Analysis
-
max time kernel
74s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe
Resource
win10v2004-20220812-en
General
-
Target
047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe
-
Size
72KB
-
MD5
00e10cc6681a971ecd92c412a8573390
-
SHA1
1c75f106a657ab1e248025a01218c75dd46e392d
-
SHA256
047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d
-
SHA512
7aa8f3571c6b875c3707b5450de5b29f0d01e8c771f7b62c0f318440eecc2ce5b2ade36710df888ec4503a147853fd00739afc8af1c4f2e6ce21a777f87a2cce
-
SSDEEP
768:NpQNwC3BESe4Vqth+0V5vKlE3BEJwRrTd3FAyv2:HeT7BVwxfvqguKRFAD
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 952 backup.exe 1760 backup.exe 1416 backup.exe 1288 backup.exe 604 backup.exe 1780 update.exe 1888 backup.exe 272 data.exe 1348 backup.exe 592 backup.exe 588 backup.exe 1988 backup.exe 1560 backup.exe 1904 backup.exe 1500 backup.exe 1588 backup.exe 784 backup.exe 944 backup.exe 1420 backup.exe 1764 backup.exe 2032 backup.exe 992 backup.exe 736 data.exe 836 backup.exe 1640 backup.exe 1620 backup.exe 1340 backup.exe 2008 backup.exe 1724 data.exe 1552 backup.exe 1912 backup.exe 1804 backup.exe 640 backup.exe 1580 backup.exe 1040 backup.exe 1572 backup.exe 1988 update.exe 1560 backup.exe 1924 backup.exe 1900 backup.exe 1084 backup.exe 1832 backup.exe 1392 System Restore.exe 1188 backup.exe 1412 backup.exe 1336 backup.exe 944 backup.exe 1420 data.exe 1768 backup.exe 2032 backup.exe 992 backup.exe 736 backup.exe 1720 backup.exe 1640 backup.exe 1620 backup.exe 568 backup.exe 1172 backup.exe 1888 backup.exe 1552 backup.exe 800 backup.exe 1700 backup.exe 1804 backup.exe 640 backup.exe 1960 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 604 backup.exe 604 backup.exe 1780 update.exe 1780 update.exe 1780 update.exe 1888 backup.exe 1888 backup.exe 604 backup.exe 604 backup.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1348 backup.exe 1348 backup.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 588 backup.exe 588 backup.exe 1348 backup.exe 1348 backup.exe 1904 backup.exe 1904 backup.exe 1500 backup.exe 1500 backup.exe 1500 backup.exe 1500 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 784 backup.exe 1724 data.exe 1724 data.exe 1724 data.exe 1724 data.exe 1724 data.exe 1724 data.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe backup.exe File opened for modification C:\Program Files\Google\update.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe update.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\update.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 952 backup.exe 1760 backup.exe 1416 backup.exe 1288 backup.exe 604 backup.exe 1888 backup.exe 1780 update.exe 272 data.exe 1348 backup.exe 592 backup.exe 588 backup.exe 1988 backup.exe 1560 backup.exe 1904 backup.exe 1500 backup.exe 1588 backup.exe 784 backup.exe 944 backup.exe 1420 backup.exe 1764 backup.exe 2032 backup.exe 992 backup.exe 736 data.exe 836 backup.exe 1640 backup.exe 1620 backup.exe 1340 backup.exe 2008 backup.exe 1724 data.exe 1552 backup.exe 1912 backup.exe 1804 backup.exe 640 backup.exe 1580 backup.exe 1040 backup.exe 1572 backup.exe 1988 update.exe 1560 backup.exe 1924 backup.exe 1900 backup.exe 1084 backup.exe 1832 backup.exe 1392 System Restore.exe 1188 backup.exe 1412 backup.exe 1336 backup.exe 944 backup.exe 1420 data.exe 1768 backup.exe 2032 backup.exe 992 backup.exe 736 backup.exe 1720 backup.exe 1640 backup.exe 1620 backup.exe 568 backup.exe 1172 backup.exe 1888 backup.exe 1552 backup.exe 1700 backup.exe 800 backup.exe 1804 backup.exe 640 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 952 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 27 PID 1076 wrote to memory of 952 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 27 PID 1076 wrote to memory of 952 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 27 PID 1076 wrote to memory of 952 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 27 PID 1076 wrote to memory of 1760 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 28 PID 1076 wrote to memory of 1760 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 28 PID 1076 wrote to memory of 1760 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 28 PID 1076 wrote to memory of 1760 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 28 PID 1076 wrote to memory of 1416 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 29 PID 1076 wrote to memory of 1416 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 29 PID 1076 wrote to memory of 1416 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 29 PID 1076 wrote to memory of 1416 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 29 PID 1076 wrote to memory of 1288 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 30 PID 1076 wrote to memory of 1288 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 30 PID 1076 wrote to memory of 1288 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 30 PID 1076 wrote to memory of 1288 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 30 PID 952 wrote to memory of 604 952 backup.exe 31 PID 952 wrote to memory of 604 952 backup.exe 31 PID 952 wrote to memory of 604 952 backup.exe 31 PID 952 wrote to memory of 604 952 backup.exe 31 PID 1076 wrote to memory of 1780 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 32 PID 1076 wrote to memory of 1780 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 32 PID 1076 wrote to memory of 1780 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 32 PID 1076 wrote to memory of 1780 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 32 PID 1076 wrote to memory of 1780 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 32 PID 1076 wrote to memory of 1780 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 32 PID 1076 wrote to memory of 1780 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 32 PID 604 wrote to memory of 1888 604 backup.exe 33 PID 604 wrote to memory of 1888 604 backup.exe 33 PID 604 wrote to memory of 1888 604 backup.exe 33 PID 604 wrote to memory of 1888 604 backup.exe 33 PID 1888 wrote to memory of 272 1888 backup.exe 34 PID 1888 wrote to memory of 272 1888 backup.exe 34 PID 1888 wrote to memory of 272 1888 backup.exe 34 PID 1888 wrote to memory of 272 1888 backup.exe 34 PID 604 wrote to memory of 1348 604 backup.exe 35 PID 604 wrote to memory of 1348 604 backup.exe 35 PID 604 wrote to memory of 1348 604 backup.exe 35 PID 604 wrote to memory of 1348 604 backup.exe 35 PID 1076 wrote to memory of 592 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 36 PID 1076 wrote to memory of 592 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 36 PID 1076 wrote to memory of 592 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 36 PID 1076 wrote to memory of 592 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 36 PID 1348 wrote to memory of 588 1348 backup.exe 37 PID 1348 wrote to memory of 588 1348 backup.exe 37 PID 1348 wrote to memory of 588 1348 backup.exe 37 PID 1348 wrote to memory of 588 1348 backup.exe 37 PID 1076 wrote to memory of 1988 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 38 PID 1076 wrote to memory of 1988 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 38 PID 1076 wrote to memory of 1988 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 38 PID 1076 wrote to memory of 1988 1076 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe 38 PID 588 wrote to memory of 1560 588 backup.exe 39 PID 588 wrote to memory of 1560 588 backup.exe 39 PID 588 wrote to memory of 1560 588 backup.exe 39 PID 588 wrote to memory of 1560 588 backup.exe 39 PID 1348 wrote to memory of 1904 1348 backup.exe 40 PID 1348 wrote to memory of 1904 1348 backup.exe 40 PID 1348 wrote to memory of 1904 1348 backup.exe 40 PID 1348 wrote to memory of 1904 1348 backup.exe 40 PID 1904 wrote to memory of 1500 1904 backup.exe 41 PID 1904 wrote to memory of 1500 1904 backup.exe 41 PID 1904 wrote to memory of 1500 1904 backup.exe 41 PID 1904 wrote to memory of 1500 1904 backup.exe 41 PID 1500 wrote to memory of 1588 1500 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe"C:\Users\Admin\AppData\Local\Temp\047b63387f274cc7ef9aba5216a201d7a3ebe7b1044112ae44644be65da87a7d.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\1317440288\backup.exeC:\Users\Admin\AppData\Local\Temp\1317440288\backup.exe C:\Users\Admin\AppData\Local\Temp\1317440288\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:604 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1888 -
C:\PerfLogs\Admin\data.exeC:\PerfLogs\Admin\data.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:272
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:588 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1500 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:784 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1040
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1084
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1392
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1188
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1412
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1172
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\8⤵
- Modifies visibility of file extensions in Explorer
PID:1344
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1656
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\8⤵PID:1908
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:640 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:1432
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
PID:2036
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1868
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- System policy modification
PID:736
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1072
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Drops file in Program Files directory
PID:1172 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- System policy modification
PID:1512
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\update.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\update.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- System policy modification
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1208
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:1676
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:1112
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\data.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\data.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:1088
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:2220
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1712
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\8⤵PID:1420
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\8⤵PID:1892
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\data.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\data.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\8⤵PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\8⤵PID:2196
-
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:892
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2056
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- System policy modification
PID:1920 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵PID:960
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Drops file in Program Files directory
PID:1568 -
C:\Program Files\Common Files\System\ado\update.exe"C:\Program Files\Common Files\System\ado\update.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1784 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- System policy modification
PID:1612
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:428
-
-
C:\Program Files\Common Files\System\ado\es-ES\update.exe"C:\Program Files\Common Files\System\ado\es-ES\update.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1780
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1980
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1804
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1188
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
PID:860
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1936
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1272
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:2008
-
-
C:\Program Files\Common Files\System\it-IT\System Restore.exe"C:\Program Files\Common Files\System\it-IT\System Restore.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:1912
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:2164
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
PID:1388
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵PID:1900
-
-
C:\Program Files\DVD Maker\es-ES\System Restore.exe"C:\Program Files\DVD Maker\es-ES\System Restore.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1396
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:2024
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:268
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1904
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:2080
-
-
-
C:\Program Files\Google\update.exe"C:\Program Files\Google\update.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1960 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1236
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1544
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:960
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:2044
-
-
C:\Program Files\Internet Explorer\es-ES\update.exe"C:\Program Files\Internet Explorer\es-ES\update.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:2136
-
-
-
C:\Program Files\Java\System Restore.exe"C:\Program Files\Java\System Restore.exe" C:\Program Files\Java\5⤵PID:1580
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1960
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:316
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2236
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Drops file in Program Files directory
- System policy modification
PID:1988 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Drops file in Program Files directory
- System policy modification
PID:1084 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
PID:1772
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1336 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- System policy modification
PID:944
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- System policy modification
PID:2032
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1728
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1340 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
PID:2044
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
PID:1740
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1068 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:564
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:756
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:828
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1292
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:2092
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:2212
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1636
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:1804
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1820
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:2172
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1172
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵PID:1772
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1680
-
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Drops file in Program Files directory
- System policy modification
PID:1916 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:640
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵PID:612
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:1612
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1644
-
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\7⤵PID:1652
-
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:384
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1832
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:604
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:2144
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1952
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1608
-
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵PID:564
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:468
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe"C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵PID:2064
-
-
C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe" C:\Program Files (x86)\Internet Explorer\fr-FR\6⤵PID:2244
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2228
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
PID:272 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- System policy modification
PID:1920 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:428
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:1476
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:1988
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1288
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:532
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:2188
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:2032
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:944 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:628
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1256
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1924
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:1708
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:2072
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b41b0dd0d5a4dabfc022d26dd71da768
SHA1cd2029a4542da9c1af6ff76e73b13e58d34a4575
SHA25668e184f5378e11b45b343bb4e13545244acb676ebfe71caa1054b8977d869d29
SHA5129c0cf47addf837fa7d8effd865b17840ea6274f4b7a8db5b406f0ef55e24da64049d0f1b8d6d0747c7f6988c3680df871deccb674839f47dcc44e38cefe5dad9
-
Filesize
72KB
MD57bdeca94f7b106fa8327f2bad50f4375
SHA18b76a3bd536accbd700f6a590da01f2ab604c0af
SHA256f45e342b41d7b3975ae8b2cebb4043503810b3aa9a3ab241061747c2960a6628
SHA512e17bb0f58f7c31490c81be3a3ed55c5d82678f0440ef87fa400eda679227e23daf344c7d005612ea954246791d175a490be29da76ff61ccbc2888a93153d7b2e
-
Filesize
72KB
MD57bdeca94f7b106fa8327f2bad50f4375
SHA18b76a3bd536accbd700f6a590da01f2ab604c0af
SHA256f45e342b41d7b3975ae8b2cebb4043503810b3aa9a3ab241061747c2960a6628
SHA512e17bb0f58f7c31490c81be3a3ed55c5d82678f0440ef87fa400eda679227e23daf344c7d005612ea954246791d175a490be29da76ff61ccbc2888a93153d7b2e
-
Filesize
72KB
MD5a48c6d19f39dc8dc466cff8a4a51be9c
SHA1f600a145315781a390ab6db290d0354f148260ec
SHA2567b73281b4b15aa66f407d7bf8152c352e0fc58d1dcb5e999a3ea8e2673ccab09
SHA5127277a2160ee65a1fa3dc513c68110f1d48a01b72966f4ebb5f9a0c4bdb13027215cc97fede386761abf28d8a6e31c47e5963d1f4c5111ee6a0abcf741c882d35
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD51738a6b30f66f6ffe908b43a5a8b4995
SHA1b739a19f2532e60c308be25502f941e03cdb2791
SHA25657dbf2cfeba82c18652b7bdfc0abf03718eb4bcf0452ce0c27e69e93839399a2
SHA512f555299ea5c9b865be931d5ebb91fbd6b7fc8fa0ce53da5a72ca9ebd9f6601bbf82662f7f5ae9a727808bfa2c4c48e8b6e4a2318c5f3ee59da72e85a0ee273f0
-
Filesize
72KB
MD5a48c6d19f39dc8dc466cff8a4a51be9c
SHA1f600a145315781a390ab6db290d0354f148260ec
SHA2567b73281b4b15aa66f407d7bf8152c352e0fc58d1dcb5e999a3ea8e2673ccab09
SHA5127277a2160ee65a1fa3dc513c68110f1d48a01b72966f4ebb5f9a0c4bdb13027215cc97fede386761abf28d8a6e31c47e5963d1f4c5111ee6a0abcf741c882d35
-
Filesize
72KB
MD5a48c6d19f39dc8dc466cff8a4a51be9c
SHA1f600a145315781a390ab6db290d0354f148260ec
SHA2567b73281b4b15aa66f407d7bf8152c352e0fc58d1dcb5e999a3ea8e2673ccab09
SHA5127277a2160ee65a1fa3dc513c68110f1d48a01b72966f4ebb5f9a0c4bdb13027215cc97fede386761abf28d8a6e31c47e5963d1f4c5111ee6a0abcf741c882d35
-
Filesize
72KB
MD51b3f051e3b59b47265d7aeaa62d7019f
SHA15839a2b36a064649cc46ffd5b29db733b596c95a
SHA256b2cf734133d10904e3e945b5697fa7f5f25abd7af8180dc1f24e4f1249ba5009
SHA512449c6fc1c743b85bf55de56ec4262dc4726f5e371c04b178f151805e659294f3e769892a62f831f6286f4c699c5b14599ef7e7924b39da91b62d97d741069b4f
-
Filesize
72KB
MD51738a6b30f66f6ffe908b43a5a8b4995
SHA1b739a19f2532e60c308be25502f941e03cdb2791
SHA25657dbf2cfeba82c18652b7bdfc0abf03718eb4bcf0452ce0c27e69e93839399a2
SHA512f555299ea5c9b865be931d5ebb91fbd6b7fc8fa0ce53da5a72ca9ebd9f6601bbf82662f7f5ae9a727808bfa2c4c48e8b6e4a2318c5f3ee59da72e85a0ee273f0
-
Filesize
72KB
MD51738a6b30f66f6ffe908b43a5a8b4995
SHA1b739a19f2532e60c308be25502f941e03cdb2791
SHA25657dbf2cfeba82c18652b7bdfc0abf03718eb4bcf0452ce0c27e69e93839399a2
SHA512f555299ea5c9b865be931d5ebb91fbd6b7fc8fa0ce53da5a72ca9ebd9f6601bbf82662f7f5ae9a727808bfa2c4c48e8b6e4a2318c5f3ee59da72e85a0ee273f0
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD58928d7737d0785dfa06500b4c10fc817
SHA17bc8f3c59d1e2739bb9bf184814a12226415df0f
SHA2562caeeb85821f05a94fc131798e5d30b06bfb924aacdee8a4c5676bf6426ce1be
SHA512f6dc933ad534656fa898226f3bb454374bd9db2ddfda421621da75c73d16d192c07dee23b6ac74d362699791e410cee2139a018e9893cd83710714f5d8b8e36b
-
Filesize
72KB
MD58928d7737d0785dfa06500b4c10fc817
SHA17bc8f3c59d1e2739bb9bf184814a12226415df0f
SHA2562caeeb85821f05a94fc131798e5d30b06bfb924aacdee8a4c5676bf6426ce1be
SHA512f6dc933ad534656fa898226f3bb454374bd9db2ddfda421621da75c73d16d192c07dee23b6ac74d362699791e410cee2139a018e9893cd83710714f5d8b8e36b
-
Filesize
72KB
MD5fec2800936492ce9735acf119c57b348
SHA14ac14daec3434d695e13f5ff8ca683b5d3b5b9a9
SHA256ec40e5ff033fbf4b259b618ca15c2b49193d788f0d709b9ec6101a3dd9436925
SHA51237a665ac069bc196503fb8d391c4ddf997f9a297044a6a695a9a1d0b52ca71e3aa02544b30fce83a220c339f8c5581655def1dac101628fc34a18bfe64cd28ec
-
Filesize
72KB
MD5fec2800936492ce9735acf119c57b348
SHA14ac14daec3434d695e13f5ff8ca683b5d3b5b9a9
SHA256ec40e5ff033fbf4b259b618ca15c2b49193d788f0d709b9ec6101a3dd9436925
SHA51237a665ac069bc196503fb8d391c4ddf997f9a297044a6a695a9a1d0b52ca71e3aa02544b30fce83a220c339f8c5581655def1dac101628fc34a18bfe64cd28ec
-
Filesize
72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
Filesize
72KB
MD59a700ac627c1ea79e060bf84293cbbb8
SHA1eaac266c178ef7b735f36c1fd56fe43c4d4ffacc
SHA256669ee5f16547b00a62c8895dc6361b4b3c3df571abc4038f056e4ff7bfadbdcc
SHA512e47df5914d5d1299416663a6a6477d003c782bf28bacc35966febf13416ec03c82e9a2e5aa5f375aa488d45e377f39949351aa8a669d44e6e0bcacd1e98c553e
-
Filesize
72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
Filesize
72KB
MD59a700ac627c1ea79e060bf84293cbbb8
SHA1eaac266c178ef7b735f36c1fd56fe43c4d4ffacc
SHA256669ee5f16547b00a62c8895dc6361b4b3c3df571abc4038f056e4ff7bfadbdcc
SHA512e47df5914d5d1299416663a6a6477d003c782bf28bacc35966febf13416ec03c82e9a2e5aa5f375aa488d45e377f39949351aa8a669d44e6e0bcacd1e98c553e
-
Filesize
72KB
MD5e0fc924e8a1bc8c849f14938a5a1e13a
SHA1f02223754b00e5a59ac33f3d7d68668cb60afd9a
SHA2561e137fdef57128141726efd3cf9eb6f491155e8ade7e2e645df149886db15130
SHA5128066ada35779caa33f7277b2717ac4d8093eaa4f87b2efd9cd8004b4c3482daca41aee6ab123fe7e97a840e4c6907934d8b44c9d16265ce4f3d12e600cf6d4dd
-
Filesize
72KB
MD5e0fc924e8a1bc8c849f14938a5a1e13a
SHA1f02223754b00e5a59ac33f3d7d68668cb60afd9a
SHA2561e137fdef57128141726efd3cf9eb6f491155e8ade7e2e645df149886db15130
SHA5128066ada35779caa33f7277b2717ac4d8093eaa4f87b2efd9cd8004b4c3482daca41aee6ab123fe7e97a840e4c6907934d8b44c9d16265ce4f3d12e600cf6d4dd
-
Filesize
72KB
MD5b41b0dd0d5a4dabfc022d26dd71da768
SHA1cd2029a4542da9c1af6ff76e73b13e58d34a4575
SHA25668e184f5378e11b45b343bb4e13545244acb676ebfe71caa1054b8977d869d29
SHA5129c0cf47addf837fa7d8effd865b17840ea6274f4b7a8db5b406f0ef55e24da64049d0f1b8d6d0747c7f6988c3680df871deccb674839f47dcc44e38cefe5dad9
-
Filesize
72KB
MD5b41b0dd0d5a4dabfc022d26dd71da768
SHA1cd2029a4542da9c1af6ff76e73b13e58d34a4575
SHA25668e184f5378e11b45b343bb4e13545244acb676ebfe71caa1054b8977d869d29
SHA5129c0cf47addf837fa7d8effd865b17840ea6274f4b7a8db5b406f0ef55e24da64049d0f1b8d6d0747c7f6988c3680df871deccb674839f47dcc44e38cefe5dad9
-
Filesize
72KB
MD57bdeca94f7b106fa8327f2bad50f4375
SHA18b76a3bd536accbd700f6a590da01f2ab604c0af
SHA256f45e342b41d7b3975ae8b2cebb4043503810b3aa9a3ab241061747c2960a6628
SHA512e17bb0f58f7c31490c81be3a3ed55c5d82678f0440ef87fa400eda679227e23daf344c7d005612ea954246791d175a490be29da76ff61ccbc2888a93153d7b2e
-
Filesize
72KB
MD57bdeca94f7b106fa8327f2bad50f4375
SHA18b76a3bd536accbd700f6a590da01f2ab604c0af
SHA256f45e342b41d7b3975ae8b2cebb4043503810b3aa9a3ab241061747c2960a6628
SHA512e17bb0f58f7c31490c81be3a3ed55c5d82678f0440ef87fa400eda679227e23daf344c7d005612ea954246791d175a490be29da76ff61ccbc2888a93153d7b2e
-
Filesize
72KB
MD5a48c6d19f39dc8dc466cff8a4a51be9c
SHA1f600a145315781a390ab6db290d0354f148260ec
SHA2567b73281b4b15aa66f407d7bf8152c352e0fc58d1dcb5e999a3ea8e2673ccab09
SHA5127277a2160ee65a1fa3dc513c68110f1d48a01b72966f4ebb5f9a0c4bdb13027215cc97fede386761abf28d8a6e31c47e5963d1f4c5111ee6a0abcf741c882d35
-
Filesize
72KB
MD5a48c6d19f39dc8dc466cff8a4a51be9c
SHA1f600a145315781a390ab6db290d0354f148260ec
SHA2567b73281b4b15aa66f407d7bf8152c352e0fc58d1dcb5e999a3ea8e2673ccab09
SHA5127277a2160ee65a1fa3dc513c68110f1d48a01b72966f4ebb5f9a0c4bdb13027215cc97fede386761abf28d8a6e31c47e5963d1f4c5111ee6a0abcf741c882d35
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD51738a6b30f66f6ffe908b43a5a8b4995
SHA1b739a19f2532e60c308be25502f941e03cdb2791
SHA25657dbf2cfeba82c18652b7bdfc0abf03718eb4bcf0452ce0c27e69e93839399a2
SHA512f555299ea5c9b865be931d5ebb91fbd6b7fc8fa0ce53da5a72ca9ebd9f6601bbf82662f7f5ae9a727808bfa2c4c48e8b6e4a2318c5f3ee59da72e85a0ee273f0
-
Filesize
72KB
MD51738a6b30f66f6ffe908b43a5a8b4995
SHA1b739a19f2532e60c308be25502f941e03cdb2791
SHA25657dbf2cfeba82c18652b7bdfc0abf03718eb4bcf0452ce0c27e69e93839399a2
SHA512f555299ea5c9b865be931d5ebb91fbd6b7fc8fa0ce53da5a72ca9ebd9f6601bbf82662f7f5ae9a727808bfa2c4c48e8b6e4a2318c5f3ee59da72e85a0ee273f0
-
Filesize
72KB
MD5a48c6d19f39dc8dc466cff8a4a51be9c
SHA1f600a145315781a390ab6db290d0354f148260ec
SHA2567b73281b4b15aa66f407d7bf8152c352e0fc58d1dcb5e999a3ea8e2673ccab09
SHA5127277a2160ee65a1fa3dc513c68110f1d48a01b72966f4ebb5f9a0c4bdb13027215cc97fede386761abf28d8a6e31c47e5963d1f4c5111ee6a0abcf741c882d35
-
Filesize
72KB
MD5a48c6d19f39dc8dc466cff8a4a51be9c
SHA1f600a145315781a390ab6db290d0354f148260ec
SHA2567b73281b4b15aa66f407d7bf8152c352e0fc58d1dcb5e999a3ea8e2673ccab09
SHA5127277a2160ee65a1fa3dc513c68110f1d48a01b72966f4ebb5f9a0c4bdb13027215cc97fede386761abf28d8a6e31c47e5963d1f4c5111ee6a0abcf741c882d35
-
Filesize
72KB
MD51b3f051e3b59b47265d7aeaa62d7019f
SHA15839a2b36a064649cc46ffd5b29db733b596c95a
SHA256b2cf734133d10904e3e945b5697fa7f5f25abd7af8180dc1f24e4f1249ba5009
SHA512449c6fc1c743b85bf55de56ec4262dc4726f5e371c04b178f151805e659294f3e769892a62f831f6286f4c699c5b14599ef7e7924b39da91b62d97d741069b4f
-
Filesize
72KB
MD51b3f051e3b59b47265d7aeaa62d7019f
SHA15839a2b36a064649cc46ffd5b29db733b596c95a
SHA256b2cf734133d10904e3e945b5697fa7f5f25abd7af8180dc1f24e4f1249ba5009
SHA512449c6fc1c743b85bf55de56ec4262dc4726f5e371c04b178f151805e659294f3e769892a62f831f6286f4c699c5b14599ef7e7924b39da91b62d97d741069b4f
-
Filesize
72KB
MD51738a6b30f66f6ffe908b43a5a8b4995
SHA1b739a19f2532e60c308be25502f941e03cdb2791
SHA25657dbf2cfeba82c18652b7bdfc0abf03718eb4bcf0452ce0c27e69e93839399a2
SHA512f555299ea5c9b865be931d5ebb91fbd6b7fc8fa0ce53da5a72ca9ebd9f6601bbf82662f7f5ae9a727808bfa2c4c48e8b6e4a2318c5f3ee59da72e85a0ee273f0
-
Filesize
72KB
MD51738a6b30f66f6ffe908b43a5a8b4995
SHA1b739a19f2532e60c308be25502f941e03cdb2791
SHA25657dbf2cfeba82c18652b7bdfc0abf03718eb4bcf0452ce0c27e69e93839399a2
SHA512f555299ea5c9b865be931d5ebb91fbd6b7fc8fa0ce53da5a72ca9ebd9f6601bbf82662f7f5ae9a727808bfa2c4c48e8b6e4a2318c5f3ee59da72e85a0ee273f0
-
Filesize
72KB
MD51b3f051e3b59b47265d7aeaa62d7019f
SHA15839a2b36a064649cc46ffd5b29db733b596c95a
SHA256b2cf734133d10904e3e945b5697fa7f5f25abd7af8180dc1f24e4f1249ba5009
SHA512449c6fc1c743b85bf55de56ec4262dc4726f5e371c04b178f151805e659294f3e769892a62f831f6286f4c699c5b14599ef7e7924b39da91b62d97d741069b4f
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD556dd5d53da70904efa92064ece5bf91d
SHA12e1ef4c4f7d49440ca6403684987caff04132ab4
SHA256eec19649dd14c556192decbaa9f31969eb754740cfad3b6119b0387ca719930c
SHA5124d35adbfddf2e85589a797c0372837ba5ce173c1880f8b17eab6cf58b3e76525c877ae5e194293cd4bc7aa8a913cbd4592f3c9d27bc87185c4dd32f66829fa1d
-
Filesize
72KB
MD58928d7737d0785dfa06500b4c10fc817
SHA17bc8f3c59d1e2739bb9bf184814a12226415df0f
SHA2562caeeb85821f05a94fc131798e5d30b06bfb924aacdee8a4c5676bf6426ce1be
SHA512f6dc933ad534656fa898226f3bb454374bd9db2ddfda421621da75c73d16d192c07dee23b6ac74d362699791e410cee2139a018e9893cd83710714f5d8b8e36b
-
Filesize
72KB
MD58928d7737d0785dfa06500b4c10fc817
SHA17bc8f3c59d1e2739bb9bf184814a12226415df0f
SHA2562caeeb85821f05a94fc131798e5d30b06bfb924aacdee8a4c5676bf6426ce1be
SHA512f6dc933ad534656fa898226f3bb454374bd9db2ddfda421621da75c73d16d192c07dee23b6ac74d362699791e410cee2139a018e9893cd83710714f5d8b8e36b
-
Filesize
72KB
MD5fec2800936492ce9735acf119c57b348
SHA14ac14daec3434d695e13f5ff8ca683b5d3b5b9a9
SHA256ec40e5ff033fbf4b259b618ca15c2b49193d788f0d709b9ec6101a3dd9436925
SHA51237a665ac069bc196503fb8d391c4ddf997f9a297044a6a695a9a1d0b52ca71e3aa02544b30fce83a220c339f8c5581655def1dac101628fc34a18bfe64cd28ec
-
Filesize
72KB
MD5fec2800936492ce9735acf119c57b348
SHA14ac14daec3434d695e13f5ff8ca683b5d3b5b9a9
SHA256ec40e5ff033fbf4b259b618ca15c2b49193d788f0d709b9ec6101a3dd9436925
SHA51237a665ac069bc196503fb8d391c4ddf997f9a297044a6a695a9a1d0b52ca71e3aa02544b30fce83a220c339f8c5581655def1dac101628fc34a18bfe64cd28ec
-
Filesize
72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
Filesize
72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
Filesize
72KB
MD59a700ac627c1ea79e060bf84293cbbb8
SHA1eaac266c178ef7b735f36c1fd56fe43c4d4ffacc
SHA256669ee5f16547b00a62c8895dc6361b4b3c3df571abc4038f056e4ff7bfadbdcc
SHA512e47df5914d5d1299416663a6a6477d003c782bf28bacc35966febf13416ec03c82e9a2e5aa5f375aa488d45e377f39949351aa8a669d44e6e0bcacd1e98c553e
-
Filesize
72KB
MD59a700ac627c1ea79e060bf84293cbbb8
SHA1eaac266c178ef7b735f36c1fd56fe43c4d4ffacc
SHA256669ee5f16547b00a62c8895dc6361b4b3c3df571abc4038f056e4ff7bfadbdcc
SHA512e47df5914d5d1299416663a6a6477d003c782bf28bacc35966febf13416ec03c82e9a2e5aa5f375aa488d45e377f39949351aa8a669d44e6e0bcacd1e98c553e
-
Filesize
72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
Filesize
72KB
MD5e5adc28c183843a5303b3525f3276897
SHA14e80ddfe25bba1a7610862d5f45a950582aeb26e
SHA2563206e9141acee6faa8d8e765c9d57804e98f1b2c9ffa917c53b8c92564adba1a
SHA51256e4892dd5ed8a9506b17e0c86f6b7560e50ce3cc6c52db37e3e770f56fd686f1a810f6c5a047d4870c77edf44f2375e480afb23c2074b8e770c95779db48ce5
-
Filesize
72KB
MD59a700ac627c1ea79e060bf84293cbbb8
SHA1eaac266c178ef7b735f36c1fd56fe43c4d4ffacc
SHA256669ee5f16547b00a62c8895dc6361b4b3c3df571abc4038f056e4ff7bfadbdcc
SHA512e47df5914d5d1299416663a6a6477d003c782bf28bacc35966febf13416ec03c82e9a2e5aa5f375aa488d45e377f39949351aa8a669d44e6e0bcacd1e98c553e
-
Filesize
72KB
MD59a700ac627c1ea79e060bf84293cbbb8
SHA1eaac266c178ef7b735f36c1fd56fe43c4d4ffacc
SHA256669ee5f16547b00a62c8895dc6361b4b3c3df571abc4038f056e4ff7bfadbdcc
SHA512e47df5914d5d1299416663a6a6477d003c782bf28bacc35966febf13416ec03c82e9a2e5aa5f375aa488d45e377f39949351aa8a669d44e6e0bcacd1e98c553e