Analysis
-
max time kernel
208s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe
Resource
win10v2004-20221111-en
General
-
Target
4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe
-
Size
72KB
-
MD5
0817bf5403c6d66e3242843dbe16270b
-
SHA1
a77862e9ab7f5a1835674b9ba9bb316ae59e7750
-
SHA256
4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5
-
SHA512
bc49cf38082f8416921aedbff6e9883b3cab7a126ed03b5acd63a662ad27aef1cff7b36e676201557f49e5d42cd13c53f92b41b32fede280bd5cb3c166212d19
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2D:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1112 backup.exe 1220 backup.exe 788 backup.exe 1064 backup.exe 752 backup.exe 1992 backup.exe 1680 backup.exe 384 backup.exe 1676 backup.exe 1528 backup.exe 1480 backup.exe 1404 backup.exe 1076 backup.exe 1956 backup.exe 1548 backup.exe 1780 backup.exe 1440 backup.exe 1488 backup.exe 1592 backup.exe 1924 backup.exe 1736 backup.exe 1304 backup.exe 1064 System Restore.exe 1264 backup.exe 1960 backup.exe 816 data.exe 1992 backup.exe 944 backup.exe 1724 backup.exe 1940 backup.exe 292 backup.exe 1052 backup.exe 1936 backup.exe 1580 backup.exe 976 backup.exe 2020 backup.exe 1540 backup.exe 1076 backup.exe 1404 backup.exe 1716 backup.exe 1812 backup.exe 936 backup.exe 676 backup.exe 1260 backup.exe 524 backup.exe 268 backup.exe 892 backup.exe 1816 backup.exe 1464 backup.exe 1740 backup.exe 1460 update.exe 1572 backup.exe 1588 backup.exe 1988 backup.exe 1568 backup.exe 316 System Restore.exe 928 backup.exe 1700 backup.exe 1516 backup.exe 1944 backup.exe 2000 backup.exe 1156 backup.exe 784 backup.exe 1216 System Restore.exe -
Loads dropped DLL 64 IoCs
pid Process 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1680 backup.exe 1680 backup.exe 1676 backup.exe 1676 backup.exe 1680 backup.exe 1680 backup.exe 1480 backup.exe 1480 backup.exe 1404 backup.exe 1404 backup.exe 1480 backup.exe 1480 backup.exe 1956 backup.exe 1956 backup.exe 1548 backup.exe 1548 backup.exe 1548 backup.exe 1548 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1440 backup.exe 1956 backup.exe 1956 backup.exe 1440 backup.exe 1440 backup.exe 1680 backup.exe 1680 backup.exe 1548 backup.exe 1548 backup.exe 1480 backup.exe 1480 backup.exe 1680 backup.exe 1680 backup.exe 1956 backup.exe 1440 backup.exe 1956 backup.exe 1548 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\Custom\Custom64\data.exe backup.exe File opened for modification C:\Windows\AppPatch\es-ES\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\en-US\backup.exe backup.exe File opened for modification C:\Windows\CSC\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\de-DE\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 1112 backup.exe 1220 backup.exe 788 backup.exe 1064 backup.exe 752 backup.exe 1992 backup.exe 1680 backup.exe 384 backup.exe 1676 backup.exe 1528 backup.exe 1480 backup.exe 1404 backup.exe 1076 backup.exe 1956 backup.exe 1548 backup.exe 1780 backup.exe 1440 backup.exe 1488 backup.exe 1592 backup.exe 1924 backup.exe 1736 backup.exe 1304 backup.exe 1064 System Restore.exe 1264 backup.exe 1960 backup.exe 816 data.exe 1724 backup.exe 1992 backup.exe 944 backup.exe 1940 backup.exe 1052 backup.exe 1936 backup.exe 1580 backup.exe 292 backup.exe 976 backup.exe 1540 backup.exe 2020 backup.exe 1076 backup.exe 1716 backup.exe 1404 backup.exe 936 backup.exe 1260 backup.exe 524 backup.exe 676 backup.exe 268 backup.exe 892 backup.exe 1740 backup.exe 1464 backup.exe 1572 backup.exe 1816 backup.exe 1588 backup.exe 1568 backup.exe 1988 backup.exe 316 System Restore.exe 928 backup.exe 784 backup.exe 1944 backup.exe 1156 backup.exe 1516 backup.exe 1700 backup.exe 2000 backup.exe 1216 System Restore.exe 992 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1112 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 28 PID 1172 wrote to memory of 1112 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 28 PID 1172 wrote to memory of 1112 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 28 PID 1172 wrote to memory of 1112 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 28 PID 1172 wrote to memory of 1220 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 29 PID 1172 wrote to memory of 1220 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 29 PID 1172 wrote to memory of 1220 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 29 PID 1172 wrote to memory of 1220 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 29 PID 1172 wrote to memory of 788 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 30 PID 1172 wrote to memory of 788 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 30 PID 1172 wrote to memory of 788 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 30 PID 1172 wrote to memory of 788 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 30 PID 1172 wrote to memory of 1064 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 31 PID 1172 wrote to memory of 1064 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 31 PID 1172 wrote to memory of 1064 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 31 PID 1172 wrote to memory of 1064 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 31 PID 1172 wrote to memory of 752 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 32 PID 1172 wrote to memory of 752 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 32 PID 1172 wrote to memory of 752 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 32 PID 1172 wrote to memory of 752 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 32 PID 1172 wrote to memory of 1992 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 33 PID 1172 wrote to memory of 1992 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 33 PID 1172 wrote to memory of 1992 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 33 PID 1172 wrote to memory of 1992 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 33 PID 1112 wrote to memory of 1680 1112 backup.exe 34 PID 1112 wrote to memory of 1680 1112 backup.exe 34 PID 1112 wrote to memory of 1680 1112 backup.exe 34 PID 1112 wrote to memory of 1680 1112 backup.exe 34 PID 1172 wrote to memory of 384 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 35 PID 1172 wrote to memory of 384 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 35 PID 1172 wrote to memory of 384 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 35 PID 1172 wrote to memory of 384 1172 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe 35 PID 1680 wrote to memory of 1676 1680 backup.exe 36 PID 1680 wrote to memory of 1676 1680 backup.exe 36 PID 1680 wrote to memory of 1676 1680 backup.exe 36 PID 1680 wrote to memory of 1676 1680 backup.exe 36 PID 1676 wrote to memory of 1528 1676 backup.exe 37 PID 1676 wrote to memory of 1528 1676 backup.exe 37 PID 1676 wrote to memory of 1528 1676 backup.exe 37 PID 1676 wrote to memory of 1528 1676 backup.exe 37 PID 1680 wrote to memory of 1480 1680 backup.exe 38 PID 1680 wrote to memory of 1480 1680 backup.exe 38 PID 1680 wrote to memory of 1480 1680 backup.exe 38 PID 1680 wrote to memory of 1480 1680 backup.exe 38 PID 1480 wrote to memory of 1404 1480 backup.exe 39 PID 1480 wrote to memory of 1404 1480 backup.exe 39 PID 1480 wrote to memory of 1404 1480 backup.exe 39 PID 1480 wrote to memory of 1404 1480 backup.exe 39 PID 1404 wrote to memory of 1076 1404 backup.exe 40 PID 1404 wrote to memory of 1076 1404 backup.exe 40 PID 1404 wrote to memory of 1076 1404 backup.exe 40 PID 1404 wrote to memory of 1076 1404 backup.exe 40 PID 1480 wrote to memory of 1956 1480 backup.exe 41 PID 1480 wrote to memory of 1956 1480 backup.exe 41 PID 1480 wrote to memory of 1956 1480 backup.exe 41 PID 1480 wrote to memory of 1956 1480 backup.exe 41 PID 1956 wrote to memory of 1548 1956 backup.exe 42 PID 1956 wrote to memory of 1548 1956 backup.exe 42 PID 1956 wrote to memory of 1548 1956 backup.exe 42 PID 1956 wrote to memory of 1548 1956 backup.exe 42 PID 1548 wrote to memory of 1780 1548 backup.exe 43 PID 1548 wrote to memory of 1780 1548 backup.exe 43 PID 1548 wrote to memory of 1780 1548 backup.exe 43 PID 1548 wrote to memory of 1780 1548 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe"C:\Users\Admin\AppData\Local\Temp\4ff1539ff77dc27d0274ab1d9b4f084c266b65ea2ab1e98e48de0a3983bd5cb5.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3820771754\backup.exeC:\Users\Admin\AppData\Local\Temp\3820771754\backup.exe C:\Users\Admin\AppData\Local\Temp\3820771754\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1676 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1480 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1404 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1548 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1440 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1064
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1460
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Drops file in Program Files directory
- System policy modification
PID:1312 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵PID:668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵PID:1956
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:2172
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:2416
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:2244
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:2432
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1052
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:528
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1716
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1428 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1952
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1656
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:956
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\8⤵PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\8⤵PID:2212
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵
- Modifies visibility of file extensions in Explorer
PID:1436 -
C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\8⤵PID:2104
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\8⤵PID:2276
-
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1772
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2236
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2424
-
-
-
C:\Program Files\Common Files\Services\data.exe"C:\Program Files\Common Files\Services\data.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:816
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:676 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Program Files\Common Files\System\ado\de-DE\System Restore.exe"C:\Program Files\Common Files\System\ado\de-DE\System Restore.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:316
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:784
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:992
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1888
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:784
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1524
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1540
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:672
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:2268
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
PID:1812
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵PID:1400
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1516
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:2296
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:976 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:928
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1216
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- System policy modification
PID:936
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1664
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1744
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵PID:2320
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:2020
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1216
-
-
C:\Program Files\Java\data.exe"C:\Program Files\Java\data.exe" C:\Program Files\Java\5⤵PID:1680
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:2220
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:2440
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1260 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Disables RegEdit via registry modification
PID:1924
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:304
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1676
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1484
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:2180
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:2448
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1944
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:608
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:384
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:2004
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:2408
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1404 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1516
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
PID:1860
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1600
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:928
-
-
C:\Users\Admin\Music\System Restore.exe"C:\Users\Admin\Music\System Restore.exe" C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1596
-
-
C:\Users\Admin\Pictures\data.exeC:\Users\Admin\Pictures\data.exe C:\Users\Admin\Pictures\6⤵PID:1056
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:2196
-
-
C:\Users\Admin\Searches\System Restore.exe"C:\Users\Admin\Searches\System Restore.exe" C:\Users\Admin\Searches\6⤵PID:2304
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1700
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1716
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:1740 -
C:\Windows\AppPatch\AppPatch64\backup.exeC:\Windows\AppPatch\AppPatch64\backup.exe C:\Windows\AppPatch\AppPatch64\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:900
-
-
C:\Windows\AppPatch\Custom\backup.exeC:\Windows\AppPatch\Custom\backup.exe C:\Windows\AppPatch\Custom\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:1936 -
C:\Windows\AppPatch\Custom\Custom64\data.exeC:\Windows\AppPatch\Custom\Custom64\data.exe C:\Windows\AppPatch\Custom\Custom64\7⤵PID:2096
-
-
-
C:\Windows\AppPatch\de-DE\backup.exeC:\Windows\AppPatch\de-DE\backup.exe C:\Windows\AppPatch\de-DE\6⤵PID:288
-
-
C:\Windows\AppPatch\en-US\backup.exeC:\Windows\AppPatch\en-US\backup.exe C:\Windows\AppPatch\en-US\6⤵PID:2252
-
-
C:\Windows\AppPatch\es-ES\backup.exeC:\Windows\AppPatch\es-ES\backup.exe C:\Windows\AppPatch\es-ES\6⤵PID:2312
-
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:1980 -
C:\Windows\assembly\GAC\backup.exeC:\Windows\assembly\GAC\backup.exe C:\Windows\assembly\GAC\6⤵PID:2328
-
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:840
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD592d5b3fde386ba12280c0d2c0312dc05
SHA18527a98c931929ccc23d75183b03f29b47675c13
SHA256d63e48bac99607e22e7af292eaf6a097520fe0b41ab66ef5e13bc8ca88963c0f
SHA5122f882996b0f729baa447c091c5c8a3a653ee04ab93f2cce351ab53bd2aa503b95d1016455bdd7e030d9d7b044a68c173755f044c241665f372e3085be5f33276
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD5306f23d4a4cd13bcfd39dab5e6453554
SHA1d6dd299cfd7da8410759dacc7f8539c3e7d8ddf2
SHA2563f085ee1d87978856630eed9626dc3d0d545a0780b227aa7339f5c80a2813542
SHA512a06960bd6d7e7f03ac4a3ab0b50c596fc7eb86aac016162bc25fa8331a67cd1c6e24695fed41e161309e2a57a14c36fcb379d91cf08c7c9537548b48ccdcbb77
-
Filesize
72KB
MD5863b8591d7cb9f0784d7e7f280aebc43
SHA1d9835d3a59c1045bd4b6de397b266f5bddcc75fd
SHA256f0401a3410f0169a7d3a7ab1eafc6b5b1a1d2fd16e7dd6770f744a71535b7658
SHA51217127c3fbd2140f33f043e89aa3845dab2b9a2228fd1df81e67b08a598ad91a1713439d8743bd15aab43690107f49e2c46bb9ed7f29e6bb9e9154228bd4b2ab2
-
Filesize
72KB
MD5863b8591d7cb9f0784d7e7f280aebc43
SHA1d9835d3a59c1045bd4b6de397b266f5bddcc75fd
SHA256f0401a3410f0169a7d3a7ab1eafc6b5b1a1d2fd16e7dd6770f744a71535b7658
SHA51217127c3fbd2140f33f043e89aa3845dab2b9a2228fd1df81e67b08a598ad91a1713439d8743bd15aab43690107f49e2c46bb9ed7f29e6bb9e9154228bd4b2ab2
-
Filesize
72KB
MD54b060e71cc35a457148bfaba3d2142bb
SHA1dcebd94b12b4166c77a9d0425b1dc877d012ab37
SHA25626cedba95071da18504d29a5448b3fc19a684a700c36c6a21a7f5298a139d238
SHA512587e7f50cd8434465cd12abe1dea03c95d74b3221606fe0abccae156d4632e23277181b209a8049b8e6ed4d45bb66d84dee46d166c245bf9ef135a11b4595680
-
Filesize
72KB
MD51f78dcafbb9752da627e78842b3124d7
SHA1a1ed90c060f8f97c7e6ad178d73788b9fb55e04a
SHA256f755000c491d55ac31d14f3f4c07eb658f9d989da2d2e48f5cdcb80ab90d1f33
SHA5123516ca2539565f9a3ab4b49d0b61db5a398d29aca6e8039bdd6b22d3a4554176a01e6f209a40fb9364d411eecf6dcba79f0a55424491680c564fe9fc763ca6a7
-
Filesize
72KB
MD51f78dcafbb9752da627e78842b3124d7
SHA1a1ed90c060f8f97c7e6ad178d73788b9fb55e04a
SHA256f755000c491d55ac31d14f3f4c07eb658f9d989da2d2e48f5cdcb80ab90d1f33
SHA5123516ca2539565f9a3ab4b49d0b61db5a398d29aca6e8039bdd6b22d3a4554176a01e6f209a40fb9364d411eecf6dcba79f0a55424491680c564fe9fc763ca6a7
-
Filesize
72KB
MD5b2cd4cd8ea2a4aaa164d701a6d5d1281
SHA113a001ad7c6e8f3344885da7f200a12eedd9f105
SHA256a6ec219cd3c1215a33abed8412b195b1544966d8b020ef5272aae072e0ac5e6f
SHA5122cdedb326ae96ad4704685f66ec0fc29857cf4bf2c22965f14ebbe867580aadc61a70920a2b0159c7c27fa998a6675ac1132c10792762f089f81d440e94075d5
-
Filesize
72KB
MD5d823e174fc2c42920e844524c852234d
SHA1bf73fdef86c3b8cd76dfed2814bc6aa634e28e17
SHA25650278d972f8ff4bf502febd1971e926952d2b89b5c899f42f4631bd7373bb5fc
SHA512c05e850776dd913ddde01abe05f3e022ee5e0c1552c431ac1ea5a33bdfd2a5576ada793a599e5baa2775bd3791a49e64c585aec2cdb56d39cf9fabfbbc7c9071
-
Filesize
72KB
MD5d823e174fc2c42920e844524c852234d
SHA1bf73fdef86c3b8cd76dfed2814bc6aa634e28e17
SHA25650278d972f8ff4bf502febd1971e926952d2b89b5c899f42f4631bd7373bb5fc
SHA512c05e850776dd913ddde01abe05f3e022ee5e0c1552c431ac1ea5a33bdfd2a5576ada793a599e5baa2775bd3791a49e64c585aec2cdb56d39cf9fabfbbc7c9071
-
Filesize
72KB
MD5b2cd4cd8ea2a4aaa164d701a6d5d1281
SHA113a001ad7c6e8f3344885da7f200a12eedd9f105
SHA256a6ec219cd3c1215a33abed8412b195b1544966d8b020ef5272aae072e0ac5e6f
SHA5122cdedb326ae96ad4704685f66ec0fc29857cf4bf2c22965f14ebbe867580aadc61a70920a2b0159c7c27fa998a6675ac1132c10792762f089f81d440e94075d5
-
Filesize
72KB
MD59c0203ac93d6cb647b215beadab7b31f
SHA10ef57a64c4ca65bf9501d011dcd7833ee660bd82
SHA256320c6615b4d477243ccd6e6c80662a35de98b02f6b86cb4ba17eacfb44938e43
SHA512b8c2ab828615263b477f29b6fb63315bb8c9b30838268a17c9ad8c7c4552465b045a569b9758309a57820d77ed7ecf99b62c80f7e60ee01f48020edadbafb6aa
-
Filesize
72KB
MD59c0203ac93d6cb647b215beadab7b31f
SHA10ef57a64c4ca65bf9501d011dcd7833ee660bd82
SHA256320c6615b4d477243ccd6e6c80662a35de98b02f6b86cb4ba17eacfb44938e43
SHA512b8c2ab828615263b477f29b6fb63315bb8c9b30838268a17c9ad8c7c4552465b045a569b9758309a57820d77ed7ecf99b62c80f7e60ee01f48020edadbafb6aa
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
Filesize
72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
Filesize
72KB
MD58a02e7178a4f9cc63e6944724336a76f
SHA1dba952d239c73292d605e1742dcc22237af1ae77
SHA256d2a1c5f6f5b3d4689a028fb9a12d9b973f273a820162eae115cc2d5a4fe1b2a9
SHA512f7fbd06778500e2838dc4bc534c5c6a4bdf47ad61a6e26cd5d5d6edb7eae04662743e928a4235efed750df71fac4a8733ae56795145b4d4a93abf16a3e7bb534
-
Filesize
72KB
MD58a02e7178a4f9cc63e6944724336a76f
SHA1dba952d239c73292d605e1742dcc22237af1ae77
SHA256d2a1c5f6f5b3d4689a028fb9a12d9b973f273a820162eae115cc2d5a4fe1b2a9
SHA512f7fbd06778500e2838dc4bc534c5c6a4bdf47ad61a6e26cd5d5d6edb7eae04662743e928a4235efed750df71fac4a8733ae56795145b4d4a93abf16a3e7bb534
-
Filesize
72KB
MD592d5b3fde386ba12280c0d2c0312dc05
SHA18527a98c931929ccc23d75183b03f29b47675c13
SHA256d63e48bac99607e22e7af292eaf6a097520fe0b41ab66ef5e13bc8ca88963c0f
SHA5122f882996b0f729baa447c091c5c8a3a653ee04ab93f2cce351ab53bd2aa503b95d1016455bdd7e030d9d7b044a68c173755f044c241665f372e3085be5f33276
-
Filesize
72KB
MD592d5b3fde386ba12280c0d2c0312dc05
SHA18527a98c931929ccc23d75183b03f29b47675c13
SHA256d63e48bac99607e22e7af292eaf6a097520fe0b41ab66ef5e13bc8ca88963c0f
SHA5122f882996b0f729baa447c091c5c8a3a653ee04ab93f2cce351ab53bd2aa503b95d1016455bdd7e030d9d7b044a68c173755f044c241665f372e3085be5f33276
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD5306f23d4a4cd13bcfd39dab5e6453554
SHA1d6dd299cfd7da8410759dacc7f8539c3e7d8ddf2
SHA2563f085ee1d87978856630eed9626dc3d0d545a0780b227aa7339f5c80a2813542
SHA512a06960bd6d7e7f03ac4a3ab0b50c596fc7eb86aac016162bc25fa8331a67cd1c6e24695fed41e161309e2a57a14c36fcb379d91cf08c7c9537548b48ccdcbb77
-
Filesize
72KB
MD5306f23d4a4cd13bcfd39dab5e6453554
SHA1d6dd299cfd7da8410759dacc7f8539c3e7d8ddf2
SHA2563f085ee1d87978856630eed9626dc3d0d545a0780b227aa7339f5c80a2813542
SHA512a06960bd6d7e7f03ac4a3ab0b50c596fc7eb86aac016162bc25fa8331a67cd1c6e24695fed41e161309e2a57a14c36fcb379d91cf08c7c9537548b48ccdcbb77
-
Filesize
72KB
MD5863b8591d7cb9f0784d7e7f280aebc43
SHA1d9835d3a59c1045bd4b6de397b266f5bddcc75fd
SHA256f0401a3410f0169a7d3a7ab1eafc6b5b1a1d2fd16e7dd6770f744a71535b7658
SHA51217127c3fbd2140f33f043e89aa3845dab2b9a2228fd1df81e67b08a598ad91a1713439d8743bd15aab43690107f49e2c46bb9ed7f29e6bb9e9154228bd4b2ab2
-
Filesize
72KB
MD5863b8591d7cb9f0784d7e7f280aebc43
SHA1d9835d3a59c1045bd4b6de397b266f5bddcc75fd
SHA256f0401a3410f0169a7d3a7ab1eafc6b5b1a1d2fd16e7dd6770f744a71535b7658
SHA51217127c3fbd2140f33f043e89aa3845dab2b9a2228fd1df81e67b08a598ad91a1713439d8743bd15aab43690107f49e2c46bb9ed7f29e6bb9e9154228bd4b2ab2
-
Filesize
72KB
MD54b060e71cc35a457148bfaba3d2142bb
SHA1dcebd94b12b4166c77a9d0425b1dc877d012ab37
SHA25626cedba95071da18504d29a5448b3fc19a684a700c36c6a21a7f5298a139d238
SHA512587e7f50cd8434465cd12abe1dea03c95d74b3221606fe0abccae156d4632e23277181b209a8049b8e6ed4d45bb66d84dee46d166c245bf9ef135a11b4595680
-
Filesize
72KB
MD54b060e71cc35a457148bfaba3d2142bb
SHA1dcebd94b12b4166c77a9d0425b1dc877d012ab37
SHA25626cedba95071da18504d29a5448b3fc19a684a700c36c6a21a7f5298a139d238
SHA512587e7f50cd8434465cd12abe1dea03c95d74b3221606fe0abccae156d4632e23277181b209a8049b8e6ed4d45bb66d84dee46d166c245bf9ef135a11b4595680
-
Filesize
72KB
MD51f78dcafbb9752da627e78842b3124d7
SHA1a1ed90c060f8f97c7e6ad178d73788b9fb55e04a
SHA256f755000c491d55ac31d14f3f4c07eb658f9d989da2d2e48f5cdcb80ab90d1f33
SHA5123516ca2539565f9a3ab4b49d0b61db5a398d29aca6e8039bdd6b22d3a4554176a01e6f209a40fb9364d411eecf6dcba79f0a55424491680c564fe9fc763ca6a7
-
Filesize
72KB
MD51f78dcafbb9752da627e78842b3124d7
SHA1a1ed90c060f8f97c7e6ad178d73788b9fb55e04a
SHA256f755000c491d55ac31d14f3f4c07eb658f9d989da2d2e48f5cdcb80ab90d1f33
SHA5123516ca2539565f9a3ab4b49d0b61db5a398d29aca6e8039bdd6b22d3a4554176a01e6f209a40fb9364d411eecf6dcba79f0a55424491680c564fe9fc763ca6a7
-
Filesize
72KB
MD5b2cd4cd8ea2a4aaa164d701a6d5d1281
SHA113a001ad7c6e8f3344885da7f200a12eedd9f105
SHA256a6ec219cd3c1215a33abed8412b195b1544966d8b020ef5272aae072e0ac5e6f
SHA5122cdedb326ae96ad4704685f66ec0fc29857cf4bf2c22965f14ebbe867580aadc61a70920a2b0159c7c27fa998a6675ac1132c10792762f089f81d440e94075d5
-
Filesize
72KB
MD5b2cd4cd8ea2a4aaa164d701a6d5d1281
SHA113a001ad7c6e8f3344885da7f200a12eedd9f105
SHA256a6ec219cd3c1215a33abed8412b195b1544966d8b020ef5272aae072e0ac5e6f
SHA5122cdedb326ae96ad4704685f66ec0fc29857cf4bf2c22965f14ebbe867580aadc61a70920a2b0159c7c27fa998a6675ac1132c10792762f089f81d440e94075d5
-
Filesize
72KB
MD5d823e174fc2c42920e844524c852234d
SHA1bf73fdef86c3b8cd76dfed2814bc6aa634e28e17
SHA25650278d972f8ff4bf502febd1971e926952d2b89b5c899f42f4631bd7373bb5fc
SHA512c05e850776dd913ddde01abe05f3e022ee5e0c1552c431ac1ea5a33bdfd2a5576ada793a599e5baa2775bd3791a49e64c585aec2cdb56d39cf9fabfbbc7c9071
-
Filesize
72KB
MD5d823e174fc2c42920e844524c852234d
SHA1bf73fdef86c3b8cd76dfed2814bc6aa634e28e17
SHA25650278d972f8ff4bf502febd1971e926952d2b89b5c899f42f4631bd7373bb5fc
SHA512c05e850776dd913ddde01abe05f3e022ee5e0c1552c431ac1ea5a33bdfd2a5576ada793a599e5baa2775bd3791a49e64c585aec2cdb56d39cf9fabfbbc7c9071
-
Filesize
72KB
MD5b2cd4cd8ea2a4aaa164d701a6d5d1281
SHA113a001ad7c6e8f3344885da7f200a12eedd9f105
SHA256a6ec219cd3c1215a33abed8412b195b1544966d8b020ef5272aae072e0ac5e6f
SHA5122cdedb326ae96ad4704685f66ec0fc29857cf4bf2c22965f14ebbe867580aadc61a70920a2b0159c7c27fa998a6675ac1132c10792762f089f81d440e94075d5
-
Filesize
72KB
MD5b2cd4cd8ea2a4aaa164d701a6d5d1281
SHA113a001ad7c6e8f3344885da7f200a12eedd9f105
SHA256a6ec219cd3c1215a33abed8412b195b1544966d8b020ef5272aae072e0ac5e6f
SHA5122cdedb326ae96ad4704685f66ec0fc29857cf4bf2c22965f14ebbe867580aadc61a70920a2b0159c7c27fa998a6675ac1132c10792762f089f81d440e94075d5
-
Filesize
72KB
MD5b2cd4cd8ea2a4aaa164d701a6d5d1281
SHA113a001ad7c6e8f3344885da7f200a12eedd9f105
SHA256a6ec219cd3c1215a33abed8412b195b1544966d8b020ef5272aae072e0ac5e6f
SHA5122cdedb326ae96ad4704685f66ec0fc29857cf4bf2c22965f14ebbe867580aadc61a70920a2b0159c7c27fa998a6675ac1132c10792762f089f81d440e94075d5
-
Filesize
72KB
MD59c0203ac93d6cb647b215beadab7b31f
SHA10ef57a64c4ca65bf9501d011dcd7833ee660bd82
SHA256320c6615b4d477243ccd6e6c80662a35de98b02f6b86cb4ba17eacfb44938e43
SHA512b8c2ab828615263b477f29b6fb63315bb8c9b30838268a17c9ad8c7c4552465b045a569b9758309a57820d77ed7ecf99b62c80f7e60ee01f48020edadbafb6aa
-
Filesize
72KB
MD59c0203ac93d6cb647b215beadab7b31f
SHA10ef57a64c4ca65bf9501d011dcd7833ee660bd82
SHA256320c6615b4d477243ccd6e6c80662a35de98b02f6b86cb4ba17eacfb44938e43
SHA512b8c2ab828615263b477f29b6fb63315bb8c9b30838268a17c9ad8c7c4552465b045a569b9758309a57820d77ed7ecf99b62c80f7e60ee01f48020edadbafb6aa
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD503bd9254fe19cd38dca19309b414b169
SHA157de277af55e8fe9d6d09f7d8e3acd194ea7a22d
SHA256386ccb146cbbd95ff7771160d922c126823f06d70ef33a6dc0c1cf5d9ca738f7
SHA512cdb14d7687651e917073e808b88dde55506549cb576ebe4032ffd70f010cbf1df427e06318334602c7fd58d2be2ad767d6f652484c484ccb45a83bf583503447
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
Filesize
72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
Filesize
72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5eec3362d453acd62e606f5c29d7bd9a2
SHA1019706eabee33f6315ddfb77ad2f6cce8b008f25
SHA25613c533a329dc24e04db06dc30e52bc035461b48e3262df07061492a9e37a4833
SHA51203f40669643202f1c04f8d796149ac1fba5437cc1878111d7ec0e68160e9d1ae9130038996ccef6f74dcf3ae5e527bd61640751772485b19d65874705f5408d4
-
Filesize
72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e
-
Filesize
72KB
MD5fff7044d8a936dc7ab1ee902540701f4
SHA1024aacd978d758653cff75306360f042c448695e
SHA256455b03d8169962eab9d42a297439aada74e5319c74f5c548fec87b0d60182c27
SHA51280c5d5ac7d9f1439bf56f1b2f405f6a59abb362d0a2b561c91c9f8ad175e5908b7561aa3eaddaa7290349459bdc2d7b8a75bfeee5325088d83d3f77c1dcf117e