memory of 1508 972 backup.exe 37 PID 972 wrote to memory of 1508 972 backup.exe 37 PID 972 wrote to memory of 1508 972 backup.exe 37 PID 1032 wrote to memory of 1132 1032 backup.exe 38 PID 1032 wrote to memory of 1132 1032 backup.exe 38 PID 1032 wrote to memory of 1132 1032 backup.exe 38 PID 1032 wrote to memory of 1132 1032 backup.exe 38 PID 1132 wrote to memory of 528 1132 backup.exe 39 PID 1132 wrote to memory of 528 1132 backup.exe 39 PID 1132 wrote to memory of 528 1132 backup.exe 39 PID 1132 wrote to memory of 528 1132 backup.exe 39 PID 528 wrote to memory of 1804 528 backup.exe 40 PID 528 wrote to memory of 1804 528 backup.exe 40 PID 528 wrote to memory of 1804 528 backup.exe 40 PID 528 wrote to memory of 1804 528 backup.exe 40 PID 1132 wrote to memory of 1396 1132 backup.exe 41 PID 1132 wrote to memory of 1396 1132 backup.exe 41 PID 1132 wrote to memory of 1396 1132 backup.exe 41 PID 1132 wrote to memory of 1396 1132 backup.exe 41 PID 1396 wrote to memory of 2024 1396 backup.exe 42 PID 1396 wrote to memory of 2024 1396 backup.exe 42 PID 1396 wrote to memory of 2024 1396 backup.exe 42 PID 1396 wrote to memory of 2024 1396 backup.exe 42 PID 1396 wrote to memory of 2024 1396 backup.exe 42 PID 1396 wrote to memory of 2024 1396 backup.exe 42 PID 1396 wrote to memory of 2024 1396 backup.exe 42 PID 2024 wrote to memory of 1832 2024 update.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe"C:\Users\Admin\AppData\Local\Temp\7f84a774add3704ebd1e812a042e5cf5cba603518bf638d28463c0e723aac48c.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\347601064\backup.exeC:\Users\Admin\AppData\Local\Temp\347601064\backup.exe C:\Users\Admin\AppData\Local\Temp\347601064\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1600 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1032 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:972 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1508
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1132 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:528 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1396 -
C:\Program Files\Common Files\Microsoft Shared\update.exe"C:\Program Files\Common Files\Microsoft Shared\update.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2024 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1552
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1368
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Executes dropped EXE
PID:1304
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:788
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
PID:972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵PID:2036
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵PID:752
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:1688
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1604
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1684
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Drops file in Program Files directory
PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:1032
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:608 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:1112
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2004
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:108
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:364
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1492
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:932
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1612
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1324
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:796 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2028
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1696
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Executes dropped EXE
PID:2012
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:952
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1712
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1764
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1724
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1036
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1672
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1648
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1372
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:1708
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1100
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵PID:1384
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1368
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Executes dropped EXE
PID:1656
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1760
-
-
C:\Program Files\DVD Maker\Shared\System Restore.exe"C:\Program Files\DVD Maker\Shared\System Restore.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1832
-
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:1480
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:1652
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:1388
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵PID:1540
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵PID:1756
-
-
-
-
-
C:\Program Files\Google\System Restore.exe"C:\Program Files\Google\System Restore.exe" C:\Program Files\Google\5⤵PID:544
-
C:\Program Files\Google\Chrome\System Restore.exe"C:\Program Files\Google\Chrome\System Restore.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1464
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1112
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1268
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1512
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1616
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1168 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:592 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵PID:960
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1112
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:1380
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:808
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵PID:1528
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Drops file in Program Files directory
PID:2028
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1976
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:956
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1740
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1628
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:684
-
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1568
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1576
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:2008
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1416
-
-
-
C:\Program Files (x86)\Google\System Restore.exe"C:\Program Files (x86)\Google\System Restore.exe" C:\Program Files (x86)\Google\5⤵PID:1324
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:336
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1784
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:824
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5905f3bd410f8edbba0eaddc976a46fc3
SHA1b57b67ca522c5fb8bb8001eaca96277d10f993f7
SHA2567659ecb96a27017ca74207129773561023e877ff199c2c33fcf07c7310253938
SHA5129250fe109ecaffd05b7d514d6a606988cf5b808f49ecaef8ba9a225bdad5367273dbc239250f56ef6e651d191dbabc9f61d367b5ea844eef92ff9d9f8242dd89
-
Filesize
72KB
MD52096f6450d8b75ea7d8b9cc0dcf9aa23
SHA16fe8d991bf6f53699a76d8c33f9be053bc0d4be7
SHA25600093357bbda159286cd9decba0e5c94f3f3e9519900bb8a32c34b3cd0ef4b02
SHA512b7935fc456aa0c681c83196026aaa4cdc4a7abd9851a2d541a34931a1262d085a44e368f031525a6acdb6fc39d1969d15637a43ded201b88afd2fec1c2d57b42
-
Filesize
72KB
MD52096f6450d8b75ea7d8b9cc0dcf9aa23
SHA16fe8d991bf6f53699a76d8c33f9be053bc0d4be7
SHA25600093357bbda159286cd9decba0e5c94f3f3e9519900bb8a32c34b3cd0ef4b02
SHA512b7935fc456aa0c681c83196026aaa4cdc4a7abd9851a2d541a34931a1262d085a44e368f031525a6acdb6fc39d1969d15637a43ded201b88afd2fec1c2d57b42
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD5a823269bdbd67c88cdd31e86b136611b
SHA13fd8322272c77f07bf346b9f08f5c2132e019f77
SHA2565e3b78774a3c0ab65de427c4f2a7a2a570b7ea8c35567e1b601f094717f6ca48
SHA5125655df20d7caf703c2a5e8d5929281d193c938a60e225a544ce69dd82d880f53bf441a609025c28ef230ea123fd989005eefef27773e4dd51b6b4563f09f9d93
-
Filesize
72KB
MD5a823269bdbd67c88cdd31e86b136611b
SHA13fd8322272c77f07bf346b9f08f5c2132e019f77
SHA2565e3b78774a3c0ab65de427c4f2a7a2a570b7ea8c35567e1b601f094717f6ca48
SHA5125655df20d7caf703c2a5e8d5929281d193c938a60e225a544ce69dd82d880f53bf441a609025c28ef230ea123fd989005eefef27773e4dd51b6b4563f09f9d93
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5877c57c7f8d4dc309b8eab5c72ef9634
SHA1c098641265db10253c17479ff5f024800115eae3
SHA256635048a424e131392edf1c57ae8ebe0d7ff390683b972805c3a1e93234398946
SHA512113d026f6cb0c29ab3b2be784d47f8e629b5d963ff139ddb5df549964e9045518afb3726fe3d53cc36b88b6621dde99d7b3dc646b25028fb1f0a2bf80c0a86fb
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5249840d7c101ceedeaa23c7ddb0e958f
SHA106cf2e31d8d169c420b2214e1d69491e36b8c18c
SHA256d457ac21c0a502ec68f6576b229d04aecb8d4dbdc2078f681745449ec7cc51da
SHA512d586cfa799f3d1c976d39f58657792d598102e8c5107d7d4a3fdc1b44e4af8cd2f130820eaa32c59b07b8b3a456a5364a2332be697803f7b07f038930210f088
-
Filesize
72KB
MD5249840d7c101ceedeaa23c7ddb0e958f
SHA106cf2e31d8d169c420b2214e1d69491e36b8c18c
SHA256d457ac21c0a502ec68f6576b229d04aecb8d4dbdc2078f681745449ec7cc51da
SHA512d586cfa799f3d1c976d39f58657792d598102e8c5107d7d4a3fdc1b44e4af8cd2f130820eaa32c59b07b8b3a456a5364a2332be697803f7b07f038930210f088
-
Filesize
72KB
MD5905f3bd410f8edbba0eaddc976a46fc3
SHA1b57b67ca522c5fb8bb8001eaca96277d10f993f7
SHA2567659ecb96a27017ca74207129773561023e877ff199c2c33fcf07c7310253938
SHA5129250fe109ecaffd05b7d514d6a606988cf5b808f49ecaef8ba9a225bdad5367273dbc239250f56ef6e651d191dbabc9f61d367b5ea844eef92ff9d9f8242dd89
-
Filesize
72KB
MD5905f3bd410f8edbba0eaddc976a46fc3
SHA1b57b67ca522c5fb8bb8001eaca96277d10f993f7
SHA2567659ecb96a27017ca74207129773561023e877ff199c2c33fcf07c7310253938
SHA5129250fe109ecaffd05b7d514d6a606988cf5b808f49ecaef8ba9a225bdad5367273dbc239250f56ef6e651d191dbabc9f61d367b5ea844eef92ff9d9f8242dd89
-
Filesize
72KB
MD52096f6450d8b75ea7d8b9cc0dcf9aa23
SHA16fe8d991bf6f53699a76d8c33f9be053bc0d4be7
SHA25600093357bbda159286cd9decba0e5c94f3f3e9519900bb8a32c34b3cd0ef4b02
SHA512b7935fc456aa0c681c83196026aaa4cdc4a7abd9851a2d541a34931a1262d085a44e368f031525a6acdb6fc39d1969d15637a43ded201b88afd2fec1c2d57b42
-
Filesize
72KB
MD52096f6450d8b75ea7d8b9cc0dcf9aa23
SHA16fe8d991bf6f53699a76d8c33f9be053bc0d4be7
SHA25600093357bbda159286cd9decba0e5c94f3f3e9519900bb8a32c34b3cd0ef4b02
SHA512b7935fc456aa0c681c83196026aaa4cdc4a7abd9851a2d541a34931a1262d085a44e368f031525a6acdb6fc39d1969d15637a43ded201b88afd2fec1c2d57b42
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD58bcbc5e796e68094a8fc531b68f018ba
SHA14d8d3bbda834993d0d2be066712e373a1d359516
SHA256d044c21bf63cdd4093743dbbcd8a7c60c6f3d2e945652a7b2b0cbf777b94a57e
SHA5120b9ae27ce04d7f7d0a394b5c806ccdf6233ff1bfcafbddba9ca7d1fa4e6d9935ff9c7cbb8780b288ffe055d757a103dce55ef19b48b2abbc62437155c12fbb26
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD509e1250d7651a4007b0be08be09b0bb9
SHA15985152add69c39f76a3f2f33f7659a3a77689e1
SHA2560c5057cfa1cdae138ad878b770e6c996c50a08a57d5f105e79168bd388c37401
SHA5126017c3ebb0dd3ec6a5b365b6f77a92baa0b974501b75f061b1d25bf25f8700fe9e083b96ed8a967780090633713ef7e3658444f10e2c65782ce47c6b89ad6a41
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD58c2727eca65b7a786250fc46cbe29b77
SHA19f8a345064de8aa2155fc6391e816b1d1cfdf78d
SHA25602d86c5310ade59d9abc39f4ae3185ca9ba056ec6cd488bf3e978165258caafb
SHA512a6016aa00745a795cbb4ebab95f877f921ad680960ad18acb65cbce1c73317484ee366b5e8c305950c7d5146041f3ec0b96f48885f7cc651aecc7884e26923ac
-
Filesize
72KB
MD5a823269bdbd67c88cdd31e86b136611b
SHA13fd8322272c77f07bf346b9f08f5c2132e019f77
SHA2565e3b78774a3c0ab65de427c4f2a7a2a570b7ea8c35567e1b601f094717f6ca48
SHA5125655df20d7caf703c2a5e8d5929281d193c938a60e225a544ce69dd82d880f53bf441a609025c28ef230ea123fd989005eefef27773e4dd51b6b4563f09f9d93
-
Filesize
72KB
MD5a823269bdbd67c88cdd31e86b136611b
SHA13fd8322272c77f07bf346b9f08f5c2132e019f77
SHA2565e3b78774a3c0ab65de427c4f2a7a2a570b7ea8c35567e1b601f094717f6ca48
SHA5125655df20d7caf703c2a5e8d5929281d193c938a60e225a544ce69dd82d880f53bf441a609025c28ef230ea123fd989005eefef27773e4dd51b6b4563f09f9d93
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5877c57c7f8d4dc309b8eab5c72ef9634
SHA1c098641265db10253c17479ff5f024800115eae3
SHA256635048a424e131392edf1c57ae8ebe0d7ff390683b972805c3a1e93234398946
SHA512113d026f6cb0c29ab3b2be784d47f8e629b5d963ff139ddb5df549964e9045518afb3726fe3d53cc36b88b6621dde99d7b3dc646b25028fb1f0a2bf80c0a86fb
-
Filesize
72KB
MD5877c57c7f8d4dc309b8eab5c72ef9634
SHA1c098641265db10253c17479ff5f024800115eae3
SHA256635048a424e131392edf1c57ae8ebe0d7ff390683b972805c3a1e93234398946
SHA512113d026f6cb0c29ab3b2be784d47f8e629b5d963ff139ddb5df549964e9045518afb3726fe3d53cc36b88b6621dde99d7b3dc646b25028fb1f0a2bf80c0a86fb
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2
-
Filesize
72KB
MD5489d740a026a0676bee4d68b96ad47d4
SHA15e1c990254940f09cd31e912165a3b5142991769
SHA25645646b304d2788512f0570d8f793470ec14a34eb090d71d257d6a2eb6b9594c0
SHA5129719fe79c4e252e325b25adfa75e975fc0f8fc98add617e7bd014d8676021f1904aab4743b741c102e7a55654d217de54db0e7ddd1c5a9f1b889f4f3d01cdeb2