Analysis
-
max time kernel
181s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe
Resource
win10v2004-20220812-en
General
-
Target
71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe
-
Size
72KB
-
MD5
02aaf844536b7614e4f441904ea8668d
-
SHA1
a92e76af87735432d7552879d0d22e1fdc6eca4a
-
SHA256
71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c
-
SHA512
bb1bf0ea5af133d8e920d6f1324617a534aa2b023ac11f7bce89098be1d39f59a68e960a330e12c189fdb1917c7099fb7e6f6392bc371e666e087e22752f820d
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2H:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPT
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe -
Executes dropped EXE 64 IoCs
pid Process 992 backup.exe 1808 backup.exe 288 backup.exe 1956 backup.exe 1552 backup.exe 1784 backup.exe 860 backup.exe 1352 backup.exe 748 backup.exe 1384 backup.exe 360 backup.exe 1708 backup.exe 1144 backup.exe 1312 backup.exe 1368 data.exe 1592 backup.exe 576 backup.exe 544 backup.exe 560 backup.exe 240 backup.exe 920 backup.exe 668 System Restore.exe 1092 backup.exe 1636 backup.exe 432 backup.exe 964 backup.exe 1612 backup.exe 1868 backup.exe 1984 backup.exe 892 backup.exe 1976 backup.exe 1452 backup.exe 1100 backup.exe 1284 backup.exe 624 backup.exe 460 update.exe 1220 backup.exe 772 backup.exe 1596 data.exe 1604 System Restore.exe 1508 update.exe 1308 backup.exe 1808 backup.exe 776 backup.exe 328 backup.exe 1552 backup.exe 1720 backup.exe 1784 backup.exe 1456 backup.exe 584 backup.exe 1304 backup.exe 1920 backup.exe 944 backup.exe 1064 backup.exe 1492 System Restore.exe 748 backup.exe 1940 backup.exe 1196 backup.exe 1760 backup.exe 1144 backup.exe 1908 backup.exe 572 backup.exe 1972 backup.exe 1000 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 1352 backup.exe 1352 backup.exe 748 backup.exe 748 backup.exe 1352 backup.exe 1352 backup.exe 360 backup.exe 360 backup.exe 1708 backup.exe 1708 backup.exe 360 backup.exe 360 backup.exe 1312 backup.exe 1312 backup.exe 1368 data.exe 1368 data.exe 1368 data.exe 1368 data.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 576 backup.exe 1352 backup.exe 1312 backup.exe 576 backup.exe 1352 backup.exe 576 backup.exe 1368 data.exe 1368 data.exe 1312 backup.exe 360 backup.exe 360 backup.exe 1352 backup.exe 1352 backup.exe 360 backup.exe 360 backup.exe 576 backup.exe 576 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe data.exe File opened for modification C:\Program Files\Google\Chrome\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe data.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\data.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe update.exe File opened for modification C:\Windows\AppPatch\de-DE\backup.exe backup.exe File opened for modification C:\Windows\CSC\backup.exe update.exe File opened for modification C:\Windows\AppCompat\backup.exe update.exe File opened for modification C:\Windows\AppPatch\backup.exe update.exe File opened for modification C:\Windows\assembly\backup.exe update.exe File opened for modification C:\Windows\Branding\backup.exe update.exe File opened for modification C:\Windows\update.exe backup.exe File opened for modification C:\Windows\addins\System Restore.exe update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 992 backup.exe 1808 backup.exe 288 backup.exe 1956 backup.exe 1552 backup.exe 1784 backup.exe 860 backup.exe 1352 backup.exe 748 backup.exe 1384 backup.exe 360 backup.exe 1708 backup.exe 1144 backup.exe 1312 backup.exe 1368 data.exe 1592 backup.exe 576 backup.exe 544 backup.exe 560 backup.exe 240 backup.exe 920 backup.exe 668 System Restore.exe 1092 backup.exe 1636 backup.exe 432 backup.exe 964 backup.exe 1612 backup.exe 1984 backup.exe 892 backup.exe 1976 backup.exe 1100 backup.exe 1452 backup.exe 1284 backup.exe 624 backup.exe 1220 backup.exe 1596 data.exe 772 backup.exe 776 backup.exe 328 backup.exe 1808 backup.exe 1604 System Restore.exe 1868 backup.exe 1308 backup.exe 460 update.exe 1552 backup.exe 1508 update.exe 1304 backup.exe 1784 backup.exe 1720 backup.exe 1456 backup.exe 584 backup.exe 1920 backup.exe 1064 backup.exe 944 backup.exe 1940 backup.exe 748 backup.exe 1492 System Restore.exe 1144 backup.exe 1196 backup.exe 1760 backup.exe 1972 backup.exe 1908 backup.exe 1000 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 992 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 28 PID 1168 wrote to memory of 992 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 28 PID 1168 wrote to memory of 992 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 28 PID 1168 wrote to memory of 992 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 28 PID 1168 wrote to memory of 1808 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 29 PID 1168 wrote to memory of 1808 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 29 PID 1168 wrote to memory of 1808 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 29 PID 1168 wrote to memory of 1808 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 29 PID 1168 wrote to memory of 288 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 30 PID 1168 wrote to memory of 288 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 30 PID 1168 wrote to memory of 288 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 30 PID 1168 wrote to memory of 288 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 30 PID 1168 wrote to memory of 1956 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 31 PID 1168 wrote to memory of 1956 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 31 PID 1168 wrote to memory of 1956 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 31 PID 1168 wrote to memory of 1956 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 31 PID 1168 wrote to memory of 1552 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 32 PID 1168 wrote to memory of 1552 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 32 PID 1168 wrote to memory of 1552 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 32 PID 1168 wrote to memory of 1552 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 32 PID 1168 wrote to memory of 1784 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 33 PID 1168 wrote to memory of 1784 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 33 PID 1168 wrote to memory of 1784 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 33 PID 1168 wrote to memory of 1784 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 33 PID 1168 wrote to memory of 860 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 34 PID 1168 wrote to memory of 860 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 34 PID 1168 wrote to memory of 860 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 34 PID 1168 wrote to memory of 860 1168 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe 34 PID 992 wrote to memory of 1352 992 backup.exe 35 PID 992 wrote to memory of 1352 992 backup.exe 35 PID 992 wrote to memory of 1352 992 backup.exe 35 PID 992 wrote to memory of 1352 992 backup.exe 35 PID 1352 wrote to memory of 748 1352 backup.exe 36 PID 1352 wrote to memory of 748 1352 backup.exe 36 PID 1352 wrote to memory of 748 1352 backup.exe 36 PID 1352 wrote to memory of 748 1352 backup.exe 36 PID 748 wrote to memory of 1384 748 backup.exe 37 PID 748 wrote to memory of 1384 748 backup.exe 37 PID 748 wrote to memory of 1384 748 backup.exe 37 PID 748 wrote to memory of 1384 748 backup.exe 37 PID 1352 wrote to memory of 360 1352 backup.exe 38 PID 1352 wrote to memory of 360 1352 backup.exe 38 PID 1352 wrote to memory of 360 1352 backup.exe 38 PID 1352 wrote to memory of 360 1352 backup.exe 38 PID 360 wrote to memory of 1708 360 backup.exe 39 PID 360 wrote to memory of 1708 360 backup.exe 39 PID 360 wrote to memory of 1708 360 backup.exe 39 PID 360 wrote to memory of 1708 360 backup.exe 39 PID 1708 wrote to memory of 1144 1708 backup.exe 40 PID 1708 wrote to memory of 1144 1708 backup.exe 40 PID 1708 wrote to memory of 1144 1708 backup.exe 40 PID 1708 wrote to memory of 1144 1708 backup.exe 40 PID 360 wrote to memory of 1312 360 backup.exe 41 PID 360 wrote to memory of 1312 360 backup.exe 41 PID 360 wrote to memory of 1312 360 backup.exe 41 PID 360 wrote to memory of 1312 360 backup.exe 41 PID 1312 wrote to memory of 1368 1312 backup.exe 42 PID 1312 wrote to memory of 1368 1312 backup.exe 42 PID 1312 wrote to memory of 1368 1312 backup.exe 42 PID 1312 wrote to memory of 1368 1312 backup.exe 42 PID 1368 wrote to memory of 1592 1368 data.exe 43 PID 1368 wrote to memory of 1592 1368 data.exe 43 PID 1368 wrote to memory of 1592 1368 data.exe 43 PID 1368 wrote to memory of 1592 1368 data.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe"C:\Users\Admin\AppData\Local\Temp\71535cf66d845ed85b5c4763a1aa3604eb4f7097ce408f350cbecb63ffed231c.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\3712974681\backup.exeC:\Users\Admin\AppData\Local\Temp\3712974681\backup.exe C:\Users\Admin\AppData\Local\Temp\3712974681\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:992 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1708 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1312 -
C:\Program Files\Common Files\Microsoft Shared\data.exe"C:\Program Files\Common Files\Microsoft Shared\data.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:240
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:920
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:432
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1456 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- System policy modification
PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Disables RegEdit via registry modification
PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1232
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵PID:572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵PID:2164
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1196
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:2056
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:2172
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Disables RegEdit via registry modification
PID:1948
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Disables RegEdit via registry modification
PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2028
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1528
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1284 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:776
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:772
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵
- Disables RegEdit via registry modification
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\8⤵PID:1492
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1328
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:2068
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2180
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1092 -
C:\Program Files\Common Files\System\ado\de-DE\data.exe"C:\Program Files\Common Files\System\ado\de-DE\data.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:268
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1568
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1628
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:2116
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:2232
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1624
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1952
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:2188
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1304
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1064
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
- System policy modification
PID:572
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1416
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1360
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
PID:1224 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:1644
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1452 -
C:\Program Files\Google\Chrome\System Restore.exe"C:\Program Files\Google\Chrome\System Restore.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:584 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
PID:1624
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1280
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
PID:1620
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵PID:2140
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:2108
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1220 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1808
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:944
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1980
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1528
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:952
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:240
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:1172
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:920
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:824
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:2204
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:748 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1732
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1212 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1984
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:304
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:1856
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1744
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1208
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1752
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1688
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2196
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1976 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:328 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1784
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:112
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1728
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:560
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- System policy modification
PID:1308
-
-
C:\Users\Admin\Music\System Restore.exe"C:\Users\Admin\Music\System Restore.exe" C:\Users\Admin\Music\6⤵PID:432
-
-
C:\Users\Admin\Pictures\update.exeC:\Users\Admin\Pictures\update.exe C:\Users\Admin\Pictures\6⤵PID:1656
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:2156
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:776
-
-
-
C:\Windows\update.exeC:\Windows\update.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:460 -
C:\Windows\addins\System Restore.exe"C:\Windows\addins\System Restore.exe" C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1492
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- System policy modification
PID:840
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:520 -
C:\Windows\AppPatch\AppPatch64\backup.exeC:\Windows\AppPatch\AppPatch64\backup.exe C:\Windows\AppPatch\AppPatch64\6⤵PID:1776
-
-
C:\Windows\AppPatch\Custom\backup.exeC:\Windows\AppPatch\Custom\backup.exe C:\Windows\AppPatch\Custom\6⤵PID:1272
-
-
C:\Windows\AppPatch\de-DE\backup.exeC:\Windows\AppPatch\de-DE\backup.exe C:\Windows\AppPatch\de-DE\6⤵PID:2132
-
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:1980
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:1724
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD589170bc6aa5b5aa1a6731ac66f234b4a
SHA14b0430d94b2dfcb0a6f6949a8fbb5eb7a34c328e
SHA2564f1a0d0b36df4f4913200f5da2305de097fa6438d1a714a8c78ce38e7ab45d66
SHA51285b2043c3cdef5a5e0381b14c99628604d34127ebee9eb779eee5c9424c4c92436abc9ce5d068aab534043a7fb7ecbbac953984f8c2bc2985c9da4a7f9d5727c
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD53f72733c140c71ff69b617c113df0e03
SHA179229b3583fc5a17888fcdf1b6a061b12ffb07b5
SHA256f588788e20d014e2697046af9a91925529cb0f6f19aec18284687d9f19367de5
SHA512d07c9ba2f31a88d9dcc7a27f8d8dc4ebce99b6cf3b9d594894d7b6992af6e1c7fa82f0f5554fc3a3979d00c73ef7a97a96c8d61a4070a4fed8835a797f0c9f53
-
Filesize
72KB
MD589170bc6aa5b5aa1a6731ac66f234b4a
SHA14b0430d94b2dfcb0a6f6949a8fbb5eb7a34c328e
SHA2564f1a0d0b36df4f4913200f5da2305de097fa6438d1a714a8c78ce38e7ab45d66
SHA51285b2043c3cdef5a5e0381b14c99628604d34127ebee9eb779eee5c9424c4c92436abc9ce5d068aab534043a7fb7ecbbac953984f8c2bc2985c9da4a7f9d5727c
-
Filesize
72KB
MD589170bc6aa5b5aa1a6731ac66f234b4a
SHA14b0430d94b2dfcb0a6f6949a8fbb5eb7a34c328e
SHA2564f1a0d0b36df4f4913200f5da2305de097fa6438d1a714a8c78ce38e7ab45d66
SHA51285b2043c3cdef5a5e0381b14c99628604d34127ebee9eb779eee5c9424c4c92436abc9ce5d068aab534043a7fb7ecbbac953984f8c2bc2985c9da4a7f9d5727c
-
Filesize
72KB
MD5505f0af0536687cf518b3f9002a256e8
SHA1c61462144017188f48309fb52a9ba6438d90b84b
SHA2567f31e717f9c677f8d4243f8371f632819478ecf5d2001111a4f2e4f3b9031bed
SHA5122f99f8d256e523bd0fd0b73443b0ed4cd175340325e8bd25ff0838375ae081e24c2baa76cf184a7152ae1d57f90d480ca842d0c12664316a93da58765169ebb5
-
Filesize
72KB
MD58f4e44d835e0c4424225977b95fc8038
SHA1285707a0e263a481ea75a5dc0de21a457706de25
SHA256027942c3ccc9c0491b5edc079755b0e33d02d7a1dfc4aab348e2bc2adbc87082
SHA512c622e0db12f3dab26b755fa01c3d59f4d34603762efc72c34c87a88bb4106fd2c92011f7561d55179e4d2a1f1e739910943fbf327957986c7a052979b8c5a430
-
Filesize
72KB
MD58f4e44d835e0c4424225977b95fc8038
SHA1285707a0e263a481ea75a5dc0de21a457706de25
SHA256027942c3ccc9c0491b5edc079755b0e33d02d7a1dfc4aab348e2bc2adbc87082
SHA512c622e0db12f3dab26b755fa01c3d59f4d34603762efc72c34c87a88bb4106fd2c92011f7561d55179e4d2a1f1e739910943fbf327957986c7a052979b8c5a430
-
Filesize
72KB
MD5946b29f3b77de1bffb7aebd9d584238f
SHA1ba3360d80984b69d9e96ddbd0424312d7f04a437
SHA2563df8dff58e38370230c53573ba0922877692b6d5355cbb41c4b5b5c60dfd5860
SHA512b54975374499ffd935df6c79d641e8ebb97114dc101c19ed50df1216625ce93262f6f7447a923bd2a1e06d39e8a16f6093047c0ba855a068e110cc46600b9867
-
Filesize
72KB
MD5505f0af0536687cf518b3f9002a256e8
SHA1c61462144017188f48309fb52a9ba6438d90b84b
SHA2567f31e717f9c677f8d4243f8371f632819478ecf5d2001111a4f2e4f3b9031bed
SHA5122f99f8d256e523bd0fd0b73443b0ed4cd175340325e8bd25ff0838375ae081e24c2baa76cf184a7152ae1d57f90d480ca842d0c12664316a93da58765169ebb5
-
Filesize
72KB
MD5505f0af0536687cf518b3f9002a256e8
SHA1c61462144017188f48309fb52a9ba6438d90b84b
SHA2567f31e717f9c677f8d4243f8371f632819478ecf5d2001111a4f2e4f3b9031bed
SHA5122f99f8d256e523bd0fd0b73443b0ed4cd175340325e8bd25ff0838375ae081e24c2baa76cf184a7152ae1d57f90d480ca842d0c12664316a93da58765169ebb5
-
Filesize
72KB
MD5946b29f3b77de1bffb7aebd9d584238f
SHA1ba3360d80984b69d9e96ddbd0424312d7f04a437
SHA2563df8dff58e38370230c53573ba0922877692b6d5355cbb41c4b5b5c60dfd5860
SHA512b54975374499ffd935df6c79d641e8ebb97114dc101c19ed50df1216625ce93262f6f7447a923bd2a1e06d39e8a16f6093047c0ba855a068e110cc46600b9867
-
Filesize
72KB
MD59e99dbb55fc658ad65142b16b25b1014
SHA1abdcc67054cdb082e0fb683acf9ec42f03a9159f
SHA2568fe2f13e155b493e7b00938d2ec23fcc35313189641c1f91705343cac7b27bb7
SHA512a5be7138cde5def06783a0fc07a8201edf04bf7f244fb6f2325f072d4dcef44545ef9f96019a11572ba9ed7cd93ebdc5dc2629df168ae74bafae8aa410097339
-
Filesize
72KB
MD59e99dbb55fc658ad65142b16b25b1014
SHA1abdcc67054cdb082e0fb683acf9ec42f03a9159f
SHA2568fe2f13e155b493e7b00938d2ec23fcc35313189641c1f91705343cac7b27bb7
SHA512a5be7138cde5def06783a0fc07a8201edf04bf7f244fb6f2325f072d4dcef44545ef9f96019a11572ba9ed7cd93ebdc5dc2629df168ae74bafae8aa410097339
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD578a1195a0ce55ec057a7fc5638faefd0
SHA15ef4c7bd814b91b3013afd29122f3c8a0d171f6e
SHA256cc328ecbd2dd5a5ab14f976c51fc93e30788d6b15b40cbdfd3d83a0ea953393e
SHA512823ab3432e2ccd1ddf80ea1c39d6be47bae5da129902896b5516a9cc5e04d49314394215434695ae1e9113a4c77f9d63d23a32f0ee6e36cb2f9092ce990710ce
-
Filesize
72KB
MD578a1195a0ce55ec057a7fc5638faefd0
SHA15ef4c7bd814b91b3013afd29122f3c8a0d171f6e
SHA256cc328ecbd2dd5a5ab14f976c51fc93e30788d6b15b40cbdfd3d83a0ea953393e
SHA512823ab3432e2ccd1ddf80ea1c39d6be47bae5da129902896b5516a9cc5e04d49314394215434695ae1e9113a4c77f9d63d23a32f0ee6e36cb2f9092ce990710ce
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD578a1195a0ce55ec057a7fc5638faefd0
SHA15ef4c7bd814b91b3013afd29122f3c8a0d171f6e
SHA256cc328ecbd2dd5a5ab14f976c51fc93e30788d6b15b40cbdfd3d83a0ea953393e
SHA512823ab3432e2ccd1ddf80ea1c39d6be47bae5da129902896b5516a9cc5e04d49314394215434695ae1e9113a4c77f9d63d23a32f0ee6e36cb2f9092ce990710ce
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD5a591acd02cdf17e3c53e5d2a0cd1a8e5
SHA170109ed93fbaea85f1fdd6f6f5e84ca7759866d8
SHA25692d00457d92c162f3375b616bf56e984da64e791b8a7aad117b72615b4fb2b7c
SHA5129c525f848071c6a3c9f659027b999b6e34539c12b786e8e333b5f10ccef178baafd44574bec90ce2b85ece79493dbe459e092a314c691bc021c94262a67b82bb
-
Filesize
72KB
MD5a591acd02cdf17e3c53e5d2a0cd1a8e5
SHA170109ed93fbaea85f1fdd6f6f5e84ca7759866d8
SHA25692d00457d92c162f3375b616bf56e984da64e791b8a7aad117b72615b4fb2b7c
SHA5129c525f848071c6a3c9f659027b999b6e34539c12b786e8e333b5f10ccef178baafd44574bec90ce2b85ece79493dbe459e092a314c691bc021c94262a67b82bb
-
Filesize
72KB
MD589170bc6aa5b5aa1a6731ac66f234b4a
SHA14b0430d94b2dfcb0a6f6949a8fbb5eb7a34c328e
SHA2564f1a0d0b36df4f4913200f5da2305de097fa6438d1a714a8c78ce38e7ab45d66
SHA51285b2043c3cdef5a5e0381b14c99628604d34127ebee9eb779eee5c9424c4c92436abc9ce5d068aab534043a7fb7ecbbac953984f8c2bc2985c9da4a7f9d5727c
-
Filesize
72KB
MD589170bc6aa5b5aa1a6731ac66f234b4a
SHA14b0430d94b2dfcb0a6f6949a8fbb5eb7a34c328e
SHA2564f1a0d0b36df4f4913200f5da2305de097fa6438d1a714a8c78ce38e7ab45d66
SHA51285b2043c3cdef5a5e0381b14c99628604d34127ebee9eb779eee5c9424c4c92436abc9ce5d068aab534043a7fb7ecbbac953984f8c2bc2985c9da4a7f9d5727c
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD53f72733c140c71ff69b617c113df0e03
SHA179229b3583fc5a17888fcdf1b6a061b12ffb07b5
SHA256f588788e20d014e2697046af9a91925529cb0f6f19aec18284687d9f19367de5
SHA512d07c9ba2f31a88d9dcc7a27f8d8dc4ebce99b6cf3b9d594894d7b6992af6e1c7fa82f0f5554fc3a3979d00c73ef7a97a96c8d61a4070a4fed8835a797f0c9f53
-
Filesize
72KB
MD53f72733c140c71ff69b617c113df0e03
SHA179229b3583fc5a17888fcdf1b6a061b12ffb07b5
SHA256f588788e20d014e2697046af9a91925529cb0f6f19aec18284687d9f19367de5
SHA512d07c9ba2f31a88d9dcc7a27f8d8dc4ebce99b6cf3b9d594894d7b6992af6e1c7fa82f0f5554fc3a3979d00c73ef7a97a96c8d61a4070a4fed8835a797f0c9f53
-
Filesize
72KB
MD589170bc6aa5b5aa1a6731ac66f234b4a
SHA14b0430d94b2dfcb0a6f6949a8fbb5eb7a34c328e
SHA2564f1a0d0b36df4f4913200f5da2305de097fa6438d1a714a8c78ce38e7ab45d66
SHA51285b2043c3cdef5a5e0381b14c99628604d34127ebee9eb779eee5c9424c4c92436abc9ce5d068aab534043a7fb7ecbbac953984f8c2bc2985c9da4a7f9d5727c
-
Filesize
72KB
MD589170bc6aa5b5aa1a6731ac66f234b4a
SHA14b0430d94b2dfcb0a6f6949a8fbb5eb7a34c328e
SHA2564f1a0d0b36df4f4913200f5da2305de097fa6438d1a714a8c78ce38e7ab45d66
SHA51285b2043c3cdef5a5e0381b14c99628604d34127ebee9eb779eee5c9424c4c92436abc9ce5d068aab534043a7fb7ecbbac953984f8c2bc2985c9da4a7f9d5727c
-
Filesize
72KB
MD5505f0af0536687cf518b3f9002a256e8
SHA1c61462144017188f48309fb52a9ba6438d90b84b
SHA2567f31e717f9c677f8d4243f8371f632819478ecf5d2001111a4f2e4f3b9031bed
SHA5122f99f8d256e523bd0fd0b73443b0ed4cd175340325e8bd25ff0838375ae081e24c2baa76cf184a7152ae1d57f90d480ca842d0c12664316a93da58765169ebb5
-
Filesize
72KB
MD5505f0af0536687cf518b3f9002a256e8
SHA1c61462144017188f48309fb52a9ba6438d90b84b
SHA2567f31e717f9c677f8d4243f8371f632819478ecf5d2001111a4f2e4f3b9031bed
SHA5122f99f8d256e523bd0fd0b73443b0ed4cd175340325e8bd25ff0838375ae081e24c2baa76cf184a7152ae1d57f90d480ca842d0c12664316a93da58765169ebb5
-
Filesize
72KB
MD58f4e44d835e0c4424225977b95fc8038
SHA1285707a0e263a481ea75a5dc0de21a457706de25
SHA256027942c3ccc9c0491b5edc079755b0e33d02d7a1dfc4aab348e2bc2adbc87082
SHA512c622e0db12f3dab26b755fa01c3d59f4d34603762efc72c34c87a88bb4106fd2c92011f7561d55179e4d2a1f1e739910943fbf327957986c7a052979b8c5a430
-
Filesize
72KB
MD58f4e44d835e0c4424225977b95fc8038
SHA1285707a0e263a481ea75a5dc0de21a457706de25
SHA256027942c3ccc9c0491b5edc079755b0e33d02d7a1dfc4aab348e2bc2adbc87082
SHA512c622e0db12f3dab26b755fa01c3d59f4d34603762efc72c34c87a88bb4106fd2c92011f7561d55179e4d2a1f1e739910943fbf327957986c7a052979b8c5a430
-
Filesize
72KB
MD5946b29f3b77de1bffb7aebd9d584238f
SHA1ba3360d80984b69d9e96ddbd0424312d7f04a437
SHA2563df8dff58e38370230c53573ba0922877692b6d5355cbb41c4b5b5c60dfd5860
SHA512b54975374499ffd935df6c79d641e8ebb97114dc101c19ed50df1216625ce93262f6f7447a923bd2a1e06d39e8a16f6093047c0ba855a068e110cc46600b9867
-
Filesize
72KB
MD5946b29f3b77de1bffb7aebd9d584238f
SHA1ba3360d80984b69d9e96ddbd0424312d7f04a437
SHA2563df8dff58e38370230c53573ba0922877692b6d5355cbb41c4b5b5c60dfd5860
SHA512b54975374499ffd935df6c79d641e8ebb97114dc101c19ed50df1216625ce93262f6f7447a923bd2a1e06d39e8a16f6093047c0ba855a068e110cc46600b9867
-
Filesize
72KB
MD5505f0af0536687cf518b3f9002a256e8
SHA1c61462144017188f48309fb52a9ba6438d90b84b
SHA2567f31e717f9c677f8d4243f8371f632819478ecf5d2001111a4f2e4f3b9031bed
SHA5122f99f8d256e523bd0fd0b73443b0ed4cd175340325e8bd25ff0838375ae081e24c2baa76cf184a7152ae1d57f90d480ca842d0c12664316a93da58765169ebb5
-
Filesize
72KB
MD5505f0af0536687cf518b3f9002a256e8
SHA1c61462144017188f48309fb52a9ba6438d90b84b
SHA2567f31e717f9c677f8d4243f8371f632819478ecf5d2001111a4f2e4f3b9031bed
SHA5122f99f8d256e523bd0fd0b73443b0ed4cd175340325e8bd25ff0838375ae081e24c2baa76cf184a7152ae1d57f90d480ca842d0c12664316a93da58765169ebb5
-
Filesize
72KB
MD5946b29f3b77de1bffb7aebd9d584238f
SHA1ba3360d80984b69d9e96ddbd0424312d7f04a437
SHA2563df8dff58e38370230c53573ba0922877692b6d5355cbb41c4b5b5c60dfd5860
SHA512b54975374499ffd935df6c79d641e8ebb97114dc101c19ed50df1216625ce93262f6f7447a923bd2a1e06d39e8a16f6093047c0ba855a068e110cc46600b9867
-
Filesize
72KB
MD5946b29f3b77de1bffb7aebd9d584238f
SHA1ba3360d80984b69d9e96ddbd0424312d7f04a437
SHA2563df8dff58e38370230c53573ba0922877692b6d5355cbb41c4b5b5c60dfd5860
SHA512b54975374499ffd935df6c79d641e8ebb97114dc101c19ed50df1216625ce93262f6f7447a923bd2a1e06d39e8a16f6093047c0ba855a068e110cc46600b9867
-
Filesize
72KB
MD5f842805b6009c485f0bdcdb2d1fb9096
SHA14e1c4cccac658fcd3930688c2ddd683f89372599
SHA25658a44e9fbd035dba3328b2e500a21261b7b71361eeaa54c6b71405a827bfc56f
SHA512761ab516d6c0caa2ceb47cea17dd540ea48652e2f3fb66a31ea9a12d8edb99175291f941929c9d8cc5c69ebdf3e199ff3fd3cda77a34e6c67e60594fdfb30330
-
Filesize
72KB
MD59e99dbb55fc658ad65142b16b25b1014
SHA1abdcc67054cdb082e0fb683acf9ec42f03a9159f
SHA2568fe2f13e155b493e7b00938d2ec23fcc35313189641c1f91705343cac7b27bb7
SHA512a5be7138cde5def06783a0fc07a8201edf04bf7f244fb6f2325f072d4dcef44545ef9f96019a11572ba9ed7cd93ebdc5dc2629df168ae74bafae8aa410097339
-
Filesize
72KB
MD59e99dbb55fc658ad65142b16b25b1014
SHA1abdcc67054cdb082e0fb683acf9ec42f03a9159f
SHA2568fe2f13e155b493e7b00938d2ec23fcc35313189641c1f91705343cac7b27bb7
SHA512a5be7138cde5def06783a0fc07a8201edf04bf7f244fb6f2325f072d4dcef44545ef9f96019a11572ba9ed7cd93ebdc5dc2629df168ae74bafae8aa410097339
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD58f1a95c749473a1de9b0c5f72bcaeae8
SHA12eb40ce3605165984460c82e287d72a6f92488d9
SHA256a5905d9c2fa81ab84b937b362fa7b2f9e329ba208d00211229baf0bf8c479b48
SHA512dd37a7df090e807fd24a981cfe0e8ce38b3b4c974c4362e8df6596ffc0543d1a672dedac67b96bfd18abcdfe042374015566324b765bfb5042402b8fbcb77f17
-
Filesize
72KB
MD578a1195a0ce55ec057a7fc5638faefd0
SHA15ef4c7bd814b91b3013afd29122f3c8a0d171f6e
SHA256cc328ecbd2dd5a5ab14f976c51fc93e30788d6b15b40cbdfd3d83a0ea953393e
SHA512823ab3432e2ccd1ddf80ea1c39d6be47bae5da129902896b5516a9cc5e04d49314394215434695ae1e9113a4c77f9d63d23a32f0ee6e36cb2f9092ce990710ce
-
Filesize
72KB
MD578a1195a0ce55ec057a7fc5638faefd0
SHA15ef4c7bd814b91b3013afd29122f3c8a0d171f6e
SHA256cc328ecbd2dd5a5ab14f976c51fc93e30788d6b15b40cbdfd3d83a0ea953393e
SHA512823ab3432e2ccd1ddf80ea1c39d6be47bae5da129902896b5516a9cc5e04d49314394215434695ae1e9113a4c77f9d63d23a32f0ee6e36cb2f9092ce990710ce
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD578a1195a0ce55ec057a7fc5638faefd0
SHA15ef4c7bd814b91b3013afd29122f3c8a0d171f6e
SHA256cc328ecbd2dd5a5ab14f976c51fc93e30788d6b15b40cbdfd3d83a0ea953393e
SHA512823ab3432e2ccd1ddf80ea1c39d6be47bae5da129902896b5516a9cc5e04d49314394215434695ae1e9113a4c77f9d63d23a32f0ee6e36cb2f9092ce990710ce
-
Filesize
72KB
MD578a1195a0ce55ec057a7fc5638faefd0
SHA15ef4c7bd814b91b3013afd29122f3c8a0d171f6e
SHA256cc328ecbd2dd5a5ab14f976c51fc93e30788d6b15b40cbdfd3d83a0ea953393e
SHA512823ab3432e2ccd1ddf80ea1c39d6be47bae5da129902896b5516a9cc5e04d49314394215434695ae1e9113a4c77f9d63d23a32f0ee6e36cb2f9092ce990710ce
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967
-
Filesize
72KB
MD5a103cff92e4541eb981e4b86ad602c22
SHA1eada9850be54bbf7783c56e22c954b4874a92e72
SHA256090ddbc807020a2aa7f164db09d9c345cf0a4fb7fc5b759da606cd1304cf7423
SHA512a805c5ea789357a1e7f7f31127b92b8aee82e644b22da5d061edb85162555693b7a6f7d75e07014b064f8feaf3dcf8ab0f908ed662d21777a02b8edbc67f8967