Analysis
-
max time kernel
156s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe
Resource
win10v2004-20221111-en
General
-
Target
a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe
-
Size
72KB
-
MD5
44cfa573f6647a2ed53902321541a3a0
-
SHA1
7d9eb9e1288acfd9afce41bfd5ee2870d9d29ce2
-
SHA256
a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f
-
SHA512
67a93ad05e744e77f3f645747aab5871324edee0f1c2f89af7830b4f4b9b9e75a88b635c9b3283a41b5cb29cc3abef9070dcbb6cd0238e0dae250548ebafd2e2
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2S:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1120 backup.exe 656 backup.exe 764 backup.exe 1436 backup.exe 1836 backup.exe 1352 backup.exe 1544 backup.exe 1596 backup.exe 676 backup.exe 1304 backup.exe 1496 backup.exe 1728 backup.exe 1548 backup.exe 2012 backup.exe 1824 backup.exe 804 backup.exe 1632 backup.exe 1960 backup.exe 320 backup.exe 944 backup.exe 828 backup.exe 1356 backup.exe 1436 backup.exe 1640 backup.exe 1812 backup.exe 1680 backup.exe 740 backup.exe 1544 backup.exe 1904 backup.exe 1916 backup.exe 1332 backup.exe 824 System Restore.exe 1844 backup.exe 1532 backup.exe 1668 backup.exe 1672 backup.exe 888 backup.exe 816 backup.exe 2036 backup.exe 836 backup.exe 308 backup.exe 1656 backup.exe 1608 System Restore.exe 852 backup.exe 1464 backup.exe 472 backup.exe 1152 backup.exe 1652 backup.exe 1540 backup.exe 632 backup.exe 1756 backup.exe 1568 backup.exe 548 backup.exe 1812 backup.exe 1640 backup.exe 1912 backup.exe 1984 backup.exe 300 backup.exe 1832 backup.exe 756 backup.exe 296 backup.exe 824 backup.exe 1728 backup.exe 1432 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1596 backup.exe 1596 backup.exe 676 backup.exe 676 backup.exe 1596 backup.exe 1596 backup.exe 1496 backup.exe 1496 backup.exe 1728 backup.exe 1728 backup.exe 1496 backup.exe 1496 backup.exe 2012 backup.exe 2012 backup.exe 1824 backup.exe 1824 backup.exe 1824 backup.exe 1824 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1632 backup.exe 1904 backup.exe 1904 backup.exe 1904 backup.exe 1904 backup.exe 1904 backup.exe 1904 backup.exe 1904 backup.exe 1904 backup.exe -
Drops file in Program Files directory 58 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\System Restore.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe -
Suspicious use of SetWindowsHookEx 62 IoCs
pid Process 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 1120 backup.exe 656 backup.exe 764 backup.exe 1436 backup.exe 1836 backup.exe 1352 backup.exe 1544 backup.exe 1596 backup.exe 676 backup.exe 1304 backup.exe 1496 backup.exe 1728 backup.exe 1548 backup.exe 2012 backup.exe 1824 backup.exe 804 backup.exe 1632 backup.exe 1960 backup.exe 320 backup.exe 944 backup.exe 828 backup.exe 1356 backup.exe 1436 backup.exe 1640 backup.exe 1812 backup.exe 1680 backup.exe 740 backup.exe 1544 backup.exe 1904 backup.exe 1916 backup.exe 1332 backup.exe 824 System Restore.exe 1844 backup.exe 1532 backup.exe 1668 backup.exe 888 backup.exe 1672 backup.exe 2036 backup.exe 816 backup.exe 836 backup.exe 308 backup.exe 1656 backup.exe 1464 backup.exe 1652 backup.exe 1152 backup.exe 1540 backup.exe 632 backup.exe 1756 backup.exe 1568 backup.exe 548 backup.exe 1640 backup.exe 1812 backup.exe 1912 backup.exe 300 backup.exe 1984 backup.exe 756 backup.exe 1832 backup.exe 296 backup.exe 824 backup.exe 1728 backup.exe 1432 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1120 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 27 PID 1140 wrote to memory of 1120 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 27 PID 1140 wrote to memory of 1120 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 27 PID 1140 wrote to memory of 1120 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 27 PID 1140 wrote to memory of 656 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 28 PID 1140 wrote to memory of 656 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 28 PID 1140 wrote to memory of 656 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 28 PID 1140 wrote to memory of 656 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 28 PID 1140 wrote to memory of 764 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 29 PID 1140 wrote to memory of 764 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 29 PID 1140 wrote to memory of 764 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 29 PID 1140 wrote to memory of 764 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 29 PID 1140 wrote to memory of 1436 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 30 PID 1140 wrote to memory of 1436 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 30 PID 1140 wrote to memory of 1436 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 30 PID 1140 wrote to memory of 1436 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 30 PID 1140 wrote to memory of 1836 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 31 PID 1140 wrote to memory of 1836 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 31 PID 1140 wrote to memory of 1836 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 31 PID 1140 wrote to memory of 1836 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 31 PID 1140 wrote to memory of 1352 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 32 PID 1140 wrote to memory of 1352 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 32 PID 1140 wrote to memory of 1352 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 32 PID 1140 wrote to memory of 1352 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 32 PID 1140 wrote to memory of 1544 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 33 PID 1140 wrote to memory of 1544 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 33 PID 1140 wrote to memory of 1544 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 33 PID 1140 wrote to memory of 1544 1140 a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe 33 PID 1120 wrote to memory of 1596 1120 backup.exe 34 PID 1120 wrote to memory of 1596 1120 backup.exe 34 PID 1120 wrote to memory of 1596 1120 backup.exe 34 PID 1120 wrote to memory of 1596 1120 backup.exe 34 PID 1596 wrote to memory of 676 1596 backup.exe 35 PID 1596 wrote to memory of 676 1596 backup.exe 35 PID 1596 wrote to memory of 676 1596 backup.exe 35 PID 1596 wrote to memory of 676 1596 backup.exe 35 PID 676 wrote to memory of 1304 676 backup.exe 36 PID 676 wrote to memory of 1304 676 backup.exe 36 PID 676 wrote to memory of 1304 676 backup.exe 36 PID 676 wrote to memory of 1304 676 backup.exe 36 PID 1596 wrote to memory of 1496 1596 backup.exe 37 PID 1596 wrote to memory of 1496 1596 backup.exe 37 PID 1596 wrote to memory of 1496 1596 backup.exe 37 PID 1596 wrote to memory of 1496 1596 backup.exe 37 PID 1496 wrote to memory of 1728 1496 backup.exe 38 PID 1496 wrote to memory of 1728 1496 backup.exe 38 PID 1496 wrote to memory of 1728 1496 backup.exe 38 PID 1496 wrote to memory of 1728 1496 backup.exe 38 PID 1728 wrote to memory of 1548 1728 backup.exe 39 PID 1728 wrote to memory of 1548 1728 backup.exe 39 PID 1728 wrote to memory of 1548 1728 backup.exe 39 PID 1728 wrote to memory of 1548 1728 backup.exe 39 PID 1496 wrote to memory of 2012 1496 backup.exe 40 PID 1496 wrote to memory of 2012 1496 backup.exe 40 PID 1496 wrote to memory of 2012 1496 backup.exe 40 PID 1496 wrote to memory of 2012 1496 backup.exe 40 PID 2012 wrote to memory of 1824 2012 backup.exe 41 PID 2012 wrote to memory of 1824 2012 backup.exe 41 PID 2012 wrote to memory of 1824 2012 backup.exe 41 PID 2012 wrote to memory of 1824 2012 backup.exe 41 PID 1824 wrote to memory of 804 1824 backup.exe 42 PID 1824 wrote to memory of 804 1824 backup.exe 42 PID 1824 wrote to memory of 804 1824 backup.exe 42 PID 1824 wrote to memory of 804 1824 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe"C:\Users\Admin\AppData\Local\Temp\a9d4b355b051ae31cfe34563a02e1830220d81272b9e1357433e5a048303611f.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3650501001\backup.exeC:\Users\Admin\AppData\Local\Temp\3650501001\backup.exe C:\Users\Admin\AppData\Local\Temp\3650501001\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1120 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1596 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:676 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1304
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1496 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1728 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1548
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1824 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:804
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:320
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:828
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1356
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1436
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1916
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1844
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1672
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:308
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1152
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Executes dropped EXE
PID:472
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:756
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1256
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:2036
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1464
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:632
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1536
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:2040
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1168
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\data.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\data.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1060
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1652 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:300
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
PID:852
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:296
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1336
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:740
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1304
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1376
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1892
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:900
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:888 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1900
-
-
C:\Program Files (x86)\Internet Explorer\update.exe"C:\Program Files (x86)\Internet Explorer\update.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1324
-
-
-
C:\Users\System Restore.exe"C:\Users\System Restore.exe" C:\Users\4⤵
- Executes dropped EXE
PID:1608
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1756 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1748
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1112
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:676
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b825fbd0f629aaecf70d7e90dc242fc2
SHA12899adcbed62baf67e4c523d35bb6d760df09697
SHA2561f8f28469bc0219011cccf19939f80262bcd537eaa75f981c3db88723065f1f1
SHA51253dc4f3de1844469a1806245d8f03c94d355039aa6f3ff8f1bce0b215e89359e6b2540f215e0fd545b4a63a4b5fb0227c653b65bd5238a60ccf7afbf16678d1f
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD52535e17fa624be22e49c34d2f7c6a8b4
SHA12b3765ccfe578e14945a6f5c225648d12e906d97
SHA256b19f7e54fe5e33706b9ab63010b61d42bf93a646c6a6da0ca8e0605255e1723d
SHA5126a4458555d47530a8ade98715ba6bc18ffff030c0180f20c184deadf74f9b17cf10dc627f97d39003b42aab2f2ebc25c94b7f995c8dbb69eaa9a30ed0f76a5e8
-
Filesize
72KB
MD5b825fbd0f629aaecf70d7e90dc242fc2
SHA12899adcbed62baf67e4c523d35bb6d760df09697
SHA2561f8f28469bc0219011cccf19939f80262bcd537eaa75f981c3db88723065f1f1
SHA51253dc4f3de1844469a1806245d8f03c94d355039aa6f3ff8f1bce0b215e89359e6b2540f215e0fd545b4a63a4b5fb0227c653b65bd5238a60ccf7afbf16678d1f
-
Filesize
72KB
MD5b825fbd0f629aaecf70d7e90dc242fc2
SHA12899adcbed62baf67e4c523d35bb6d760df09697
SHA2561f8f28469bc0219011cccf19939f80262bcd537eaa75f981c3db88723065f1f1
SHA51253dc4f3de1844469a1806245d8f03c94d355039aa6f3ff8f1bce0b215e89359e6b2540f215e0fd545b4a63a4b5fb0227c653b65bd5238a60ccf7afbf16678d1f
-
Filesize
72KB
MD54c4d6444cb8863f3c501f5b53784c843
SHA16fea22a6d3fcc59e3b45358551a08f3c5141df74
SHA2569c693a4c11f3bef5b1a1ba21ff30df70ec512b494b8d109b612a5631e62ed9c5
SHA512a3dd41f58ad8627e69cf196a798437e7c7aabcbbe41156d0e92c5bbfcb463857aa860cbdbe4938bd3565d239c2388e52bb862f181261443b4bb60e053d20b3a3
-
Filesize
72KB
MD5052aafbbaaf094ad33c44fdff4d68f98
SHA1310b2e0905eab6500d33c762e3efc62ab59b84fa
SHA2566bb02b844791f19327cc9e5292f6efaedccabc467e1e8d3909aa46c4c06f78e6
SHA512d982d2b35cc3f4546d1f0094426e5bf9b5636d4dfebee625dbb571068d1310d36fd4fd43e373a3e7c1f00930f0073b7d125f066b2335636aec11de955d64bd28
-
Filesize
72KB
MD5052aafbbaaf094ad33c44fdff4d68f98
SHA1310b2e0905eab6500d33c762e3efc62ab59b84fa
SHA2566bb02b844791f19327cc9e5292f6efaedccabc467e1e8d3909aa46c4c06f78e6
SHA512d982d2b35cc3f4546d1f0094426e5bf9b5636d4dfebee625dbb571068d1310d36fd4fd43e373a3e7c1f00930f0073b7d125f066b2335636aec11de955d64bd28
-
Filesize
72KB
MD52dbdc106b5c5c794f98db41ec8d52afc
SHA1b817c2e615fc02030ce2f2c540a612d32afbb415
SHA25649c2e2c3f5fc9c1a79b18590bd14cdc20646e7faf88784cb6041661b225e9c8f
SHA51290a4340be972d3e87de1974cc05a85042ccded56801069db020d231e6015985cde3285cb0ec084808c39c8a498a3137c7b4bcbdc393eda3b830caedceee9b993
-
Filesize
72KB
MD54c4d6444cb8863f3c501f5b53784c843
SHA16fea22a6d3fcc59e3b45358551a08f3c5141df74
SHA2569c693a4c11f3bef5b1a1ba21ff30df70ec512b494b8d109b612a5631e62ed9c5
SHA512a3dd41f58ad8627e69cf196a798437e7c7aabcbbe41156d0e92c5bbfcb463857aa860cbdbe4938bd3565d239c2388e52bb862f181261443b4bb60e053d20b3a3
-
Filesize
72KB
MD54c4d6444cb8863f3c501f5b53784c843
SHA16fea22a6d3fcc59e3b45358551a08f3c5141df74
SHA2569c693a4c11f3bef5b1a1ba21ff30df70ec512b494b8d109b612a5631e62ed9c5
SHA512a3dd41f58ad8627e69cf196a798437e7c7aabcbbe41156d0e92c5bbfcb463857aa860cbdbe4938bd3565d239c2388e52bb862f181261443b4bb60e053d20b3a3
-
Filesize
72KB
MD50cec7019e37e28d05ec1af6d08354561
SHA1b74f81f686a1b82a9003121bc3288640047d7bae
SHA2567908a6d1de90f94b671a90a44e28db77ceef52f8846d46e723b5081e0ada8892
SHA5126371768e7390d6022bf0a92a8455727ff1fb99085d1c204cccdd3fabeffcb09c5ab24834fc95536bc0e4a813a5bf44f915ec09c082d9e7d6373d37a12ddcd312
-
Filesize
72KB
MD5a5a305ed186b8f5eb064af583dcee924
SHA1f833ed62653ad59dde55e58c9f40ded14ba5c639
SHA256d0326e71f829678414a97ea4d27fc3f839b9aba259b392addede20553c1753ff
SHA512dcc5e693d1d3a6f4eb38d4dcb6757c21d0787f744123a8b86464b8720b01c9c5982c6a98880c158cfa123789353e2de2c6486a0172a8929a03f3325db8a5fd2f
-
Filesize
72KB
MD5a5a305ed186b8f5eb064af583dcee924
SHA1f833ed62653ad59dde55e58c9f40ded14ba5c639
SHA256d0326e71f829678414a97ea4d27fc3f839b9aba259b392addede20553c1753ff
SHA512dcc5e693d1d3a6f4eb38d4dcb6757c21d0787f744123a8b86464b8720b01c9c5982c6a98880c158cfa123789353e2de2c6486a0172a8929a03f3325db8a5fd2f
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD562be85e127e4e8fc884997286a54fa1f
SHA1738902cc7714543b9a0a79e78330a6e5f91cd7bc
SHA25644ea5a834c6f00354ce6025c11e3c5156116b56d3d0db07733199e53ce0f9eb1
SHA51283eab8cb3834a0916723846d5da7760413c02e5d8c9a8ccc300e602f11bf63b26b895d7a2ff6ebbf7fa3b1efe4bd86299843733d4c9bb1b8d85beb3e0d63965e
-
Filesize
72KB
MD562be85e127e4e8fc884997286a54fa1f
SHA1738902cc7714543b9a0a79e78330a6e5f91cd7bc
SHA25644ea5a834c6f00354ce6025c11e3c5156116b56d3d0db07733199e53ce0f9eb1
SHA51283eab8cb3834a0916723846d5da7760413c02e5d8c9a8ccc300e602f11bf63b26b895d7a2ff6ebbf7fa3b1efe4bd86299843733d4c9bb1b8d85beb3e0d63965e
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD562be85e127e4e8fc884997286a54fa1f
SHA1738902cc7714543b9a0a79e78330a6e5f91cd7bc
SHA25644ea5a834c6f00354ce6025c11e3c5156116b56d3d0db07733199e53ce0f9eb1
SHA51283eab8cb3834a0916723846d5da7760413c02e5d8c9a8ccc300e602f11bf63b26b895d7a2ff6ebbf7fa3b1efe4bd86299843733d4c9bb1b8d85beb3e0d63965e
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD557cd7be7772960f3894ad8753bbeb7a8
SHA1022db7b96146037dc7265cab4d93641550b3f1bd
SHA2568b378ffb7d8fd339d47af7eb782bc9eb2c56d5677d565bc3c91e22f44e3febf7
SHA5120920074691ed427dc68af6bc18938c6f90d991e50e1873502e404d416ab86b7c6b78f973a838bee530b6aca51ac1d200793f30d328db25bdfd4bc6d9ea386249
-
Filesize
72KB
MD557cd7be7772960f3894ad8753bbeb7a8
SHA1022db7b96146037dc7265cab4d93641550b3f1bd
SHA2568b378ffb7d8fd339d47af7eb782bc9eb2c56d5677d565bc3c91e22f44e3febf7
SHA5120920074691ed427dc68af6bc18938c6f90d991e50e1873502e404d416ab86b7c6b78f973a838bee530b6aca51ac1d200793f30d328db25bdfd4bc6d9ea386249
-
Filesize
72KB
MD5b825fbd0f629aaecf70d7e90dc242fc2
SHA12899adcbed62baf67e4c523d35bb6d760df09697
SHA2561f8f28469bc0219011cccf19939f80262bcd537eaa75f981c3db88723065f1f1
SHA51253dc4f3de1844469a1806245d8f03c94d355039aa6f3ff8f1bce0b215e89359e6b2540f215e0fd545b4a63a4b5fb0227c653b65bd5238a60ccf7afbf16678d1f
-
Filesize
72KB
MD5b825fbd0f629aaecf70d7e90dc242fc2
SHA12899adcbed62baf67e4c523d35bb6d760df09697
SHA2561f8f28469bc0219011cccf19939f80262bcd537eaa75f981c3db88723065f1f1
SHA51253dc4f3de1844469a1806245d8f03c94d355039aa6f3ff8f1bce0b215e89359e6b2540f215e0fd545b4a63a4b5fb0227c653b65bd5238a60ccf7afbf16678d1f
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD52535e17fa624be22e49c34d2f7c6a8b4
SHA12b3765ccfe578e14945a6f5c225648d12e906d97
SHA256b19f7e54fe5e33706b9ab63010b61d42bf93a646c6a6da0ca8e0605255e1723d
SHA5126a4458555d47530a8ade98715ba6bc18ffff030c0180f20c184deadf74f9b17cf10dc627f97d39003b42aab2f2ebc25c94b7f995c8dbb69eaa9a30ed0f76a5e8
-
Filesize
72KB
MD52535e17fa624be22e49c34d2f7c6a8b4
SHA12b3765ccfe578e14945a6f5c225648d12e906d97
SHA256b19f7e54fe5e33706b9ab63010b61d42bf93a646c6a6da0ca8e0605255e1723d
SHA5126a4458555d47530a8ade98715ba6bc18ffff030c0180f20c184deadf74f9b17cf10dc627f97d39003b42aab2f2ebc25c94b7f995c8dbb69eaa9a30ed0f76a5e8
-
Filesize
72KB
MD5b825fbd0f629aaecf70d7e90dc242fc2
SHA12899adcbed62baf67e4c523d35bb6d760df09697
SHA2561f8f28469bc0219011cccf19939f80262bcd537eaa75f981c3db88723065f1f1
SHA51253dc4f3de1844469a1806245d8f03c94d355039aa6f3ff8f1bce0b215e89359e6b2540f215e0fd545b4a63a4b5fb0227c653b65bd5238a60ccf7afbf16678d1f
-
Filesize
72KB
MD5b825fbd0f629aaecf70d7e90dc242fc2
SHA12899adcbed62baf67e4c523d35bb6d760df09697
SHA2561f8f28469bc0219011cccf19939f80262bcd537eaa75f981c3db88723065f1f1
SHA51253dc4f3de1844469a1806245d8f03c94d355039aa6f3ff8f1bce0b215e89359e6b2540f215e0fd545b4a63a4b5fb0227c653b65bd5238a60ccf7afbf16678d1f
-
Filesize
72KB
MD54c4d6444cb8863f3c501f5b53784c843
SHA16fea22a6d3fcc59e3b45358551a08f3c5141df74
SHA2569c693a4c11f3bef5b1a1ba21ff30df70ec512b494b8d109b612a5631e62ed9c5
SHA512a3dd41f58ad8627e69cf196a798437e7c7aabcbbe41156d0e92c5bbfcb463857aa860cbdbe4938bd3565d239c2388e52bb862f181261443b4bb60e053d20b3a3
-
Filesize
72KB
MD54c4d6444cb8863f3c501f5b53784c843
SHA16fea22a6d3fcc59e3b45358551a08f3c5141df74
SHA2569c693a4c11f3bef5b1a1ba21ff30df70ec512b494b8d109b612a5631e62ed9c5
SHA512a3dd41f58ad8627e69cf196a798437e7c7aabcbbe41156d0e92c5bbfcb463857aa860cbdbe4938bd3565d239c2388e52bb862f181261443b4bb60e053d20b3a3
-
Filesize
72KB
MD5052aafbbaaf094ad33c44fdff4d68f98
SHA1310b2e0905eab6500d33c762e3efc62ab59b84fa
SHA2566bb02b844791f19327cc9e5292f6efaedccabc467e1e8d3909aa46c4c06f78e6
SHA512d982d2b35cc3f4546d1f0094426e5bf9b5636d4dfebee625dbb571068d1310d36fd4fd43e373a3e7c1f00930f0073b7d125f066b2335636aec11de955d64bd28
-
Filesize
72KB
MD5052aafbbaaf094ad33c44fdff4d68f98
SHA1310b2e0905eab6500d33c762e3efc62ab59b84fa
SHA2566bb02b844791f19327cc9e5292f6efaedccabc467e1e8d3909aa46c4c06f78e6
SHA512d982d2b35cc3f4546d1f0094426e5bf9b5636d4dfebee625dbb571068d1310d36fd4fd43e373a3e7c1f00930f0073b7d125f066b2335636aec11de955d64bd28
-
Filesize
72KB
MD52dbdc106b5c5c794f98db41ec8d52afc
SHA1b817c2e615fc02030ce2f2c540a612d32afbb415
SHA25649c2e2c3f5fc9c1a79b18590bd14cdc20646e7faf88784cb6041661b225e9c8f
SHA51290a4340be972d3e87de1974cc05a85042ccded56801069db020d231e6015985cde3285cb0ec084808c39c8a498a3137c7b4bcbdc393eda3b830caedceee9b993
-
Filesize
72KB
MD52dbdc106b5c5c794f98db41ec8d52afc
SHA1b817c2e615fc02030ce2f2c540a612d32afbb415
SHA25649c2e2c3f5fc9c1a79b18590bd14cdc20646e7faf88784cb6041661b225e9c8f
SHA51290a4340be972d3e87de1974cc05a85042ccded56801069db020d231e6015985cde3285cb0ec084808c39c8a498a3137c7b4bcbdc393eda3b830caedceee9b993
-
Filesize
72KB
MD54c4d6444cb8863f3c501f5b53784c843
SHA16fea22a6d3fcc59e3b45358551a08f3c5141df74
SHA2569c693a4c11f3bef5b1a1ba21ff30df70ec512b494b8d109b612a5631e62ed9c5
SHA512a3dd41f58ad8627e69cf196a798437e7c7aabcbbe41156d0e92c5bbfcb463857aa860cbdbe4938bd3565d239c2388e52bb862f181261443b4bb60e053d20b3a3
-
Filesize
72KB
MD54c4d6444cb8863f3c501f5b53784c843
SHA16fea22a6d3fcc59e3b45358551a08f3c5141df74
SHA2569c693a4c11f3bef5b1a1ba21ff30df70ec512b494b8d109b612a5631e62ed9c5
SHA512a3dd41f58ad8627e69cf196a798437e7c7aabcbbe41156d0e92c5bbfcb463857aa860cbdbe4938bd3565d239c2388e52bb862f181261443b4bb60e053d20b3a3
-
Filesize
72KB
MD50cec7019e37e28d05ec1af6d08354561
SHA1b74f81f686a1b82a9003121bc3288640047d7bae
SHA2567908a6d1de90f94b671a90a44e28db77ceef52f8846d46e723b5081e0ada8892
SHA5126371768e7390d6022bf0a92a8455727ff1fb99085d1c204cccdd3fabeffcb09c5ab24834fc95536bc0e4a813a5bf44f915ec09c082d9e7d6373d37a12ddcd312
-
Filesize
72KB
MD50cec7019e37e28d05ec1af6d08354561
SHA1b74f81f686a1b82a9003121bc3288640047d7bae
SHA2567908a6d1de90f94b671a90a44e28db77ceef52f8846d46e723b5081e0ada8892
SHA5126371768e7390d6022bf0a92a8455727ff1fb99085d1c204cccdd3fabeffcb09c5ab24834fc95536bc0e4a813a5bf44f915ec09c082d9e7d6373d37a12ddcd312
-
Filesize
72KB
MD50cec7019e37e28d05ec1af6d08354561
SHA1b74f81f686a1b82a9003121bc3288640047d7bae
SHA2567908a6d1de90f94b671a90a44e28db77ceef52f8846d46e723b5081e0ada8892
SHA5126371768e7390d6022bf0a92a8455727ff1fb99085d1c204cccdd3fabeffcb09c5ab24834fc95536bc0e4a813a5bf44f915ec09c082d9e7d6373d37a12ddcd312
-
Filesize
72KB
MD5a5a305ed186b8f5eb064af583dcee924
SHA1f833ed62653ad59dde55e58c9f40ded14ba5c639
SHA256d0326e71f829678414a97ea4d27fc3f839b9aba259b392addede20553c1753ff
SHA512dcc5e693d1d3a6f4eb38d4dcb6757c21d0787f744123a8b86464b8720b01c9c5982c6a98880c158cfa123789353e2de2c6486a0172a8929a03f3325db8a5fd2f
-
Filesize
72KB
MD5a5a305ed186b8f5eb064af583dcee924
SHA1f833ed62653ad59dde55e58c9f40ded14ba5c639
SHA256d0326e71f829678414a97ea4d27fc3f839b9aba259b392addede20553c1753ff
SHA512dcc5e693d1d3a6f4eb38d4dcb6757c21d0787f744123a8b86464b8720b01c9c5982c6a98880c158cfa123789353e2de2c6486a0172a8929a03f3325db8a5fd2f
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD5f99707acd95b35a5637e4a8ca2ddf9de
SHA1955c55b2fce211b39f5321d9663468d904b1c296
SHA256387da3aed054d25456b5b09ff08440dadaaff31f05747aa374c367a929613be0
SHA512164834e83ae69c951708ee25e3803d636fc0d4b8f90500601c31940b1890fa88752d75dcf355ada50a4ed5c9e67f6e3f677d093c708b49084179d6dfc16be2a5
-
Filesize
72KB
MD562be85e127e4e8fc884997286a54fa1f
SHA1738902cc7714543b9a0a79e78330a6e5f91cd7bc
SHA25644ea5a834c6f00354ce6025c11e3c5156116b56d3d0db07733199e53ce0f9eb1
SHA51283eab8cb3834a0916723846d5da7760413c02e5d8c9a8ccc300e602f11bf63b26b895d7a2ff6ebbf7fa3b1efe4bd86299843733d4c9bb1b8d85beb3e0d63965e
-
Filesize
72KB
MD562be85e127e4e8fc884997286a54fa1f
SHA1738902cc7714543b9a0a79e78330a6e5f91cd7bc
SHA25644ea5a834c6f00354ce6025c11e3c5156116b56d3d0db07733199e53ce0f9eb1
SHA51283eab8cb3834a0916723846d5da7760413c02e5d8c9a8ccc300e602f11bf63b26b895d7a2ff6ebbf7fa3b1efe4bd86299843733d4c9bb1b8d85beb3e0d63965e
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD562be85e127e4e8fc884997286a54fa1f
SHA1738902cc7714543b9a0a79e78330a6e5f91cd7bc
SHA25644ea5a834c6f00354ce6025c11e3c5156116b56d3d0db07733199e53ce0f9eb1
SHA51283eab8cb3834a0916723846d5da7760413c02e5d8c9a8ccc300e602f11bf63b26b895d7a2ff6ebbf7fa3b1efe4bd86299843733d4c9bb1b8d85beb3e0d63965e
-
Filesize
72KB
MD562be85e127e4e8fc884997286a54fa1f
SHA1738902cc7714543b9a0a79e78330a6e5f91cd7bc
SHA25644ea5a834c6f00354ce6025c11e3c5156116b56d3d0db07733199e53ce0f9eb1
SHA51283eab8cb3834a0916723846d5da7760413c02e5d8c9a8ccc300e602f11bf63b26b895d7a2ff6ebbf7fa3b1efe4bd86299843733d4c9bb1b8d85beb3e0d63965e
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0
-
Filesize
72KB
MD555efa7251462345db872d6fbfece7bd5
SHA182dfa7f7a366a10c1678e2648bf4dc8d1f061ba3
SHA2560582fd0959a810e8122762b475719f075d205332e8d55dc114e884e454a49b20
SHA512c63b42487d4045bf955d751065e1eea78fd2ddf08d5b9ce0d15f0da476b3d0bd391d1ea41370f21fa009a1c24732227c71e59bef36fd33ee5f8829e43e4aafc0