Analysis
-
max time kernel
130s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:35
Static task
static1
Behavioral task
behavioral1
Sample
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe
Resource
win10v2004-20220812-en
General
-
Target
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe
-
Size
72KB
-
MD5
454847e6a13674d3a5446714430b8d85
-
SHA1
0b909e993104e4802cffc5d5ea01a3ceecd64975
-
SHA256
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a
-
SHA512
7b811b425d3db676d2f830bad879d07cc9fd3af8c093fa4f04ef7669db792af5d951816c44d392d1fa8a7b2399612287303b1fc79fac799e6960bb29b398d937
-
SSDEEP
768:rpQNwC3BEc4QEfu0Ei8XxNDINE3BEJwRr3k+I:teThavEjDWguKU+I
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 50 IoCs
Processes:
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exeupdate.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exeupdate.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exepid process 2004 backup.exe 744 backup.exe 656 backup.exe 1392 backup.exe 1260 backup.exe 888 backup.exe 1460 backup.exe 1644 backup.exe 1948 backup.exe 428 backup.exe 1140 backup.exe 1824 backup.exe 1440 backup.exe 1624 backup.exe 1328 backup.exe 1152 backup.exe 856 backup.exe 1192 backup.exe 1892 backup.exe 1772 backup.exe 668 backup.exe 1896 data.exe 1484 update.exe 1720 backup.exe 1460 backup.exe 1604 backup.exe 1608 backup.exe 928 data.exe 1464 backup.exe 1828 backup.exe 924 backup.exe 2016 backup.exe 1832 backup.exe 804 backup.exe 1908 backup.exe 1824 backup.exe 1100 backup.exe 1876 backup.exe 1188 System Restore.exe 1152 backup.exe 292 System Restore.exe 2000 backup.exe 1128 backup.exe 784 backup.exe 108 backup.exe 1636 backup.exe 1200 backup.exe 1820 backup.exe 1080 System Restore.exe 844 backup.exe 1544 backup.exe 1608 backup.exe 528 backup.exe 616 backup.exe 1116 backup.exe 836 backup.exe 800 backup.exe 1796 backup.exe 1732 backup.exe 560 backup.exe 812 backup.exe 268 backup.exe 780 backup.exe 1508 backup.exe -
Loads dropped DLL 64 IoCs
Processes:
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exedata.exepid process 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 1644 backup.exe 1644 backup.exe 1948 backup.exe 1948 backup.exe 1644 backup.exe 1644 backup.exe 1140 backup.exe 1140 backup.exe 1824 backup.exe 1824 backup.exe 1140 backup.exe 1140 backup.exe 1624 backup.exe 1624 backup.exe 1328 backup.exe 1328 backup.exe 1328 backup.exe 1328 backup.exe 856 backup.exe 856 backup.exe 856 backup.exe 1328 backup.exe 856 backup.exe 1624 backup.exe 1624 backup.exe 1328 backup.exe 1644 backup.exe 1140 backup.exe 1140 backup.exe 1624 backup.exe 1140 backup.exe 1624 backup.exe 1140 backup.exe 1328 backup.exe 1328 backup.exe 1644 backup.exe 1644 backup.exe 856 backup.exe 856 backup.exe 928 data.exe 856 backup.exe 1460 backup.exe 928 data.exe 856 backup.exe 1604 backup.exe 1460 backup.exe 1604 backup.exe 1772 backup.exe 1772 backup.exe 1896 data.exe -
Drops file in Program Files directory 60 IoCs
Processes:
backup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeupdate.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe data.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe data.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Java\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe update.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\update.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe update.exe -
Drops file in Windows directory 1 IoCs
Processes:
backup.exedescription ioc process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exepid process 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe -
Suspicious use of SetWindowsHookEx 59 IoCs
Processes:
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exeupdate.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exepid process 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe 2004 backup.exe 744 backup.exe 656 backup.exe 1392 backup.exe 1260 backup.exe 888 backup.exe 1460 backup.exe 1644 backup.exe 1948 backup.exe 428 backup.exe 1140 backup.exe 1824 backup.exe 1440 backup.exe 1624 backup.exe 1328 backup.exe 1152 backup.exe 856 backup.exe 1192 backup.exe 1892 backup.exe 668 backup.exe 1772 backup.exe 1896 data.exe 1720 backup.exe 1604 backup.exe 1608 backup.exe 1460 backup.exe 928 data.exe 1464 backup.exe 924 backup.exe 1828 backup.exe 2016 backup.exe 1908 backup.exe 1832 backup.exe 804 backup.exe 1824 backup.exe 1100 backup.exe 1876 backup.exe 1152 backup.exe 292 System Restore.exe 1128 backup.exe 2000 backup.exe 1188 System Restore.exe 784 backup.exe 108 backup.exe 1636 backup.exe 1484 update.exe 1820 backup.exe 1200 backup.exe 1080 System Restore.exe 844 backup.exe 1544 backup.exe 528 backup.exe 836 backup.exe 1796 backup.exe 1116 backup.exe 1732 backup.exe 800 backup.exe 1608 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription pid process target process PID 1884 wrote to memory of 2004 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 2004 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 2004 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 2004 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 744 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 744 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 744 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 744 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 656 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 656 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 656 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 656 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1392 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1392 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1392 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1392 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1260 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1260 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1260 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1260 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 888 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 888 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 888 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 888 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1460 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1460 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1460 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 1884 wrote to memory of 1460 1884 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe backup.exe PID 2004 wrote to memory of 1644 2004 backup.exe backup.exe PID 2004 wrote to memory of 1644 2004 backup.exe backup.exe PID 2004 wrote to memory of 1644 2004 backup.exe backup.exe PID 2004 wrote to memory of 1644 2004 backup.exe backup.exe PID 1644 wrote to memory of 1948 1644 backup.exe backup.exe PID 1644 wrote to memory of 1948 1644 backup.exe backup.exe PID 1644 wrote to memory of 1948 1644 backup.exe backup.exe PID 1644 wrote to memory of 1948 1644 backup.exe backup.exe PID 1948 wrote to memory of 428 1948 backup.exe backup.exe PID 1948 wrote to memory of 428 1948 backup.exe backup.exe PID 1948 wrote to memory of 428 1948 backup.exe backup.exe PID 1948 wrote to memory of 428 1948 backup.exe backup.exe PID 1644 wrote to memory of 1140 1644 backup.exe backup.exe PID 1644 wrote to memory of 1140 1644 backup.exe backup.exe PID 1644 wrote to memory of 1140 1644 backup.exe backup.exe PID 1644 wrote to memory of 1140 1644 backup.exe backup.exe PID 1140 wrote to memory of 1824 1140 backup.exe backup.exe PID 1140 wrote to memory of 1824 1140 backup.exe backup.exe PID 1140 wrote to memory of 1824 1140 backup.exe backup.exe PID 1140 wrote to memory of 1824 1140 backup.exe backup.exe PID 1824 wrote to memory of 1440 1824 backup.exe backup.exe PID 1824 wrote to memory of 1440 1824 backup.exe backup.exe PID 1824 wrote to memory of 1440 1824 backup.exe backup.exe PID 1824 wrote to memory of 1440 1824 backup.exe backup.exe PID 1140 wrote to memory of 1624 1140 backup.exe backup.exe PID 1140 wrote to memory of 1624 1140 backup.exe backup.exe PID 1140 wrote to memory of 1624 1140 backup.exe backup.exe PID 1140 wrote to memory of 1624 1140 backup.exe backup.exe PID 1624 wrote to memory of 1328 1624 backup.exe backup.exe PID 1624 wrote to memory of 1328 1624 backup.exe backup.exe PID 1624 wrote to memory of 1328 1624 backup.exe backup.exe PID 1624 wrote to memory of 1328 1624 backup.exe backup.exe PID 1328 wrote to memory of 1152 1328 backup.exe backup.exe PID 1328 wrote to memory of 1152 1328 backup.exe backup.exe PID 1328 wrote to memory of 1152 1328 backup.exe backup.exe PID 1328 wrote to memory of 1152 1328 backup.exe backup.exe -
System policy modification 1 TTPs 64 IoCs
Processes:
System Restore.exebackup.exebackup.exebackup.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exebackup.exeSystem Restore.exebackup.exe2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exebackup.exebackup.exeSystem Restore.exebackup.exebackup.exedata.exebackup.exebackup.exebackup.exebackup.exebackup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe"C:\Users\Admin\AppData\Local\Temp\2bf1c6929dabd5174a679ddc8fe483e377ce3c0e5a65d10edaf3356d9546984a.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\809723849\backup.exeC:\Users\Admin\AppData\Local\Temp\809723849\backup.exe C:\Users\Admin\AppData\Local\Temp\809723849\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2004 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1644 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:428 -
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1140 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1824 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1440 -
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1624 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1328 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1152 -
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:856 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192 -
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:668 -
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608 -
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1464 -
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1100 -
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:784 -
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:744
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:924
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:2152
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:2300
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:2436
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1772 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1832 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1080 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
PID:268 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1604
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:2192
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1604 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1828 -
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824 -
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:108 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1476
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1928
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2224
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2336
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1892 -
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1460 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:924 -
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1876 -
C:\Program Files\Common Files\System\ado\System Restore.exe"C:\Program Files\Common Files\System\ado\System Restore.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1188 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Executes dropped EXE
PID:560 -
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1900
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:784
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:2264
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:2380
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:636
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:108
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:968
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:2200
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:2320
-
C:\Program Files\DVD Maker\data.exe"C:\Program Files\DVD Maker\data.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1896 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1908 -
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1636 -
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
PID:616 -
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Executes dropped EXE
PID:1508 -
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1544
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:2184
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:804 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:844 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:1300
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵PID:1936
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵PID:1980
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵PID:2216
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵PID:2344
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1540
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1452
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1200 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
PID:812 -
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:964
-
C:\Program Files\Internet Explorer\fr-FR\data.exe"C:\Program Files\Internet Explorer\fr-FR\data.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:1892
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:2232
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:2352
-
C:\Program Files\Java\data.exe"C:\Program Files\Java\data.exe" C:\Program Files\Java\5⤵PID:1908
-
C:\Program Files\Microsoft Games\data.exe"C:\Program Files\Microsoft Games\data.exe" C:\Program Files\Microsoft Games\5⤵PID:1704
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1204
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2240
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2360
-
C:\Program Files (x86)\update.exe"C:\Program Files (x86)\update.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵PID:2172
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
PID:780 -
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1564
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2000
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:2208
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:2328
-
C:\Users\data.exeC:\Users\data.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:928 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016 -
C:\Users\Admin\Contacts\System Restore.exe"C:\Users\Admin\Contacts\System Restore.exe" C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:292 -
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544 -
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1100
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:816
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:428
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:2272
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:2388
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1832
-
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:2280
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:2396
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:744 -
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:656 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:888 -
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD558bde08af8c490765377e0122eb737ce
SHA1765d8a146352ea3f0325210d41a269ae347f3aef
SHA256d214a44a47f4e5af60101fcd7ab02a52853693c741d0b320c31e31ddc9d74dd4
SHA51289a6cf6ad035a371da849cbd0e4ed6e80ee981facee8228f2303db1580c63f6c6c17e26edc5c4726669e55a56e7cd4912f377a74b2e48446448fdacd37e6fa97
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD544de8db7760dd5cbf625699f853b9ca0
SHA1c0f469dde6d74888d1aa17e57071d2a1e4c27cbf
SHA25653cca8baed037b7892c114fe768e2478a1dbcecf3b9b0a415786d89f893b7f9e
SHA512be8cb8704dd8a5550e2c44ef3159f1b5fe96bb90b5952e70d0861601ebd56e183f39bf18eec2b26c0a1c6c2cdaca229ab8abbe522652a633b95aedbd4a1d3558
-
Filesize
72KB
MD558bde08af8c490765377e0122eb737ce
SHA1765d8a146352ea3f0325210d41a269ae347f3aef
SHA256d214a44a47f4e5af60101fcd7ab02a52853693c741d0b320c31e31ddc9d74dd4
SHA51289a6cf6ad035a371da849cbd0e4ed6e80ee981facee8228f2303db1580c63f6c6c17e26edc5c4726669e55a56e7cd4912f377a74b2e48446448fdacd37e6fa97
-
Filesize
72KB
MD558bde08af8c490765377e0122eb737ce
SHA1765d8a146352ea3f0325210d41a269ae347f3aef
SHA256d214a44a47f4e5af60101fcd7ab02a52853693c741d0b320c31e31ddc9d74dd4
SHA51289a6cf6ad035a371da849cbd0e4ed6e80ee981facee8228f2303db1580c63f6c6c17e26edc5c4726669e55a56e7cd4912f377a74b2e48446448fdacd37e6fa97
-
Filesize
72KB
MD5a2d7e4aacedf1cf52f3bc30955837da3
SHA1ab5385b74b7574ffa8268a10a8135c903abd80da
SHA256cdbb518f00deced7632dcb9ea66d117d6e4c988544c2a08a807484369b2696f5
SHA512f342f9c40d7ff53c990e70b5a7d6d39f5e5e91924ed0b313ef0c7e657ee88c3724c27ca34e2a519ec58e1faba6ed88784bedce9c43d7278ffde3b94781a29900
-
Filesize
72KB
MD5e8e1b3de5df6bd0888ee7cd5542ddec9
SHA1bfe20fd07dc3aea4ee442943ba9b10afd83ffe45
SHA256373af1939a5c08885fecbb64b631c7c487a8f1cf8929d5c8b0c7b15c3480603f
SHA51218d3e5e373b42936e440ea012c28921f5bb8eced4a7fe8581bb4d1a1abffdf41513f29b1233b14e052b3312dfdf4b33770c66320622c1998991a737ddaa48bc4
-
Filesize
72KB
MD5e8e1b3de5df6bd0888ee7cd5542ddec9
SHA1bfe20fd07dc3aea4ee442943ba9b10afd83ffe45
SHA256373af1939a5c08885fecbb64b631c7c487a8f1cf8929d5c8b0c7b15c3480603f
SHA51218d3e5e373b42936e440ea012c28921f5bb8eced4a7fe8581bb4d1a1abffdf41513f29b1233b14e052b3312dfdf4b33770c66320622c1998991a737ddaa48bc4
-
Filesize
72KB
MD5e7b9a896ffca63c9c6cb50d30b053c56
SHA16808eabeb6c43c1408e048d1a051210f2439f398
SHA256396fb6b3778542613d4a43d450bcfc33b644b5a7c96bcf136a73f3b8aebfc288
SHA5129cec68ea630639e09cb45da6862f624f09df5d707e72300ff722aa0e05c2b9eedd4d1ada7fe392318330a2fc255b651b9d7ced8a255a7f7c9af2a60f39cb68ef
-
Filesize
72KB
MD51818674902231fcff500d3ebad54ec1b
SHA1f044a073611bb7f5c06d964331933474ad3d2747
SHA256b0d716297ad87d51588f7cbb74d0b08f8c54f5071a5b174bf59dbfcdc44bce62
SHA512a06007d3f8a162e0459b370fa90621da641c972aba3361ad8d605013f2229efcb106d9b90888022964f56e75c5b9aa55ce552a6df243aae569fc2ef5547d9330
-
Filesize
72KB
MD51818674902231fcff500d3ebad54ec1b
SHA1f044a073611bb7f5c06d964331933474ad3d2747
SHA256b0d716297ad87d51588f7cbb74d0b08f8c54f5071a5b174bf59dbfcdc44bce62
SHA512a06007d3f8a162e0459b370fa90621da641c972aba3361ad8d605013f2229efcb106d9b90888022964f56e75c5b9aa55ce552a6df243aae569fc2ef5547d9330
-
Filesize
72KB
MD5c822a35d5d3495d3244874f0f8d62a7e
SHA1ef48d017030464e927bbab5c655fb7783da48b62
SHA256a20896aed9bc0e7393ba41a2510c00c642b71292358686ed8d6f8b806ef60b54
SHA512802dd39611dabc4c5debdda802d8a8e56b101daf65d114b72976e8fcc590014b7749d74ac5f03b9e54cdbacc45b6c16957c7390794a5782cb408857a8029cc73
-
Filesize
72KB
MD5c822a35d5d3495d3244874f0f8d62a7e
SHA1ef48d017030464e927bbab5c655fb7783da48b62
SHA256a20896aed9bc0e7393ba41a2510c00c642b71292358686ed8d6f8b806ef60b54
SHA512802dd39611dabc4c5debdda802d8a8e56b101daf65d114b72976e8fcc590014b7749d74ac5f03b9e54cdbacc45b6c16957c7390794a5782cb408857a8029cc73
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD56e194410e565feaddbf81e0a419f1667
SHA1eb016a9585d9a30fc64f167a9058d1474b40e4c0
SHA25601176eab9b3c15bb754b7a327a9e4b9a468fff182cd0fb66d27af568f3d564ec
SHA512d3dccc6fd1bafba467a4c68a9fe8399f82ef29113b1ce90053cc00107d7e8cabf83b7ee4721b2ddff4961fd9d731121a0026f3da54b8949fd12cfe191695aaea
-
Filesize
72KB
MD56e194410e565feaddbf81e0a419f1667
SHA1eb016a9585d9a30fc64f167a9058d1474b40e4c0
SHA25601176eab9b3c15bb754b7a327a9e4b9a468fff182cd0fb66d27af568f3d564ec
SHA512d3dccc6fd1bafba467a4c68a9fe8399f82ef29113b1ce90053cc00107d7e8cabf83b7ee4721b2ddff4961fd9d731121a0026f3da54b8949fd12cfe191695aaea
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD56e194410e565feaddbf81e0a419f1667
SHA1eb016a9585d9a30fc64f167a9058d1474b40e4c0
SHA25601176eab9b3c15bb754b7a327a9e4b9a468fff182cd0fb66d27af568f3d564ec
SHA512d3dccc6fd1bafba467a4c68a9fe8399f82ef29113b1ce90053cc00107d7e8cabf83b7ee4721b2ddff4961fd9d731121a0026f3da54b8949fd12cfe191695aaea
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD5d757cb951d9647d225f57ab3dea7632b
SHA1be4fe09747a0655a10e27ba8a69dc7b4b9736694
SHA2563eb7a2dfb36d898ea5d7d2c6fd97034980bc7b2a08f7c654422a568f75be3512
SHA51251442cf466d78c8e9c21118e79b2433a6a136e14d7ad01cd148b222a9d9f42c638a75a04eafddb302c08ee680f7fd0ab2f0caa3080576c93479882b9b0800bd2
-
Filesize
72KB
MD5d757cb951d9647d225f57ab3dea7632b
SHA1be4fe09747a0655a10e27ba8a69dc7b4b9736694
SHA2563eb7a2dfb36d898ea5d7d2c6fd97034980bc7b2a08f7c654422a568f75be3512
SHA51251442cf466d78c8e9c21118e79b2433a6a136e14d7ad01cd148b222a9d9f42c638a75a04eafddb302c08ee680f7fd0ab2f0caa3080576c93479882b9b0800bd2
-
Filesize
72KB
MD558bde08af8c490765377e0122eb737ce
SHA1765d8a146352ea3f0325210d41a269ae347f3aef
SHA256d214a44a47f4e5af60101fcd7ab02a52853693c741d0b320c31e31ddc9d74dd4
SHA51289a6cf6ad035a371da849cbd0e4ed6e80ee981facee8228f2303db1580c63f6c6c17e26edc5c4726669e55a56e7cd4912f377a74b2e48446448fdacd37e6fa97
-
Filesize
72KB
MD558bde08af8c490765377e0122eb737ce
SHA1765d8a146352ea3f0325210d41a269ae347f3aef
SHA256d214a44a47f4e5af60101fcd7ab02a52853693c741d0b320c31e31ddc9d74dd4
SHA51289a6cf6ad035a371da849cbd0e4ed6e80ee981facee8228f2303db1580c63f6c6c17e26edc5c4726669e55a56e7cd4912f377a74b2e48446448fdacd37e6fa97
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD544de8db7760dd5cbf625699f853b9ca0
SHA1c0f469dde6d74888d1aa17e57071d2a1e4c27cbf
SHA25653cca8baed037b7892c114fe768e2478a1dbcecf3b9b0a415786d89f893b7f9e
SHA512be8cb8704dd8a5550e2c44ef3159f1b5fe96bb90b5952e70d0861601ebd56e183f39bf18eec2b26c0a1c6c2cdaca229ab8abbe522652a633b95aedbd4a1d3558
-
Filesize
72KB
MD544de8db7760dd5cbf625699f853b9ca0
SHA1c0f469dde6d74888d1aa17e57071d2a1e4c27cbf
SHA25653cca8baed037b7892c114fe768e2478a1dbcecf3b9b0a415786d89f893b7f9e
SHA512be8cb8704dd8a5550e2c44ef3159f1b5fe96bb90b5952e70d0861601ebd56e183f39bf18eec2b26c0a1c6c2cdaca229ab8abbe522652a633b95aedbd4a1d3558
-
Filesize
72KB
MD558bde08af8c490765377e0122eb737ce
SHA1765d8a146352ea3f0325210d41a269ae347f3aef
SHA256d214a44a47f4e5af60101fcd7ab02a52853693c741d0b320c31e31ddc9d74dd4
SHA51289a6cf6ad035a371da849cbd0e4ed6e80ee981facee8228f2303db1580c63f6c6c17e26edc5c4726669e55a56e7cd4912f377a74b2e48446448fdacd37e6fa97
-
Filesize
72KB
MD558bde08af8c490765377e0122eb737ce
SHA1765d8a146352ea3f0325210d41a269ae347f3aef
SHA256d214a44a47f4e5af60101fcd7ab02a52853693c741d0b320c31e31ddc9d74dd4
SHA51289a6cf6ad035a371da849cbd0e4ed6e80ee981facee8228f2303db1580c63f6c6c17e26edc5c4726669e55a56e7cd4912f377a74b2e48446448fdacd37e6fa97
-
Filesize
72KB
MD5a2d7e4aacedf1cf52f3bc30955837da3
SHA1ab5385b74b7574ffa8268a10a8135c903abd80da
SHA256cdbb518f00deced7632dcb9ea66d117d6e4c988544c2a08a807484369b2696f5
SHA512f342f9c40d7ff53c990e70b5a7d6d39f5e5e91924ed0b313ef0c7e657ee88c3724c27ca34e2a519ec58e1faba6ed88784bedce9c43d7278ffde3b94781a29900
-
Filesize
72KB
MD5a2d7e4aacedf1cf52f3bc30955837da3
SHA1ab5385b74b7574ffa8268a10a8135c903abd80da
SHA256cdbb518f00deced7632dcb9ea66d117d6e4c988544c2a08a807484369b2696f5
SHA512f342f9c40d7ff53c990e70b5a7d6d39f5e5e91924ed0b313ef0c7e657ee88c3724c27ca34e2a519ec58e1faba6ed88784bedce9c43d7278ffde3b94781a29900
-
Filesize
72KB
MD551cae203cf594b5c17c167654ed47b46
SHA149d2de5464e17aed77aeff40470360c3ab9a2440
SHA256bb814b5bfe76ed8a1a62ca515ddd815ed6901a6f61b46a0c7368a5c5a3767379
SHA5120fc7b7199a8825673dbaccabbeb9e2e491b98cb258a05e009b27b8cf7c29bc5a3d164bb9722efa049d0cacae1acc57b06adc07e125211a414a30e0eeb6b4fb52
-
Filesize
72KB
MD5e8e1b3de5df6bd0888ee7cd5542ddec9
SHA1bfe20fd07dc3aea4ee442943ba9b10afd83ffe45
SHA256373af1939a5c08885fecbb64b631c7c487a8f1cf8929d5c8b0c7b15c3480603f
SHA51218d3e5e373b42936e440ea012c28921f5bb8eced4a7fe8581bb4d1a1abffdf41513f29b1233b14e052b3312dfdf4b33770c66320622c1998991a737ddaa48bc4
-
Filesize
72KB
MD5e8e1b3de5df6bd0888ee7cd5542ddec9
SHA1bfe20fd07dc3aea4ee442943ba9b10afd83ffe45
SHA256373af1939a5c08885fecbb64b631c7c487a8f1cf8929d5c8b0c7b15c3480603f
SHA51218d3e5e373b42936e440ea012c28921f5bb8eced4a7fe8581bb4d1a1abffdf41513f29b1233b14e052b3312dfdf4b33770c66320622c1998991a737ddaa48bc4
-
Filesize
72KB
MD5e7b9a896ffca63c9c6cb50d30b053c56
SHA16808eabeb6c43c1408e048d1a051210f2439f398
SHA256396fb6b3778542613d4a43d450bcfc33b644b5a7c96bcf136a73f3b8aebfc288
SHA5129cec68ea630639e09cb45da6862f624f09df5d707e72300ff722aa0e05c2b9eedd4d1ada7fe392318330a2fc255b651b9d7ced8a255a7f7c9af2a60f39cb68ef
-
Filesize
72KB
MD5e7b9a896ffca63c9c6cb50d30b053c56
SHA16808eabeb6c43c1408e048d1a051210f2439f398
SHA256396fb6b3778542613d4a43d450bcfc33b644b5a7c96bcf136a73f3b8aebfc288
SHA5129cec68ea630639e09cb45da6862f624f09df5d707e72300ff722aa0e05c2b9eedd4d1ada7fe392318330a2fc255b651b9d7ced8a255a7f7c9af2a60f39cb68ef
-
Filesize
72KB
MD51818674902231fcff500d3ebad54ec1b
SHA1f044a073611bb7f5c06d964331933474ad3d2747
SHA256b0d716297ad87d51588f7cbb74d0b08f8c54f5071a5b174bf59dbfcdc44bce62
SHA512a06007d3f8a162e0459b370fa90621da641c972aba3361ad8d605013f2229efcb106d9b90888022964f56e75c5b9aa55ce552a6df243aae569fc2ef5547d9330
-
Filesize
72KB
MD51818674902231fcff500d3ebad54ec1b
SHA1f044a073611bb7f5c06d964331933474ad3d2747
SHA256b0d716297ad87d51588f7cbb74d0b08f8c54f5071a5b174bf59dbfcdc44bce62
SHA512a06007d3f8a162e0459b370fa90621da641c972aba3361ad8d605013f2229efcb106d9b90888022964f56e75c5b9aa55ce552a6df243aae569fc2ef5547d9330
-
Filesize
72KB
MD58727962471f44728f0f91be3c791f74e
SHA18331017572fbc2b203651a7d30498528f6a1e750
SHA256de496990b87b183a1f28c39ae63e2c1a20329297fe655908866244604718cd0b
SHA512bd6275fc2ccdc3a1bb03a53b4dd708bad2bad9d8889a078297cc69f6fab7ec128a56f547a67d629aa9931ade7e3bb8a1c22faf1a487d1b8a1a2232bd155e8ea3
-
Filesize
72KB
MD58727962471f44728f0f91be3c791f74e
SHA18331017572fbc2b203651a7d30498528f6a1e750
SHA256de496990b87b183a1f28c39ae63e2c1a20329297fe655908866244604718cd0b
SHA512bd6275fc2ccdc3a1bb03a53b4dd708bad2bad9d8889a078297cc69f6fab7ec128a56f547a67d629aa9931ade7e3bb8a1c22faf1a487d1b8a1a2232bd155e8ea3
-
Filesize
72KB
MD51cc5a33b688dda0446dfa6b2c7b6c9cb
SHA168087fd5e353414c1e86c0e463a7c5d802ed1e49
SHA256901b30d2694a9e75b3eda396a02ef838539d1238f3020465985972af08df41ed
SHA5127889dae7c07f1e211874711d09c37cc410e1fcb147869602302f1fa26e7ca0f4b1ee78e1c2f8790b6358a5a9b4661bfaeaac849e33cd1e77432c758f924f2238
-
Filesize
72KB
MD5c822a35d5d3495d3244874f0f8d62a7e
SHA1ef48d017030464e927bbab5c655fb7783da48b62
SHA256a20896aed9bc0e7393ba41a2510c00c642b71292358686ed8d6f8b806ef60b54
SHA512802dd39611dabc4c5debdda802d8a8e56b101daf65d114b72976e8fcc590014b7749d74ac5f03b9e54cdbacc45b6c16957c7390794a5782cb408857a8029cc73
-
Filesize
72KB
MD5c822a35d5d3495d3244874f0f8d62a7e
SHA1ef48d017030464e927bbab5c655fb7783da48b62
SHA256a20896aed9bc0e7393ba41a2510c00c642b71292358686ed8d6f8b806ef60b54
SHA512802dd39611dabc4c5debdda802d8a8e56b101daf65d114b72976e8fcc590014b7749d74ac5f03b9e54cdbacc45b6c16957c7390794a5782cb408857a8029cc73
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD59ccbd634d42069b290c621dfbbf6a0f8
SHA1fe2120ac65047226d0f77874d77d4d210da73a85
SHA2564d7c91e265be8fcdbc1bb3082180e434137f62926806de29551b361f532d4ff8
SHA512c9ee09110ac27c115fd92cbad5f729db58c590cc44bce9d33f356f91cd4c1125a959272e300394ef854c2f3a7623d44fe8ac0bb9d67bb6e228fb2ab73f2ba86c
-
Filesize
72KB
MD56e194410e565feaddbf81e0a419f1667
SHA1eb016a9585d9a30fc64f167a9058d1474b40e4c0
SHA25601176eab9b3c15bb754b7a327a9e4b9a468fff182cd0fb66d27af568f3d564ec
SHA512d3dccc6fd1bafba467a4c68a9fe8399f82ef29113b1ce90053cc00107d7e8cabf83b7ee4721b2ddff4961fd9d731121a0026f3da54b8949fd12cfe191695aaea
-
Filesize
72KB
MD56e194410e565feaddbf81e0a419f1667
SHA1eb016a9585d9a30fc64f167a9058d1474b40e4c0
SHA25601176eab9b3c15bb754b7a327a9e4b9a468fff182cd0fb66d27af568f3d564ec
SHA512d3dccc6fd1bafba467a4c68a9fe8399f82ef29113b1ce90053cc00107d7e8cabf83b7ee4721b2ddff4961fd9d731121a0026f3da54b8949fd12cfe191695aaea
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD56e194410e565feaddbf81e0a419f1667
SHA1eb016a9585d9a30fc64f167a9058d1474b40e4c0
SHA25601176eab9b3c15bb754b7a327a9e4b9a468fff182cd0fb66d27af568f3d564ec
SHA512d3dccc6fd1bafba467a4c68a9fe8399f82ef29113b1ce90053cc00107d7e8cabf83b7ee4721b2ddff4961fd9d731121a0026f3da54b8949fd12cfe191695aaea
-
Filesize
72KB
MD56e194410e565feaddbf81e0a419f1667
SHA1eb016a9585d9a30fc64f167a9058d1474b40e4c0
SHA25601176eab9b3c15bb754b7a327a9e4b9a468fff182cd0fb66d27af568f3d564ec
SHA512d3dccc6fd1bafba467a4c68a9fe8399f82ef29113b1ce90053cc00107d7e8cabf83b7ee4721b2ddff4961fd9d731121a0026f3da54b8949fd12cfe191695aaea
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2
-
Filesize
72KB
MD5bf001344fd0c51a5a15034ee7488001f
SHA1ac4e2e1b98e9cb620f17dbdccd3c385dea7450b1
SHA256fe778603b436033adb197297f0d0a84e7d1a9340c0bfebdad10b25e555ce1b55
SHA5120e758164bd54ddb3ec9950257e1e959f33bc95dd29cb2106be890863ede56ca5de516fdbab89ba31fed78311f277fad2d50596604c69b07145bda57cd89465f2