Analysis
-
max time kernel
205s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe
Resource
win10v2004-20221111-en
General
-
Target
0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe
-
Size
72KB
-
MD5
03c3ad04a13baa254b5b37148e6991c6
-
SHA1
d6870210dc749833edea434d5c0f5dd48a2a4451
-
SHA256
0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09
-
SHA512
0c6209c246d2d7f1bd979bdf3ed88f35eaa7dbeeaa0e1a818901e2d3ce48fd99188022782bc9f0d18743570a9be04f7e582f8085e7e710a7e59e6033dd88bfb4
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf26:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 2024 backup.exe 652 backup.exe 1388 backup.exe 568 backup.exe 1980 backup.exe 1488 backup.exe 1568 backup.exe 916 System Restore.exe 776 backup.exe 1792 backup.exe 960 backup.exe 1160 backup.exe 1092 backup.exe 1936 backup.exe 1504 backup.exe 1772 backup.exe 1476 backup.exe 1736 data.exe 1548 backup.exe 280 backup.exe 2016 backup.exe 1956 backup.exe 756 backup.exe 1996 backup.exe 1692 backup.exe 1928 backup.exe 1392 backup.exe 1556 backup.exe 1440 backup.exe 1064 data.exe 2020 backup.exe 1796 data.exe 300 backup.exe 268 backup.exe 320 backup.exe 520 backup.exe 1744 data.exe 1356 data.exe 1468 backup.exe 1656 data.exe 612 backup.exe 1776 backup.exe 1548 backup.exe 392 backup.exe 1564 backup.exe 1316 backup.exe 1824 backup.exe 2040 backup.exe 1616 backup.exe 1812 backup.exe 832 data.exe 1192 backup.exe 696 backup.exe 1172 backup.exe 1096 data.exe 1700 backup.exe 1780 backup.exe 1736 backup.exe 1552 backup.exe 1392 backup.exe 1948 backup.exe 680 backup.exe 1752 backup.exe 1568 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 916 System Restore.exe 916 System Restore.exe 776 backup.exe 776 backup.exe 916 System Restore.exe 916 System Restore.exe 960 backup.exe 960 backup.exe 1160 backup.exe 1160 backup.exe 960 backup.exe 960 backup.exe 1936 backup.exe 1936 backup.exe 1504 backup.exe 1504 backup.exe 1504 backup.exe 1504 backup.exe 1348 backup.exe 1348 backup.exe 1348 backup.exe 1348 backup.exe 916 System Restore.exe 960 backup.exe 1936 backup.exe 1504 backup.exe 916 System Restore.exe 1504 backup.exe 1936 backup.exe 1348 backup.exe 1348 backup.exe 960 backup.exe 1348 backup.exe 1956 backup.exe 1348 backup.exe 1956 backup.exe 280 backup.exe 280 backup.exe 1996 backup.exe 1996 backup.exe 1936 backup.exe 1936 backup.exe 1348 backup.exe 1348 backup.exe 1392 backup.exe 1996 backup.exe 1392 backup.exe 1996 backup.exe 1504 backup.exe 960 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Policies\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe data.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Office\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe data.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\Branding\data.exe backup.exe File opened for modification C:\Windows\backup.exe System Restore.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 2024 backup.exe 652 backup.exe 1388 backup.exe 568 backup.exe 1980 backup.exe 1488 backup.exe 1568 backup.exe 916 System Restore.exe 776 backup.exe 1792 backup.exe 960 backup.exe 1160 backup.exe 1092 backup.exe 1936 backup.exe 1504 backup.exe 1772 backup.exe 1608 backup.exe 1584 backup.exe 1744 backup.exe 436 backup.exe 1448 System Restore.exe 1172 backup.exe 676 backup.exe 1756 backup.exe 568 backup.exe 1424 backup.exe 1700 backup.exe 1348 backup.exe 1736 data.exe 1548 backup.exe 1620 backup.exe 280 backup.exe 756 backup.exe 1996 backup.exe 1956 backup.exe 2016 backup.exe 1928 backup.exe 1092 backup.exe 1392 backup.exe 1692 backup.exe 1556 backup.exe 2020 backup.exe 1796 data.exe 1064 data.exe 1752 backup.exe 320 backup.exe 268 backup.exe 300 backup.exe 520 backup.exe 1356 data.exe 1744 data.exe 1468 backup.exe 1656 data.exe 1740 backup.exe 1440 backup.exe 1564 backup.exe 392 backup.exe 612 backup.exe 1548 backup.exe 1776 backup.exe 1316 backup.exe 1940 backup.exe 1824 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2024 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 28 PID 1188 wrote to memory of 2024 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 28 PID 1188 wrote to memory of 2024 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 28 PID 1188 wrote to memory of 2024 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 28 PID 1188 wrote to memory of 652 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 29 PID 1188 wrote to memory of 652 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 29 PID 1188 wrote to memory of 652 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 29 PID 1188 wrote to memory of 652 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 29 PID 1188 wrote to memory of 1388 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 30 PID 1188 wrote to memory of 1388 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 30 PID 1188 wrote to memory of 1388 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 30 PID 1188 wrote to memory of 1388 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 30 PID 1188 wrote to memory of 568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 31 PID 1188 wrote to memory of 568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 31 PID 1188 wrote to memory of 568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 31 PID 1188 wrote to memory of 568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 31 PID 1188 wrote to memory of 1980 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 32 PID 1188 wrote to memory of 1980 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 32 PID 1188 wrote to memory of 1980 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 32 PID 1188 wrote to memory of 1980 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 32 PID 1188 wrote to memory of 1488 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 33 PID 1188 wrote to memory of 1488 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 33 PID 1188 wrote to memory of 1488 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 33 PID 1188 wrote to memory of 1488 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 33 PID 1188 wrote to memory of 1568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 34 PID 1188 wrote to memory of 1568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 34 PID 1188 wrote to memory of 1568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 34 PID 1188 wrote to memory of 1568 1188 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe 34 PID 2024 wrote to memory of 916 2024 backup.exe 35 PID 2024 wrote to memory of 916 2024 backup.exe 35 PID 2024 wrote to memory of 916 2024 backup.exe 35 PID 2024 wrote to memory of 916 2024 backup.exe 35 PID 916 wrote to memory of 776 916 System Restore.exe 36 PID 916 wrote to memory of 776 916 System Restore.exe 36 PID 916 wrote to memory of 776 916 System Restore.exe 36 PID 916 wrote to memory of 776 916 System Restore.exe 36 PID 776 wrote to memory of 1792 776 backup.exe 37 PID 776 wrote to memory of 1792 776 backup.exe 37 PID 776 wrote to memory of 1792 776 backup.exe 37 PID 776 wrote to memory of 1792 776 backup.exe 37 PID 916 wrote to memory of 960 916 System Restore.exe 38 PID 916 wrote to memory of 960 916 System Restore.exe 38 PID 916 wrote to memory of 960 916 System Restore.exe 38 PID 916 wrote to memory of 960 916 System Restore.exe 38 PID 960 wrote to memory of 1160 960 backup.exe 39 PID 960 wrote to memory of 1160 960 backup.exe 39 PID 960 wrote to memory of 1160 960 backup.exe 39 PID 960 wrote to memory of 1160 960 backup.exe 39 PID 1160 wrote to memory of 1092 1160 backup.exe 40 PID 1160 wrote to memory of 1092 1160 backup.exe 40 PID 1160 wrote to memory of 1092 1160 backup.exe 40 PID 1160 wrote to memory of 1092 1160 backup.exe 40 PID 960 wrote to memory of 1936 960 backup.exe 41 PID 960 wrote to memory of 1936 960 backup.exe 41 PID 960 wrote to memory of 1936 960 backup.exe 41 PID 960 wrote to memory of 1936 960 backup.exe 41 PID 1936 wrote to memory of 1504 1936 backup.exe 42 PID 1936 wrote to memory of 1504 1936 backup.exe 42 PID 1936 wrote to memory of 1504 1936 backup.exe 42 PID 1936 wrote to memory of 1504 1936 backup.exe 42 PID 1504 wrote to memory of 1772 1504 backup.exe 43 PID 1504 wrote to memory of 1772 1504 backup.exe 43 PID 1504 wrote to memory of 1772 1504 backup.exe 43 PID 1504 wrote to memory of 1772 1504 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe"C:\Users\Admin\AppData\Local\Temp\0207411f7c5df27e6039e9dff79c2bafb9d0a7846e8ff1aaafcf43d01da54f09.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\614389509\backup.exeC:\Users\Admin\AppData\Local\Temp\614389509\backup.exe C:\Users\Admin\AppData\Local\Temp\614389509\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\System Restore.exe"\System Restore.exe" \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:916 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:776 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1792
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1160 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1936 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1504 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1476 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:436
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:676
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Disables RegEdit via registry modification
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1348 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:756
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1692
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1064
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:364
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:924
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:1712
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:2068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:2268
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1956 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1440
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:320
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:612
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1772
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Executes dropped EXE
PID:1700
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1548
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1192
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1908
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1500
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:2212
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2380
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1392 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:520 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:696 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:1960
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1584
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1808
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:2180
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:2356
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:188
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1980
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:2196
-
-
C:\Program Files\Common Files\System\fr-FR\update.exe"C:\Program Files\Common Files\System\fr-FR\update.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:2372
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Program Files\DVD Maker\en-US\data.exe"C:\Program Files\DVD Maker\en-US\data.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1796
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1468
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1948
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1728
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:2140
-
-
-
C:\Program Files\Google\data.exe"C:\Program Files\Google\data.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1744 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
PID:1780 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:2088
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1564 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:1752
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:1020
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1316
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:2188
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:2348
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:2040 -
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵
- Executes dropped EXE
PID:1736
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:612
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1488
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1164
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2220
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2388
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:280 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Program Files (x86)\Adobe\Reader 9.0\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:832 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:680
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵PID:1636
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:2100
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:2284
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:300 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
PID:1568
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:308
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:2108
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:2276
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:392 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Executes dropped EXE
PID:1392
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:536
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1724
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:2172
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1064
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:2032
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe"C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵PID:2076
-
-
C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe" C:\Program Files (x86)\Internet Explorer\fr-FR\6⤵PID:2292
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft Office\System Restore.exe"C:\Program Files (x86)\Microsoft Office\System Restore.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2364
-
-
-
C:\Users\data.exeC:\Users\data.exe C:\Users\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1356 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1172 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:1144
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:2132
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:2340
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:568
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1552
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1692
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:676
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:2204
-
-
C:\Windows\Branding\data.exeC:\Windows\Branding\data.exe C:\Windows\Branding\5⤵PID:2396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD537069a8a93c09e1c41a3b9f3c14437ab
SHA18ecb3de6ec9b99ac4a4469cdf5533e26731ea8af
SHA2568d62ca893c2fe4c7b2aeeebbdec34299ed1f5c080d4f2f3dfd9f277d3d044b04
SHA512331c45b173e1f38db54d70223d0013bcc149ab600b682ff74518edcc31e1d92f9229d119add909f986adec7b9f2c0bc075a32199449eb0aaf8258adf523d342a
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5f5ec2fd1f5ba61ec62141d93813c517d
SHA17a93bed89586f1f6eecb213b8c94b8602f69603f
SHA2564713348d294b241601911d0d8de9052a5864706e407e868613b3490da60c3482
SHA512b95d0ef4667548882d645bebcd43b4bfa1daeea77afe5bf1c4ad7233eae578f43b3108f7aa2ca46100020bc946c2bf552df418dc7ff4074d1c4f9bd1ae36fc14
-
Filesize
72KB
MD537069a8a93c09e1c41a3b9f3c14437ab
SHA18ecb3de6ec9b99ac4a4469cdf5533e26731ea8af
SHA2568d62ca893c2fe4c7b2aeeebbdec34299ed1f5c080d4f2f3dfd9f277d3d044b04
SHA512331c45b173e1f38db54d70223d0013bcc149ab600b682ff74518edcc31e1d92f9229d119add909f986adec7b9f2c0bc075a32199449eb0aaf8258adf523d342a
-
Filesize
72KB
MD537069a8a93c09e1c41a3b9f3c14437ab
SHA18ecb3de6ec9b99ac4a4469cdf5533e26731ea8af
SHA2568d62ca893c2fe4c7b2aeeebbdec34299ed1f5c080d4f2f3dfd9f277d3d044b04
SHA512331c45b173e1f38db54d70223d0013bcc149ab600b682ff74518edcc31e1d92f9229d119add909f986adec7b9f2c0bc075a32199449eb0aaf8258adf523d342a
-
Filesize
72KB
MD5f5ec2fd1f5ba61ec62141d93813c517d
SHA17a93bed89586f1f6eecb213b8c94b8602f69603f
SHA2564713348d294b241601911d0d8de9052a5864706e407e868613b3490da60c3482
SHA512b95d0ef4667548882d645bebcd43b4bfa1daeea77afe5bf1c4ad7233eae578f43b3108f7aa2ca46100020bc946c2bf552df418dc7ff4074d1c4f9bd1ae36fc14
-
Filesize
72KB
MD5a71b42bf757d8d5f667fa0e616c2e6ee
SHA13434d8168c25781640288bed6deae9d6c55dc3a3
SHA2563b33494b312d48fb47ff0c3a56d6cf741f464fcf6e62d5ffea9ba47c05165ad6
SHA51241d7220fbe5f210c0f7b9d428286432d982d420b8e852d76fd576e570a8d184c1112780b5e1e847104aa1eabca5e1ca732fafbaf6d8993d4dc11afccc9952fed
-
Filesize
72KB
MD5a71b42bf757d8d5f667fa0e616c2e6ee
SHA13434d8168c25781640288bed6deae9d6c55dc3a3
SHA2563b33494b312d48fb47ff0c3a56d6cf741f464fcf6e62d5ffea9ba47c05165ad6
SHA51241d7220fbe5f210c0f7b9d428286432d982d420b8e852d76fd576e570a8d184c1112780b5e1e847104aa1eabca5e1ca732fafbaf6d8993d4dc11afccc9952fed
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD5a1ba85bd788563d1cc696eae5d136056
SHA196fd43f7bdd83210598d8f5af5adf1e656da0d9c
SHA2560746911ff27cabf1ef7e9dd4bbe12258cb4ae8afd0005c0d349f768a7fbfa21a
SHA5121485a2db7ee3112f38d4b0c3ab6170bdf020a8e0a7d35570be1ecabe615c38394d42c0e30a90a2249bcafeb1db294adb522a3dbdb8b50335de6e809bd60a1d11
-
Filesize
72KB
MD5a1ba85bd788563d1cc696eae5d136056
SHA196fd43f7bdd83210598d8f5af5adf1e656da0d9c
SHA2560746911ff27cabf1ef7e9dd4bbe12258cb4ae8afd0005c0d349f768a7fbfa21a
SHA5121485a2db7ee3112f38d4b0c3ab6170bdf020a8e0a7d35570be1ecabe615c38394d42c0e30a90a2249bcafeb1db294adb522a3dbdb8b50335de6e809bd60a1d11
-
Filesize
72KB
MD5b1911fcc14c19826783e1e72ce0df20b
SHA158aaf52fc74f16fe750a968c32a4afe936ba8dbc
SHA2561ca2d667c863be4ec457e57d9b39f37eba222d2e7ccecb2d41cee7e2834b01bc
SHA5129c21ba59f0bd8e289d5debb0b344f08170eec135efca117ec6518978d98f47d0c391f97ebdfe1ca6d4bf40ab90b663246d3ce21ad07e4a84001bfdda9f6c1bb4
-
Filesize
72KB
MD5b1911fcc14c19826783e1e72ce0df20b
SHA158aaf52fc74f16fe750a968c32a4afe936ba8dbc
SHA2561ca2d667c863be4ec457e57d9b39f37eba222d2e7ccecb2d41cee7e2834b01bc
SHA5129c21ba59f0bd8e289d5debb0b344f08170eec135efca117ec6518978d98f47d0c391f97ebdfe1ca6d4bf40ab90b663246d3ce21ad07e4a84001bfdda9f6c1bb4
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD5b1911fcc14c19826783e1e72ce0df20b
SHA158aaf52fc74f16fe750a968c32a4afe936ba8dbc
SHA2561ca2d667c863be4ec457e57d9b39f37eba222d2e7ccecb2d41cee7e2834b01bc
SHA5129c21ba59f0bd8e289d5debb0b344f08170eec135efca117ec6518978d98f47d0c391f97ebdfe1ca6d4bf40ab90b663246d3ce21ad07e4a84001bfdda9f6c1bb4
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD5c3c2dcdf9f934936edcba58908d1c5cd
SHA16a68b64c5cdd2cbcfe9778ebcebdafb340b23963
SHA256219b8fd1aa9de8be43ad926fcbf71eab8888133c84df3ded63b34bce0cb3e5cc
SHA512450b0802e6b5b9b74866e8111e10da0b5e0cdf3d003993842914cac239fb793ae56ccf9fcefdeba606fc92d1cf9a08f768622b32cc9a6e27b0879eb34a26cdb6
-
Filesize
72KB
MD537069a8a93c09e1c41a3b9f3c14437ab
SHA18ecb3de6ec9b99ac4a4469cdf5533e26731ea8af
SHA2568d62ca893c2fe4c7b2aeeebbdec34299ed1f5c080d4f2f3dfd9f277d3d044b04
SHA512331c45b173e1f38db54d70223d0013bcc149ab600b682ff74518edcc31e1d92f9229d119add909f986adec7b9f2c0bc075a32199449eb0aaf8258adf523d342a
-
Filesize
72KB
MD537069a8a93c09e1c41a3b9f3c14437ab
SHA18ecb3de6ec9b99ac4a4469cdf5533e26731ea8af
SHA2568d62ca893c2fe4c7b2aeeebbdec34299ed1f5c080d4f2f3dfd9f277d3d044b04
SHA512331c45b173e1f38db54d70223d0013bcc149ab600b682ff74518edcc31e1d92f9229d119add909f986adec7b9f2c0bc075a32199449eb0aaf8258adf523d342a
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5f5ec2fd1f5ba61ec62141d93813c517d
SHA17a93bed89586f1f6eecb213b8c94b8602f69603f
SHA2564713348d294b241601911d0d8de9052a5864706e407e868613b3490da60c3482
SHA512b95d0ef4667548882d645bebcd43b4bfa1daeea77afe5bf1c4ad7233eae578f43b3108f7aa2ca46100020bc946c2bf552df418dc7ff4074d1c4f9bd1ae36fc14
-
Filesize
72KB
MD5f5ec2fd1f5ba61ec62141d93813c517d
SHA17a93bed89586f1f6eecb213b8c94b8602f69603f
SHA2564713348d294b241601911d0d8de9052a5864706e407e868613b3490da60c3482
SHA512b95d0ef4667548882d645bebcd43b4bfa1daeea77afe5bf1c4ad7233eae578f43b3108f7aa2ca46100020bc946c2bf552df418dc7ff4074d1c4f9bd1ae36fc14
-
Filesize
72KB
MD537069a8a93c09e1c41a3b9f3c14437ab
SHA18ecb3de6ec9b99ac4a4469cdf5533e26731ea8af
SHA2568d62ca893c2fe4c7b2aeeebbdec34299ed1f5c080d4f2f3dfd9f277d3d044b04
SHA512331c45b173e1f38db54d70223d0013bcc149ab600b682ff74518edcc31e1d92f9229d119add909f986adec7b9f2c0bc075a32199449eb0aaf8258adf523d342a
-
Filesize
72KB
MD537069a8a93c09e1c41a3b9f3c14437ab
SHA18ecb3de6ec9b99ac4a4469cdf5533e26731ea8af
SHA2568d62ca893c2fe4c7b2aeeebbdec34299ed1f5c080d4f2f3dfd9f277d3d044b04
SHA512331c45b173e1f38db54d70223d0013bcc149ab600b682ff74518edcc31e1d92f9229d119add909f986adec7b9f2c0bc075a32199449eb0aaf8258adf523d342a
-
Filesize
72KB
MD5f5ec2fd1f5ba61ec62141d93813c517d
SHA17a93bed89586f1f6eecb213b8c94b8602f69603f
SHA2564713348d294b241601911d0d8de9052a5864706e407e868613b3490da60c3482
SHA512b95d0ef4667548882d645bebcd43b4bfa1daeea77afe5bf1c4ad7233eae578f43b3108f7aa2ca46100020bc946c2bf552df418dc7ff4074d1c4f9bd1ae36fc14
-
Filesize
72KB
MD5f5ec2fd1f5ba61ec62141d93813c517d
SHA17a93bed89586f1f6eecb213b8c94b8602f69603f
SHA2564713348d294b241601911d0d8de9052a5864706e407e868613b3490da60c3482
SHA512b95d0ef4667548882d645bebcd43b4bfa1daeea77afe5bf1c4ad7233eae578f43b3108f7aa2ca46100020bc946c2bf552df418dc7ff4074d1c4f9bd1ae36fc14
-
Filesize
72KB
MD5a71b42bf757d8d5f667fa0e616c2e6ee
SHA13434d8168c25781640288bed6deae9d6c55dc3a3
SHA2563b33494b312d48fb47ff0c3a56d6cf741f464fcf6e62d5ffea9ba47c05165ad6
SHA51241d7220fbe5f210c0f7b9d428286432d982d420b8e852d76fd576e570a8d184c1112780b5e1e847104aa1eabca5e1ca732fafbaf6d8993d4dc11afccc9952fed
-
Filesize
72KB
MD5a71b42bf757d8d5f667fa0e616c2e6ee
SHA13434d8168c25781640288bed6deae9d6c55dc3a3
SHA2563b33494b312d48fb47ff0c3a56d6cf741f464fcf6e62d5ffea9ba47c05165ad6
SHA51241d7220fbe5f210c0f7b9d428286432d982d420b8e852d76fd576e570a8d184c1112780b5e1e847104aa1eabca5e1ca732fafbaf6d8993d4dc11afccc9952fed
-
Filesize
72KB
MD5a71b42bf757d8d5f667fa0e616c2e6ee
SHA13434d8168c25781640288bed6deae9d6c55dc3a3
SHA2563b33494b312d48fb47ff0c3a56d6cf741f464fcf6e62d5ffea9ba47c05165ad6
SHA51241d7220fbe5f210c0f7b9d428286432d982d420b8e852d76fd576e570a8d184c1112780b5e1e847104aa1eabca5e1ca732fafbaf6d8993d4dc11afccc9952fed
-
Filesize
72KB
MD5a71b42bf757d8d5f667fa0e616c2e6ee
SHA13434d8168c25781640288bed6deae9d6c55dc3a3
SHA2563b33494b312d48fb47ff0c3a56d6cf741f464fcf6e62d5ffea9ba47c05165ad6
SHA51241d7220fbe5f210c0f7b9d428286432d982d420b8e852d76fd576e570a8d184c1112780b5e1e847104aa1eabca5e1ca732fafbaf6d8993d4dc11afccc9952fed
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5e5840a88f8d62250721c49267d0752a2
SHA18bbc5c2e789a50f4c336db1c0db30770db07f865
SHA2560d3fe9a39831aeb201f49aa3ee56f73bbd9b22f393171e3b9ecf04afeb93824f
SHA512897e3cd2d301c129aae27374bffba12c7a5400ca3ae3ea7412bd07c7d80a0df9b8d3b6d580bf4eb9cca7b4b4ec6c4956e4907bb8ddf32c3f9242f7eef0abd682
-
Filesize
72KB
MD5f702109c83a580ca6882aacd030b382a
SHA1e886d1dbacba56432ea98f2421993920517fd371
SHA256148f8e0d9433541dcc5b6371041b5c6c54244a34a948e535f8056c339383872b
SHA51217801674e405b1eaacba66ee1bfb334509ec93e45bb98f4f7bbc56b597019a6104141fb8abf7d0940c877ececf1632777d8c779a4901fd0adbb70dc97b274c6f
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD5d8e2dfb1efebdc4087443a03dc0fd0d3
SHA12908fbc091f2a43dc50efdd28b783a3f928d6563
SHA25628587c07d3e44146903fd6e1724592c8b36a6414cbd61e0e87d7e75933e3f58c
SHA512ea4d08f35234ad77a37b14fe2cf1e76d3152973e19fdb1e16937ad90611d43d4e4ebb909d81090d53915eb1b35109b65f8aa101991cd4a352cd0bf5608016178
-
Filesize
72KB
MD5b1911fcc14c19826783e1e72ce0df20b
SHA158aaf52fc74f16fe750a968c32a4afe936ba8dbc
SHA2561ca2d667c863be4ec457e57d9b39f37eba222d2e7ccecb2d41cee7e2834b01bc
SHA5129c21ba59f0bd8e289d5debb0b344f08170eec135efca117ec6518978d98f47d0c391f97ebdfe1ca6d4bf40ab90b663246d3ce21ad07e4a84001bfdda9f6c1bb4
-
Filesize
72KB
MD5b1911fcc14c19826783e1e72ce0df20b
SHA158aaf52fc74f16fe750a968c32a4afe936ba8dbc
SHA2561ca2d667c863be4ec457e57d9b39f37eba222d2e7ccecb2d41cee7e2834b01bc
SHA5129c21ba59f0bd8e289d5debb0b344f08170eec135efca117ec6518978d98f47d0c391f97ebdfe1ca6d4bf40ab90b663246d3ce21ad07e4a84001bfdda9f6c1bb4
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD5b1911fcc14c19826783e1e72ce0df20b
SHA158aaf52fc74f16fe750a968c32a4afe936ba8dbc
SHA2561ca2d667c863be4ec457e57d9b39f37eba222d2e7ccecb2d41cee7e2834b01bc
SHA5129c21ba59f0bd8e289d5debb0b344f08170eec135efca117ec6518978d98f47d0c391f97ebdfe1ca6d4bf40ab90b663246d3ce21ad07e4a84001bfdda9f6c1bb4
-
Filesize
72KB
MD5b1911fcc14c19826783e1e72ce0df20b
SHA158aaf52fc74f16fe750a968c32a4afe936ba8dbc
SHA2561ca2d667c863be4ec457e57d9b39f37eba222d2e7ccecb2d41cee7e2834b01bc
SHA5129c21ba59f0bd8e289d5debb0b344f08170eec135efca117ec6518978d98f47d0c391f97ebdfe1ca6d4bf40ab90b663246d3ce21ad07e4a84001bfdda9f6c1bb4
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac
-
Filesize
72KB
MD547d1484e726eabaf93ce6bbd70a493fa
SHA16d6f02a28b1da9c16f9fc12af21b37967d381ea7
SHA2562176ad9f0b10a0415c7151e5891c521734e8bc202c13c40b7da26b085204880f
SHA51293cded37216ed8f495e8091fe8b3421a9fd00152f70cd9cd38018b60aa909a23153d50c5a0fdf2408ed819c273b81166fc59b70102018c4d6c60b186d29100ac