Analysis
-
max time kernel
151s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 19:54
Static task
static1
Behavioral task
behavioral1
Sample
d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe
Resource
win10v2004-20220812-en
General
-
Target
d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe
-
Size
72KB
-
MD5
09df0f110dab8ee2b29e108567391aad
-
SHA1
344dd4049bd668f6a9e210ea639dccc0e67bdc07
-
SHA256
d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0
-
SHA512
edffd773927c2f2e3be5ab2dcaca9a97cd664d0b479b035de51247fda8a63d0f3f4c51a1cfff25255b49ff9aa119924c343b69d7bce1aa4dea8e89ab49845a00
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2/:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPr
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 2008 backup.exe 1496 backup.exe 940 backup.exe 1724 backup.exe 1528 backup.exe 1076 backup.exe 520 backup.exe 1676 data.exe 624 backup.exe 1620 backup.exe 1924 backup.exe 1416 backup.exe 1952 backup.exe 1012 System Restore.exe 944 backup.exe 340 backup.exe 1200 backup.exe 1864 backup.exe 1596 backup.exe 1984 backup.exe 980 backup.exe 900 backup.exe 2000 backup.exe 1480 backup.exe 1468 backup.exe 1700 backup.exe 1252 backup.exe 660 backup.exe 1080 backup.exe 1292 backup.exe 828 backup.exe 1036 backup.exe 1632 backup.exe 1072 backup.exe 1128 backup.exe 2024 backup.exe 1976 System Restore.exe 988 update.exe 1032 backup.exe 1492 backup.exe 888 backup.exe 1736 backup.exe 568 System Restore.exe 340 backup.exe 1772 backup.exe 1196 backup.exe 1056 backup.exe 1600 backup.exe 1760 backup.exe 2020 backup.exe 1272 backup.exe 1524 backup.exe 1756 backup.exe 1720 backup.exe 1380 backup.exe 1680 backup.exe 1100 backup.exe 276 backup.exe 816 backup.exe 1536 backup.exe 2036 backup.exe 1712 backup.exe 1076 backup.exe 1744 System Restore.exe -
Loads dropped DLL 64 IoCs
pid Process 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 1724 backup.exe 1724 backup.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 1076 backup.exe 1076 backup.exe 1724 backup.exe 1724 backup.exe 624 backup.exe 624 backup.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 1620 backup.exe 1620 backup.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 624 backup.exe 624 backup.exe 1012 System Restore.exe 1012 System Restore.exe 944 backup.exe 944 backup.exe 944 backup.exe 944 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1200 backup.exe 1724 backup.exe 1724 backup.exe 1200 backup.exe 1200 backup.exe 2000 backup.exe 2000 backup.exe 1200 backup.exe 1200 backup.exe 1468 backup.exe 1468 backup.exe 624 backup.exe 624 backup.exe 1012 System Restore.exe 1012 System Restore.exe 1200 backup.exe 1012 System Restore.exe 1252 backup.exe 660 backup.exe 660 backup.exe 1252 backup.exe 1012 System Restore.exe 660 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\update.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\update.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe System Restore.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe update.exe File opened for modification C:\Program Files (x86)\Google\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\update.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 2008 backup.exe 1496 backup.exe 940 backup.exe 1724 backup.exe 1076 backup.exe 1528 backup.exe 1676 data.exe 520 backup.exe 624 backup.exe 1620 backup.exe 1924 backup.exe 1416 backup.exe 1952 backup.exe 1012 System Restore.exe 944 backup.exe 340 backup.exe 1200 backup.exe 1864 backup.exe 1596 backup.exe 1984 backup.exe 980 backup.exe 900 backup.exe 2000 backup.exe 1480 backup.exe 1468 backup.exe 1700 backup.exe 1252 backup.exe 660 backup.exe 1080 backup.exe 1292 backup.exe 1036 backup.exe 828 backup.exe 1632 backup.exe 1072 backup.exe 1128 backup.exe 1032 backup.exe 1976 System Restore.exe 2024 backup.exe 1492 backup.exe 888 backup.exe 1736 backup.exe 568 System Restore.exe 340 backup.exe 1772 backup.exe 1196 backup.exe 1056 backup.exe 1600 backup.exe 1760 backup.exe 2020 backup.exe 1272 backup.exe 1524 backup.exe 1756 backup.exe 1720 backup.exe 1380 backup.exe 1680 backup.exe 1100 backup.exe 276 backup.exe 816 backup.exe 1536 backup.exe 2036 backup.exe 1744 System Restore.exe 1076 backup.exe 1784 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 784 wrote to memory of 2008 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 26 PID 784 wrote to memory of 2008 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 26 PID 784 wrote to memory of 2008 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 26 PID 784 wrote to memory of 2008 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 26 PID 784 wrote to memory of 1496 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 27 PID 784 wrote to memory of 1496 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 27 PID 784 wrote to memory of 1496 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 27 PID 784 wrote to memory of 1496 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 27 PID 784 wrote to memory of 940 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 28 PID 784 wrote to memory of 940 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 28 PID 784 wrote to memory of 940 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 28 PID 784 wrote to memory of 940 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 28 PID 2008 wrote to memory of 1724 2008 backup.exe 29 PID 2008 wrote to memory of 1724 2008 backup.exe 29 PID 2008 wrote to memory of 1724 2008 backup.exe 29 PID 2008 wrote to memory of 1724 2008 backup.exe 29 PID 784 wrote to memory of 1528 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 30 PID 784 wrote to memory of 1528 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 30 PID 784 wrote to memory of 1528 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 30 PID 784 wrote to memory of 1528 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 30 PID 1724 wrote to memory of 1076 1724 backup.exe 31 PID 1724 wrote to memory of 1076 1724 backup.exe 31 PID 1724 wrote to memory of 1076 1724 backup.exe 31 PID 1724 wrote to memory of 1076 1724 backup.exe 31 PID 784 wrote to memory of 520 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 32 PID 784 wrote to memory of 520 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 32 PID 784 wrote to memory of 520 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 32 PID 784 wrote to memory of 520 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 32 PID 1076 wrote to memory of 1676 1076 backup.exe 33 PID 1076 wrote to memory of 1676 1076 backup.exe 33 PID 1076 wrote to memory of 1676 1076 backup.exe 33 PID 1076 wrote to memory of 1676 1076 backup.exe 33 PID 1724 wrote to memory of 624 1724 backup.exe 34 PID 1724 wrote to memory of 624 1724 backup.exe 34 PID 1724 wrote to memory of 624 1724 backup.exe 34 PID 1724 wrote to memory of 624 1724 backup.exe 34 PID 624 wrote to memory of 1620 624 backup.exe 35 PID 624 wrote to memory of 1620 624 backup.exe 35 PID 624 wrote to memory of 1620 624 backup.exe 35 PID 624 wrote to memory of 1620 624 backup.exe 35 PID 784 wrote to memory of 1924 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 36 PID 784 wrote to memory of 1924 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 36 PID 784 wrote to memory of 1924 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 36 PID 784 wrote to memory of 1924 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 36 PID 1620 wrote to memory of 1416 1620 backup.exe 37 PID 1620 wrote to memory of 1416 1620 backup.exe 37 PID 1620 wrote to memory of 1416 1620 backup.exe 37 PID 1620 wrote to memory of 1416 1620 backup.exe 37 PID 784 wrote to memory of 1952 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 38 PID 784 wrote to memory of 1952 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 38 PID 784 wrote to memory of 1952 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 38 PID 784 wrote to memory of 1952 784 d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe 38 PID 624 wrote to memory of 1012 624 backup.exe 39 PID 624 wrote to memory of 1012 624 backup.exe 39 PID 624 wrote to memory of 1012 624 backup.exe 39 PID 624 wrote to memory of 1012 624 backup.exe 39 PID 1012 wrote to memory of 944 1012 System Restore.exe 40 PID 1012 wrote to memory of 944 1012 System Restore.exe 40 PID 1012 wrote to memory of 944 1012 System Restore.exe 40 PID 1012 wrote to memory of 944 1012 System Restore.exe 40 PID 944 wrote to memory of 340 944 backup.exe 41 PID 944 wrote to memory of 340 944 backup.exe 41 PID 944 wrote to memory of 340 944 backup.exe 41 PID 944 wrote to memory of 340 944 backup.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe"C:\Users\Admin\AppData\Local\Temp\d6412214e082e94c67f56084e6f8d6fe3373cd2ef78fa66503585f194ecc5ec0.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\120763720\backup.exeC:\Users\Admin\AppData\Local\Temp\120763720\backup.exe C:\Users\Admin\AppData\Local\Temp\120763720\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1724 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\PerfLogs\Admin\data.exeC:\PerfLogs\Admin\data.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1620 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1416
-
-
-
C:\Program Files\Common Files\System Restore.exe"C:\Program Files\Common Files\System Restore.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:944 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:340
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1200 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:900
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
PID:988
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:1480
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:1384
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:2128
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:2236
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:872
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:468
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1884 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:1376
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1960
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1184
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1752
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:2136
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2252
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:828 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1072
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1400
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1468
-
-
C:\Program Files\Common Files\System\ado\ja-JP\update.exe"C:\Program Files\Common Files\System\ado\ja-JP\update.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1416
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:560
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:992
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:276
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1912
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:2060
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:2160
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:2280
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:660 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1036
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Program Files\DVD Maker\fr-FR\System Restore.exe"C:\Program Files\DVD Maker\fr-FR\System Restore.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:276
-
-
C:\Program Files\DVD Maker\Shared\data.exe"C:\Program Files\DVD Maker\Shared\data.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:592 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1352 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵PID:1672
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:572
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:1540
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵PID:1740
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\System Restore.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\System Restore.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵PID:2088
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\8⤵PID:2200
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\8⤵PID:2304
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816 -
C:\Program Files\Google\Chrome\System Restore.exe"C:\Program Files\Google\Chrome\System Restore.exe" C:\Program Files\Google\Chrome\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1748 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1260
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1620
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1168
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:888
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1104
-
-
C:\Program Files\Mozilla Firefox\System Restore.exe"C:\Program Files\Mozilla Firefox\System Restore.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2116
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2244
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1468 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1252 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1976 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:888
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1100 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:2032 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵PID:1756
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1612
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:692
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1796
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1684
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:2172
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1992 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:1940
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:2144
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:2260
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:2040
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1272 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1720
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1752 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\8⤵PID:1492
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:596
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\update.exe"C:\Program Files (x86)\Common Files\Adobe AIR\update.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1924
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1640
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:684
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:980
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:2080
-
-
C:\Program Files (x86)\Common Files\System\backup.exe"C:\Program Files (x86)\Common Files\System\backup.exe" C:\Program Files (x86)\Common Files\System\6⤵PID:2212
-
-
-
C:\Program Files (x86)\Google\data.exe"C:\Program Files (x86)\Google\data.exe" C:\Program Files (x86)\Google\5⤵PID:824
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:764
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:2288
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:340 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1056 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\Documents\System Restore.exe"C:\Users\Admin\Documents\System Restore.exe" C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
PID:1476
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1988
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:828
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1204
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:1396
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:1468
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:2108
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵PID:2228
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1544
-
-
-
C:\Windows\update.exeC:\Windows\update.exe C:\Windows\4⤵PID:1292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5c32c4a395fde47c702c06af64664952f
SHA1fc3781d57ef63f20344a2cb1458a77524e3ae8a3
SHA2565e4a354d208ba0977d510936daa2563ef301e993d270a4466deafabbe1d1d478
SHA5123b4926d1d85548cef8996a322d46ede3d0eec67a4fb85c959c2c7e1c7751463ec442bab3e17d18233221a43aac122b79f9ae1e7baa8bc5a946d2d0cf485f6e98
-
Filesize
72KB
MD5d0de8414bea8ae7a7cebf4096a301c73
SHA12b55d6061dc09f6569c2009bb21ffbde25168580
SHA2560e59ffaf4c5a4c03a64857dcc7d90012e286395a5ead1fa2e71ae02935b214a9
SHA5126aae9b68683555fb6856eeaa9a5cf698c9c0ca2c06d25ec6c32597a35220b95de7d2468178079f5581eb5f87959bb7cf39004b983cf20768a18a03ab98355028
-
Filesize
72KB
MD5d0de8414bea8ae7a7cebf4096a301c73
SHA12b55d6061dc09f6569c2009bb21ffbde25168580
SHA2560e59ffaf4c5a4c03a64857dcc7d90012e286395a5ead1fa2e71ae02935b214a9
SHA5126aae9b68683555fb6856eeaa9a5cf698c9c0ca2c06d25ec6c32597a35220b95de7d2468178079f5581eb5f87959bb7cf39004b983cf20768a18a03ab98355028
-
Filesize
72KB
MD506a6efdd3e4689ec6d823250f2535e75
SHA16236b75c7e13aa6ea816721b22b852c1396f898c
SHA2569cbdbb4a7c1939508502bc89b6a08c2885198a075edc26c07f33a84a43d5e1fe
SHA5122e547da11d922bfabd10af7e057b4ecc81f163617caece9174a1758f306180367a888ca67f7e507487437dfa46ca34917359f574286271f003d46b0adf94b5cd
-
Filesize
72KB
MD5b246816c2bcbc21b51e9954a977ac2a5
SHA10a0db74f664157cedc76eb419b0c5919e959c34d
SHA2569684ad11dfcdedc7eaa220fd90902d60a98b38d681140907601897146319e6e1
SHA51262e0046fe38840c90a4920f89d62f4a5b972a87c6030e316057430caf052009b967e255450a03368c17f0cea252cc6469bda0afd0bf09decf0b01b2be814da33
-
Filesize
72KB
MD5b246816c2bcbc21b51e9954a977ac2a5
SHA10a0db74f664157cedc76eb419b0c5919e959c34d
SHA2569684ad11dfcdedc7eaa220fd90902d60a98b38d681140907601897146319e6e1
SHA51262e0046fe38840c90a4920f89d62f4a5b972a87c6030e316057430caf052009b967e255450a03368c17f0cea252cc6469bda0afd0bf09decf0b01b2be814da33
-
Filesize
72KB
MD5840797839e5adabac09f5343a2ef6c5c
SHA1cd7e88d5c7af65fc25a960fc87a40f7b0b70b6d9
SHA2565dfe0bd59d35ab62434fe63a9558bff1049b4472837cff90c74e79369b49a0cd
SHA51217730ce43c634220129a2ab3ddd64a732cb113d297d56c79fa2cfe694ec52241bf43fce315114c5257d917f6429b94015ea69b1e76f5513a78f6d242ab686ce2
-
Filesize
72KB
MD5bbc4cac20da2691d29e3896d6314af8b
SHA1cce6984cbd0637015728338d771de6b6dad500af
SHA25692a66ef827ac19f07e5c74524e620a9b44be88c443d640bb8eb61238831efb9a
SHA512a6cc313b26c0e32682d76e2644318a9e519bf2a9b6235f3a560f54ae3282282b60980c42d9011bfae6b7e36c4ade165f9c8143df1a16a9da8abf334e80ef1957
-
Filesize
72KB
MD5bbc4cac20da2691d29e3896d6314af8b
SHA1cce6984cbd0637015728338d771de6b6dad500af
SHA25692a66ef827ac19f07e5c74524e620a9b44be88c443d640bb8eb61238831efb9a
SHA512a6cc313b26c0e32682d76e2644318a9e519bf2a9b6235f3a560f54ae3282282b60980c42d9011bfae6b7e36c4ade165f9c8143df1a16a9da8abf334e80ef1957
-
Filesize
72KB
MD589559a848d23662799ab7a3ba6f84873
SHA17526195babff189a224999ccf2a5c70dbab8857e
SHA256892b0e19379e0c2dccfdbf2d2bce45e8934c0de635b7a0de5477500087934ed0
SHA512b5b36d2feee8e3887161d05e46f1f4bbdf6737b55b3d9a38cf0263da22f98cc165303c4184440a700f69f42cb1f88f941ac0224a7e14946d9df722bbc3adea1b
-
Filesize
72KB
MD5b69b4b3f9c4a000ce7f18f8f2dc1dc13
SHA10612656aa8a6f47f770be8050a12551ee5e73674
SHA2567268434fc73cf6340a2e763e031e13ded3245921dbe9f89f413533f0159f7c8b
SHA51275079d52555bf48a3abdfc9c4467c4605b145ac2063760e47df2d4a44266ec51058c0d77ad85b9c1b8ccab990a948b46da944118f818b2ae4dabdd427d200953
-
Filesize
72KB
MD5b69b4b3f9c4a000ce7f18f8f2dc1dc13
SHA10612656aa8a6f47f770be8050a12551ee5e73674
SHA2567268434fc73cf6340a2e763e031e13ded3245921dbe9f89f413533f0159f7c8b
SHA51275079d52555bf48a3abdfc9c4467c4605b145ac2063760e47df2d4a44266ec51058c0d77ad85b9c1b8ccab990a948b46da944118f818b2ae4dabdd427d200953
-
Filesize
72KB
MD526720ea4d3a0adf9f17b981037a05932
SHA17c16f0c37bf6ef727349b1c2fa3665b156e683bc
SHA2560d0297ebc67fc5465561c3f798875f9e40184557f896d1b6f90476e9e08424f1
SHA5123acb4963f5cb0d5b47e80d0f6484a55e4e5e2a806d8deeca3bd3944f93e8d618fe31a03f221ea971b59388005743b7ba55231a9af2a029bc7bedd6b94fd4bb71
-
Filesize
72KB
MD5e995f9ac3d893ddf8c6d86bb0c72a8d2
SHA1ca292b9e02ead3a0e80371b997f45328f1ce93f2
SHA256f482ad39a07db33cfe9308c06cc431547eda7b9c51c617d3836ac49877391add
SHA5123f6b838dbad12c1809d762cb3bdddc7bab10ac6d02dd72665b35a3399073b03f8ba194413d257616c605c63decbc3d89678b98d9124776102c0dfbb3d23067d4
-
Filesize
72KB
MD5e995f9ac3d893ddf8c6d86bb0c72a8d2
SHA1ca292b9e02ead3a0e80371b997f45328f1ce93f2
SHA256f482ad39a07db33cfe9308c06cc431547eda7b9c51c617d3836ac49877391add
SHA5123f6b838dbad12c1809d762cb3bdddc7bab10ac6d02dd72665b35a3399073b03f8ba194413d257616c605c63decbc3d89678b98d9124776102c0dfbb3d23067d4
-
Filesize
72KB
MD5ec96a9f6e3b1045e05c7c68d449f1a4a
SHA147e8700966ead3fda6426fde8f033224551df9ca
SHA256fc233e425cb42dd8dc37edb307ce24c7d6412931b12ad7f9ecdacf3f81a8b450
SHA51204586153e0111f0721ad1925010888106e4a782976f270ea82b868311caca2f47e984c269e945a905159a9c58e96ff2f07997895c187c57cbd75ce0352aa8809
-
Filesize
72KB
MD5ec96a9f6e3b1045e05c7c68d449f1a4a
SHA147e8700966ead3fda6426fde8f033224551df9ca
SHA256fc233e425cb42dd8dc37edb307ce24c7d6412931b12ad7f9ecdacf3f81a8b450
SHA51204586153e0111f0721ad1925010888106e4a782976f270ea82b868311caca2f47e984c269e945a905159a9c58e96ff2f07997895c187c57cbd75ce0352aa8809
-
Filesize
72KB
MD5891ff68865f3eafe89f6b111c7ab7c4f
SHA119ad0e9ae6eb3bf0ca94e7e65330bc1641b47c3f
SHA256a10a8081c82bda7e86cbac5d7dacf984029384518303fd15c85a369ffd90bf86
SHA5123e998fc2d66cd567cfe381066a4336ddb3718a364cadf3a4286706f874e172775a0fb87c8aa6422dff94615d69480cbfd68482533982e01442c78c525a6bd9c7
-
Filesize
72KB
MD5891ff68865f3eafe89f6b111c7ab7c4f
SHA119ad0e9ae6eb3bf0ca94e7e65330bc1641b47c3f
SHA256a10a8081c82bda7e86cbac5d7dacf984029384518303fd15c85a369ffd90bf86
SHA5123e998fc2d66cd567cfe381066a4336ddb3718a364cadf3a4286706f874e172775a0fb87c8aa6422dff94615d69480cbfd68482533982e01442c78c525a6bd9c7
-
Filesize
72KB
MD57e72609bfbce2b24f49e1939655a1c1e
SHA1e9a8768d8790ae373a1ae2d4f21e84a809690dc5
SHA2564d27e3e36329a977de2efda526101820e6a9e4789668a24927bcd5758461c500
SHA512f5511ed2b7b1153e1977509e509962664821567dcb9d4d6b483ce9b576a902f0d9c7c379b7239dd17be7b100e74e68ba3400e79660c3661f4909a2d00f99c792
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52136f2287adead8793e036ade7f45941
SHA127491f17e289a6f848bc8a427d51ab0521ba2f1c
SHA2567fe8a41c52b5055249e076565c6f6adecbe9c747915d6ef8903f708540581989
SHA51230dff8346fcd95e09494b70f604a2ff9c876ab75e1e8f4de9b69ce72c45d44ea4022001bd4a651beadbbe9a28a977ab0fb2c53dd8ac0bc665fbdd25ccfe1869b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD57a8f080592559246018c02cfa896b398
SHA1771e663bcb097a7fc03138dcb4a66c28f7acf1b4
SHA256d73700234bba7c496979547b1b7903863077649d4b3bd950a2ef2e9cc52e31d1
SHA512545338e7c5de9c40c9d2d5311bdd96950927fa6b7d4a1a2d36b2cc69dbe72de9b7d54b67a5107b15b7dc1b7636101e66eac0bb44aacfb6069d980a578c333a2a
-
Filesize
72KB
MD5a4582522ec681295b36d84c825647da6
SHA154156de14fcd22e8eb2effcbd7b997523bd64c78
SHA2566f6a170cbd2535119c451961fbe94264b4e92bb0db54cf4d560859598f47d7d5
SHA512b66f0945c3b01c49b2cd26c1b781ab5baf207499531fcc76a76738e0138f67a97c383531489b42d061db54408d858cd02838777c4b206e88ab86e7f8e825c1b6
-
Filesize
72KB
MD5891ff68865f3eafe89f6b111c7ab7c4f
SHA119ad0e9ae6eb3bf0ca94e7e65330bc1641b47c3f
SHA256a10a8081c82bda7e86cbac5d7dacf984029384518303fd15c85a369ffd90bf86
SHA5123e998fc2d66cd567cfe381066a4336ddb3718a364cadf3a4286706f874e172775a0fb87c8aa6422dff94615d69480cbfd68482533982e01442c78c525a6bd9c7
-
Filesize
72KB
MD57b7760728bf322caaa4d04cddb30aa7b
SHA132a9fa32d44a179a3fc3bfc219e70c36033139b8
SHA2561b1e56f2320d80bb53d08b130eb1a61af1eef848be845ca9d539a695e957d3ab
SHA51213ae401bbf96cc6b17a0d62751152bb253eed959b30792d6f3932448d45a90d525ebd7501e5fec2cfeffb1456d8cfbe8407026891a45e1b80156cd18e9e33b7b
-
Filesize
72KB
MD512bf375e8cd71f4a657869ef91ad08bb
SHA1e2e45cdc55f9294aa2461e003b08af230f210375
SHA256f5d37a2ca08d4ee559599e64b5477f2af5af0f8cc1471382f04226cb44783de2
SHA512318efebb9fe167d8a6e29097c6e0af8224d423f56bfca177f2ddac4298cb23f81c51c1e666ef3a5191c6438531a11096ea2f41cb66178371e675bf74818938bc
-
Filesize
72KB
MD512bf375e8cd71f4a657869ef91ad08bb
SHA1e2e45cdc55f9294aa2461e003b08af230f210375
SHA256f5d37a2ca08d4ee559599e64b5477f2af5af0f8cc1471382f04226cb44783de2
SHA512318efebb9fe167d8a6e29097c6e0af8224d423f56bfca177f2ddac4298cb23f81c51c1e666ef3a5191c6438531a11096ea2f41cb66178371e675bf74818938bc
-
Filesize
72KB
MD5c32c4a395fde47c702c06af64664952f
SHA1fc3781d57ef63f20344a2cb1458a77524e3ae8a3
SHA2565e4a354d208ba0977d510936daa2563ef301e993d270a4466deafabbe1d1d478
SHA5123b4926d1d85548cef8996a322d46ede3d0eec67a4fb85c959c2c7e1c7751463ec442bab3e17d18233221a43aac122b79f9ae1e7baa8bc5a946d2d0cf485f6e98
-
Filesize
72KB
MD5c32c4a395fde47c702c06af64664952f
SHA1fc3781d57ef63f20344a2cb1458a77524e3ae8a3
SHA2565e4a354d208ba0977d510936daa2563ef301e993d270a4466deafabbe1d1d478
SHA5123b4926d1d85548cef8996a322d46ede3d0eec67a4fb85c959c2c7e1c7751463ec442bab3e17d18233221a43aac122b79f9ae1e7baa8bc5a946d2d0cf485f6e98
-
Filesize
72KB
MD5d0de8414bea8ae7a7cebf4096a301c73
SHA12b55d6061dc09f6569c2009bb21ffbde25168580
SHA2560e59ffaf4c5a4c03a64857dcc7d90012e286395a5ead1fa2e71ae02935b214a9
SHA5126aae9b68683555fb6856eeaa9a5cf698c9c0ca2c06d25ec6c32597a35220b95de7d2468178079f5581eb5f87959bb7cf39004b983cf20768a18a03ab98355028
-
Filesize
72KB
MD5d0de8414bea8ae7a7cebf4096a301c73
SHA12b55d6061dc09f6569c2009bb21ffbde25168580
SHA2560e59ffaf4c5a4c03a64857dcc7d90012e286395a5ead1fa2e71ae02935b214a9
SHA5126aae9b68683555fb6856eeaa9a5cf698c9c0ca2c06d25ec6c32597a35220b95de7d2468178079f5581eb5f87959bb7cf39004b983cf20768a18a03ab98355028
-
Filesize
72KB
MD506a6efdd3e4689ec6d823250f2535e75
SHA16236b75c7e13aa6ea816721b22b852c1396f898c
SHA2569cbdbb4a7c1939508502bc89b6a08c2885198a075edc26c07f33a84a43d5e1fe
SHA5122e547da11d922bfabd10af7e057b4ecc81f163617caece9174a1758f306180367a888ca67f7e507487437dfa46ca34917359f574286271f003d46b0adf94b5cd
-
Filesize
72KB
MD506a6efdd3e4689ec6d823250f2535e75
SHA16236b75c7e13aa6ea816721b22b852c1396f898c
SHA2569cbdbb4a7c1939508502bc89b6a08c2885198a075edc26c07f33a84a43d5e1fe
SHA5122e547da11d922bfabd10af7e057b4ecc81f163617caece9174a1758f306180367a888ca67f7e507487437dfa46ca34917359f574286271f003d46b0adf94b5cd
-
Filesize
72KB
MD5b246816c2bcbc21b51e9954a977ac2a5
SHA10a0db74f664157cedc76eb419b0c5919e959c34d
SHA2569684ad11dfcdedc7eaa220fd90902d60a98b38d681140907601897146319e6e1
SHA51262e0046fe38840c90a4920f89d62f4a5b972a87c6030e316057430caf052009b967e255450a03368c17f0cea252cc6469bda0afd0bf09decf0b01b2be814da33
-
Filesize
72KB
MD5b246816c2bcbc21b51e9954a977ac2a5
SHA10a0db74f664157cedc76eb419b0c5919e959c34d
SHA2569684ad11dfcdedc7eaa220fd90902d60a98b38d681140907601897146319e6e1
SHA51262e0046fe38840c90a4920f89d62f4a5b972a87c6030e316057430caf052009b967e255450a03368c17f0cea252cc6469bda0afd0bf09decf0b01b2be814da33
-
Filesize
72KB
MD5840797839e5adabac09f5343a2ef6c5c
SHA1cd7e88d5c7af65fc25a960fc87a40f7b0b70b6d9
SHA2565dfe0bd59d35ab62434fe63a9558bff1049b4472837cff90c74e79369b49a0cd
SHA51217730ce43c634220129a2ab3ddd64a732cb113d297d56c79fa2cfe694ec52241bf43fce315114c5257d917f6429b94015ea69b1e76f5513a78f6d242ab686ce2
-
Filesize
72KB
MD5840797839e5adabac09f5343a2ef6c5c
SHA1cd7e88d5c7af65fc25a960fc87a40f7b0b70b6d9
SHA2565dfe0bd59d35ab62434fe63a9558bff1049b4472837cff90c74e79369b49a0cd
SHA51217730ce43c634220129a2ab3ddd64a732cb113d297d56c79fa2cfe694ec52241bf43fce315114c5257d917f6429b94015ea69b1e76f5513a78f6d242ab686ce2
-
Filesize
72KB
MD5bbc4cac20da2691d29e3896d6314af8b
SHA1cce6984cbd0637015728338d771de6b6dad500af
SHA25692a66ef827ac19f07e5c74524e620a9b44be88c443d640bb8eb61238831efb9a
SHA512a6cc313b26c0e32682d76e2644318a9e519bf2a9b6235f3a560f54ae3282282b60980c42d9011bfae6b7e36c4ade165f9c8143df1a16a9da8abf334e80ef1957
-
Filesize
72KB
MD5bbc4cac20da2691d29e3896d6314af8b
SHA1cce6984cbd0637015728338d771de6b6dad500af
SHA25692a66ef827ac19f07e5c74524e620a9b44be88c443d640bb8eb61238831efb9a
SHA512a6cc313b26c0e32682d76e2644318a9e519bf2a9b6235f3a560f54ae3282282b60980c42d9011bfae6b7e36c4ade165f9c8143df1a16a9da8abf334e80ef1957
-
Filesize
72KB
MD589559a848d23662799ab7a3ba6f84873
SHA17526195babff189a224999ccf2a5c70dbab8857e
SHA256892b0e19379e0c2dccfdbf2d2bce45e8934c0de635b7a0de5477500087934ed0
SHA512b5b36d2feee8e3887161d05e46f1f4bbdf6737b55b3d9a38cf0263da22f98cc165303c4184440a700f69f42cb1f88f941ac0224a7e14946d9df722bbc3adea1b
-
Filesize
72KB
MD589559a848d23662799ab7a3ba6f84873
SHA17526195babff189a224999ccf2a5c70dbab8857e
SHA256892b0e19379e0c2dccfdbf2d2bce45e8934c0de635b7a0de5477500087934ed0
SHA512b5b36d2feee8e3887161d05e46f1f4bbdf6737b55b3d9a38cf0263da22f98cc165303c4184440a700f69f42cb1f88f941ac0224a7e14946d9df722bbc3adea1b
-
Filesize
72KB
MD5b69b4b3f9c4a000ce7f18f8f2dc1dc13
SHA10612656aa8a6f47f770be8050a12551ee5e73674
SHA2567268434fc73cf6340a2e763e031e13ded3245921dbe9f89f413533f0159f7c8b
SHA51275079d52555bf48a3abdfc9c4467c4605b145ac2063760e47df2d4a44266ec51058c0d77ad85b9c1b8ccab990a948b46da944118f818b2ae4dabdd427d200953
-
Filesize
72KB
MD5b69b4b3f9c4a000ce7f18f8f2dc1dc13
SHA10612656aa8a6f47f770be8050a12551ee5e73674
SHA2567268434fc73cf6340a2e763e031e13ded3245921dbe9f89f413533f0159f7c8b
SHA51275079d52555bf48a3abdfc9c4467c4605b145ac2063760e47df2d4a44266ec51058c0d77ad85b9c1b8ccab990a948b46da944118f818b2ae4dabdd427d200953
-
Filesize
72KB
MD526720ea4d3a0adf9f17b981037a05932
SHA17c16f0c37bf6ef727349b1c2fa3665b156e683bc
SHA2560d0297ebc67fc5465561c3f798875f9e40184557f896d1b6f90476e9e08424f1
SHA5123acb4963f5cb0d5b47e80d0f6484a55e4e5e2a806d8deeca3bd3944f93e8d618fe31a03f221ea971b59388005743b7ba55231a9af2a029bc7bedd6b94fd4bb71
-
Filesize
72KB
MD526720ea4d3a0adf9f17b981037a05932
SHA17c16f0c37bf6ef727349b1c2fa3665b156e683bc
SHA2560d0297ebc67fc5465561c3f798875f9e40184557f896d1b6f90476e9e08424f1
SHA5123acb4963f5cb0d5b47e80d0f6484a55e4e5e2a806d8deeca3bd3944f93e8d618fe31a03f221ea971b59388005743b7ba55231a9af2a029bc7bedd6b94fd4bb71
-
Filesize
72KB
MD58cc414b354aa33c3bd27cdee7e06aeb0
SHA178171a696dfb8f8e28d3c7eb32d74ad4ff0af389
SHA2564420ae50350cdad75b8a9def4d6946597fd886ee076a67d5f702881d867153a0
SHA512f2c95938f44bb378c069d55102965a8f3e30ad47707197b0b19182bfe7edee4b6bea4230f2ccd20d5a52fcdbca5666b7c9407f60872563da57a357e08ee94359
-
Filesize
72KB
MD5e995f9ac3d893ddf8c6d86bb0c72a8d2
SHA1ca292b9e02ead3a0e80371b997f45328f1ce93f2
SHA256f482ad39a07db33cfe9308c06cc431547eda7b9c51c617d3836ac49877391add
SHA5123f6b838dbad12c1809d762cb3bdddc7bab10ac6d02dd72665b35a3399073b03f8ba194413d257616c605c63decbc3d89678b98d9124776102c0dfbb3d23067d4
-
Filesize
72KB
MD5e995f9ac3d893ddf8c6d86bb0c72a8d2
SHA1ca292b9e02ead3a0e80371b997f45328f1ce93f2
SHA256f482ad39a07db33cfe9308c06cc431547eda7b9c51c617d3836ac49877391add
SHA5123f6b838dbad12c1809d762cb3bdddc7bab10ac6d02dd72665b35a3399073b03f8ba194413d257616c605c63decbc3d89678b98d9124776102c0dfbb3d23067d4
-
Filesize
72KB
MD5ec96a9f6e3b1045e05c7c68d449f1a4a
SHA147e8700966ead3fda6426fde8f033224551df9ca
SHA256fc233e425cb42dd8dc37edb307ce24c7d6412931b12ad7f9ecdacf3f81a8b450
SHA51204586153e0111f0721ad1925010888106e4a782976f270ea82b868311caca2f47e984c269e945a905159a9c58e96ff2f07997895c187c57cbd75ce0352aa8809
-
Filesize
72KB
MD5ec96a9f6e3b1045e05c7c68d449f1a4a
SHA147e8700966ead3fda6426fde8f033224551df9ca
SHA256fc233e425cb42dd8dc37edb307ce24c7d6412931b12ad7f9ecdacf3f81a8b450
SHA51204586153e0111f0721ad1925010888106e4a782976f270ea82b868311caca2f47e984c269e945a905159a9c58e96ff2f07997895c187c57cbd75ce0352aa8809
-
Filesize
72KB
MD5891ff68865f3eafe89f6b111c7ab7c4f
SHA119ad0e9ae6eb3bf0ca94e7e65330bc1641b47c3f
SHA256a10a8081c82bda7e86cbac5d7dacf984029384518303fd15c85a369ffd90bf86
SHA5123e998fc2d66cd567cfe381066a4336ddb3718a364cadf3a4286706f874e172775a0fb87c8aa6422dff94615d69480cbfd68482533982e01442c78c525a6bd9c7
-
Filesize
72KB
MD5891ff68865f3eafe89f6b111c7ab7c4f
SHA119ad0e9ae6eb3bf0ca94e7e65330bc1641b47c3f
SHA256a10a8081c82bda7e86cbac5d7dacf984029384518303fd15c85a369ffd90bf86
SHA5123e998fc2d66cd567cfe381066a4336ddb3718a364cadf3a4286706f874e172775a0fb87c8aa6422dff94615d69480cbfd68482533982e01442c78c525a6bd9c7
-
Filesize
72KB
MD57e72609bfbce2b24f49e1939655a1c1e
SHA1e9a8768d8790ae373a1ae2d4f21e84a809690dc5
SHA2564d27e3e36329a977de2efda526101820e6a9e4789668a24927bcd5758461c500
SHA512f5511ed2b7b1153e1977509e509962664821567dcb9d4d6b483ce9b576a902f0d9c7c379b7239dd17be7b100e74e68ba3400e79660c3661f4909a2d00f99c792
-
Filesize
72KB
MD57e72609bfbce2b24f49e1939655a1c1e
SHA1e9a8768d8790ae373a1ae2d4f21e84a809690dc5
SHA2564d27e3e36329a977de2efda526101820e6a9e4789668a24927bcd5758461c500
SHA512f5511ed2b7b1153e1977509e509962664821567dcb9d4d6b483ce9b576a902f0d9c7c379b7239dd17be7b100e74e68ba3400e79660c3661f4909a2d00f99c792
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52136f2287adead8793e036ade7f45941
SHA127491f17e289a6f848bc8a427d51ab0521ba2f1c
SHA2567fe8a41c52b5055249e076565c6f6adecbe9c747915d6ef8903f708540581989
SHA51230dff8346fcd95e09494b70f604a2ff9c876ab75e1e8f4de9b69ce72c45d44ea4022001bd4a651beadbbe9a28a977ab0fb2c53dd8ac0bc665fbdd25ccfe1869b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52136f2287adead8793e036ade7f45941
SHA127491f17e289a6f848bc8a427d51ab0521ba2f1c
SHA2567fe8a41c52b5055249e076565c6f6adecbe9c747915d6ef8903f708540581989
SHA51230dff8346fcd95e09494b70f604a2ff9c876ab75e1e8f4de9b69ce72c45d44ea4022001bd4a651beadbbe9a28a977ab0fb2c53dd8ac0bc665fbdd25ccfe1869b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD57a8f080592559246018c02cfa896b398
SHA1771e663bcb097a7fc03138dcb4a66c28f7acf1b4
SHA256d73700234bba7c496979547b1b7903863077649d4b3bd950a2ef2e9cc52e31d1
SHA512545338e7c5de9c40c9d2d5311bdd96950927fa6b7d4a1a2d36b2cc69dbe72de9b7d54b67a5107b15b7dc1b7636101e66eac0bb44aacfb6069d980a578c333a2a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD57a8f080592559246018c02cfa896b398
SHA1771e663bcb097a7fc03138dcb4a66c28f7acf1b4
SHA256d73700234bba7c496979547b1b7903863077649d4b3bd950a2ef2e9cc52e31d1
SHA512545338e7c5de9c40c9d2d5311bdd96950927fa6b7d4a1a2d36b2cc69dbe72de9b7d54b67a5107b15b7dc1b7636101e66eac0bb44aacfb6069d980a578c333a2a
-
Filesize
72KB
MD5a4582522ec681295b36d84c825647da6
SHA154156de14fcd22e8eb2effcbd7b997523bd64c78
SHA2566f6a170cbd2535119c451961fbe94264b4e92bb0db54cf4d560859598f47d7d5
SHA512b66f0945c3b01c49b2cd26c1b781ab5baf207499531fcc76a76738e0138f67a97c383531489b42d061db54408d858cd02838777c4b206e88ab86e7f8e825c1b6
-
Filesize
72KB
MD5a4582522ec681295b36d84c825647da6
SHA154156de14fcd22e8eb2effcbd7b997523bd64c78
SHA2566f6a170cbd2535119c451961fbe94264b4e92bb0db54cf4d560859598f47d7d5
SHA512b66f0945c3b01c49b2cd26c1b781ab5baf207499531fcc76a76738e0138f67a97c383531489b42d061db54408d858cd02838777c4b206e88ab86e7f8e825c1b6
-
Filesize
72KB
MD5891ff68865f3eafe89f6b111c7ab7c4f
SHA119ad0e9ae6eb3bf0ca94e7e65330bc1641b47c3f
SHA256a10a8081c82bda7e86cbac5d7dacf984029384518303fd15c85a369ffd90bf86
SHA5123e998fc2d66cd567cfe381066a4336ddb3718a364cadf3a4286706f874e172775a0fb87c8aa6422dff94615d69480cbfd68482533982e01442c78c525a6bd9c7
-
Filesize
72KB
MD5891ff68865f3eafe89f6b111c7ab7c4f
SHA119ad0e9ae6eb3bf0ca94e7e65330bc1641b47c3f
SHA256a10a8081c82bda7e86cbac5d7dacf984029384518303fd15c85a369ffd90bf86
SHA5123e998fc2d66cd567cfe381066a4336ddb3718a364cadf3a4286706f874e172775a0fb87c8aa6422dff94615d69480cbfd68482533982e01442c78c525a6bd9c7
-
Filesize
72KB
MD57b7760728bf322caaa4d04cddb30aa7b
SHA132a9fa32d44a179a3fc3bfc219e70c36033139b8
SHA2561b1e56f2320d80bb53d08b130eb1a61af1eef848be845ca9d539a695e957d3ab
SHA51213ae401bbf96cc6b17a0d62751152bb253eed959b30792d6f3932448d45a90d525ebd7501e5fec2cfeffb1456d8cfbe8407026891a45e1b80156cd18e9e33b7b
-
Filesize
72KB
MD57b7760728bf322caaa4d04cddb30aa7b
SHA132a9fa32d44a179a3fc3bfc219e70c36033139b8
SHA2561b1e56f2320d80bb53d08b130eb1a61af1eef848be845ca9d539a695e957d3ab
SHA51213ae401bbf96cc6b17a0d62751152bb253eed959b30792d6f3932448d45a90d525ebd7501e5fec2cfeffb1456d8cfbe8407026891a45e1b80156cd18e9e33b7b