Analysis
-
max time kernel
188s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe
Resource
win10v2004-20220812-en
General
-
Target
f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe
-
Size
72KB
-
MD5
072fb2176422aab1bf2862a95c86da3f
-
SHA1
8b3af98b99ae8b77187bf7032d8c0f8d9a191d83
-
SHA256
f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c
-
SHA512
061428f57bc36b6b8ad689635ea6966873dcba12d5e9a5741590b1f6d2cf1260a6b2d27a41ca305179ee217689da360720ab1ad46d4150a2d8bb27bec076a1ce
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2r:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1144 backup.exe 1324 backup.exe 1540 backup.exe 708 backup.exe 876 data.exe 1012 backup.exe 1028 backup.exe 1728 backup.exe 1600 backup.exe 1440 backup.exe 1532 backup.exe 1868 update.exe 1000 System Restore.exe 1688 backup.exe 1964 backup.exe 584 backup.exe 912 backup.exe 1232 backup.exe 1148 backup.exe 2000 backup.exe 780 backup.exe 696 backup.exe 636 backup.exe 876 backup.exe 1608 backup.exe 1172 backup.exe 1068 backup.exe 112 backup.exe 1528 data.exe 1084 backup.exe 1700 backup.exe 1044 backup.exe 1336 backup.exe 1632 backup.exe 1300 backup.exe 840 backup.exe 816 data.exe 592 backup.exe 1868 backup.exe 1660 backup.exe 520 backup.exe 1820 backup.exe 1400 backup.exe 1980 backup.exe 2024 backup.exe 1256 backup.exe 612 backup.exe 1252 backup.exe 1264 System Restore.exe 268 backup.exe 812 backup.exe 1076 backup.exe 876 backup.exe 1432 backup.exe 1724 backup.exe 1068 backup.exe 1460 backup.exe 1728 backup.exe 1884 backup.exe 1072 backup.exe 1448 backup.exe 1272 backup.exe 896 backup.exe 580 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 1028 backup.exe 1028 backup.exe 1600 backup.exe 1600 backup.exe 1028 backup.exe 1028 backup.exe 1532 backup.exe 1868 update.exe 1868 update.exe 1868 update.exe 1868 update.exe 1868 update.exe 1000 System Restore.exe 1000 System Restore.exe 1000 System Restore.exe 1532 backup.exe 1532 backup.exe 1688 backup.exe 1688 backup.exe 1964 backup.exe 1964 backup.exe 1964 backup.exe 1964 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 912 backup.exe 1528 data.exe 1528 data.exe 1528 data.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\System Restore.exe update.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\System Restore.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\update.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe data.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 1144 backup.exe 1324 backup.exe 1540 backup.exe 708 backup.exe 876 data.exe 1012 backup.exe 1028 backup.exe 1728 backup.exe 1600 backup.exe 1440 backup.exe 1532 backup.exe 1868 update.exe 1000 System Restore.exe 1688 backup.exe 1964 backup.exe 584 backup.exe 912 backup.exe 1232 backup.exe 1148 backup.exe 2000 backup.exe 780 backup.exe 696 backup.exe 636 backup.exe 876 backup.exe 1608 backup.exe 1172 backup.exe 1068 backup.exe 112 backup.exe 1528 data.exe 1084 backup.exe 1700 backup.exe 1044 backup.exe 1336 backup.exe 840 backup.exe 1300 backup.exe 816 data.exe 1632 backup.exe 592 backup.exe 1868 backup.exe 1820 backup.exe 520 backup.exe 1400 backup.exe 1660 backup.exe 1980 backup.exe 1256 backup.exe 1252 backup.exe 612 backup.exe 268 backup.exe 2024 backup.exe 1264 System Restore.exe 812 backup.exe 876 backup.exe 1076 backup.exe 1724 backup.exe 1432 backup.exe 1460 backup.exe 1728 backup.exe 1884 backup.exe 1068 backup.exe 1072 backup.exe 1272 backup.exe 1448 backup.exe 896 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 1144 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 27 PID 848 wrote to memory of 1144 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 27 PID 848 wrote to memory of 1144 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 27 PID 848 wrote to memory of 1144 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 27 PID 848 wrote to memory of 1324 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 28 PID 848 wrote to memory of 1324 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 28 PID 848 wrote to memory of 1324 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 28 PID 848 wrote to memory of 1324 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 28 PID 848 wrote to memory of 1540 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 29 PID 848 wrote to memory of 1540 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 29 PID 848 wrote to memory of 1540 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 29 PID 848 wrote to memory of 1540 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 29 PID 848 wrote to memory of 708 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 30 PID 848 wrote to memory of 708 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 30 PID 848 wrote to memory of 708 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 30 PID 848 wrote to memory of 708 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 30 PID 848 wrote to memory of 876 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 31 PID 848 wrote to memory of 876 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 31 PID 848 wrote to memory of 876 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 31 PID 848 wrote to memory of 876 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 31 PID 848 wrote to memory of 1012 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 32 PID 848 wrote to memory of 1012 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 32 PID 848 wrote to memory of 1012 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 32 PID 848 wrote to memory of 1012 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 32 PID 1144 wrote to memory of 1028 1144 backup.exe 33 PID 1144 wrote to memory of 1028 1144 backup.exe 33 PID 1144 wrote to memory of 1028 1144 backup.exe 33 PID 1144 wrote to memory of 1028 1144 backup.exe 33 PID 848 wrote to memory of 1728 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 34 PID 848 wrote to memory of 1728 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 34 PID 848 wrote to memory of 1728 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 34 PID 848 wrote to memory of 1728 848 f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe 34 PID 1028 wrote to memory of 1600 1028 backup.exe 35 PID 1028 wrote to memory of 1600 1028 backup.exe 35 PID 1028 wrote to memory of 1600 1028 backup.exe 35 PID 1028 wrote to memory of 1600 1028 backup.exe 35 PID 1600 wrote to memory of 1440 1600 backup.exe 36 PID 1600 wrote to memory of 1440 1600 backup.exe 36 PID 1600 wrote to memory of 1440 1600 backup.exe 36 PID 1600 wrote to memory of 1440 1600 backup.exe 36 PID 1028 wrote to memory of 1532 1028 backup.exe 37 PID 1028 wrote to memory of 1532 1028 backup.exe 37 PID 1028 wrote to memory of 1532 1028 backup.exe 37 PID 1028 wrote to memory of 1532 1028 backup.exe 37 PID 1532 wrote to memory of 1868 1532 backup.exe 38 PID 1532 wrote to memory of 1868 1532 backup.exe 38 PID 1532 wrote to memory of 1868 1532 backup.exe 38 PID 1532 wrote to memory of 1868 1532 backup.exe 38 PID 1532 wrote to memory of 1868 1532 backup.exe 38 PID 1532 wrote to memory of 1868 1532 backup.exe 38 PID 1532 wrote to memory of 1868 1532 backup.exe 38 PID 1868 wrote to memory of 1000 1868 update.exe 39 PID 1868 wrote to memory of 1000 1868 update.exe 39 PID 1868 wrote to memory of 1000 1868 update.exe 39 PID 1868 wrote to memory of 1000 1868 update.exe 39 PID 1868 wrote to memory of 1000 1868 update.exe 39 PID 1868 wrote to memory of 1000 1868 update.exe 39 PID 1868 wrote to memory of 1000 1868 update.exe 39 PID 1532 wrote to memory of 1688 1532 backup.exe 40 PID 1532 wrote to memory of 1688 1532 backup.exe 40 PID 1532 wrote to memory of 1688 1532 backup.exe 40 PID 1532 wrote to memory of 1688 1532 backup.exe 40 PID 1688 wrote to memory of 1964 1688 backup.exe 41 PID 1688 wrote to memory of 1964 1688 backup.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe"C:\Users\Admin\AppData\Local\Temp\f2e0b702ecd0f7dda0e68fe18bb607f76bef4734858ccabf4375ee8e2379d97c.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\3607321519\backup.exeC:\Users\Admin\AppData\Local\Temp\3607321519\backup.exe C:\Users\Admin\AppData\Local\Temp\3607321519\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1144 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1028 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1600 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files\7-Zip\update.exe"C:\Program Files\7-Zip\update.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1868 -
C:\Program Files\7-Zip\Lang\System Restore.exe"C:\Program Files\7-Zip\Lang\System Restore.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1000
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1688 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1964 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:912 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1232
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1148
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:696
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:112
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1264
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1432
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1448
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1568
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1300
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1256
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:628
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- System policy modification
PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1784
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1304
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵PID:1896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵PID:1872
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵PID:1012
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:840 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1252
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1072
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1684
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2000
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Drops file in Program Files directory
PID:1872 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\update.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\update.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1224
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1808
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1712
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\data.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\data.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:564
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1672
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1296
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2032
-
-
C:\Program Files\Common Files\System\es-ES\update.exe"C:\Program Files\Common Files\System\es-ES\update.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:2004
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:956
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1820
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1272
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1920
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2040
-
-
C:\Program Files\DVD Maker\Shared\System Restore.exe"C:\Program Files\DVD Maker\Shared\System Restore.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1592
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1336 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1148 -
C:\Program Files\Google\Chrome\Application\update.exe"C:\Program Files\Google\Chrome\Application\update.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1980 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵PID:1972
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1388
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1284
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1232
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:268
-
-
-
C:\Program Files (x86)\data.exe"C:\Program Files (x86)\data.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:520 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:612 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1076
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1300
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:1324
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- System policy modification
PID:1312
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1044 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵PID:2000
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:560
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1308
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
PID:936 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:1440
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1436
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Drops file in Program Files directory
PID:1708 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1300
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1244
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1088
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- System policy modification
PID:1648 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1868 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2028
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1928
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:676
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1252
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:840
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
PID:836 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:1636
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Drops file in Windows directory
- System policy modification
PID:1004 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:2016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:708
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD52ac8b67ed8b07bb715d77632ab4c506f
SHA16b184284e3043887ded0bfbf4c92b7ec449512da
SHA2569a2aabb20beff71eb9ec289f915676e7c2d660f5d6f50321879bd6532811a607
SHA51290f1b1fdbea7c3b4a1eec52a5d315cb1dfd20e353912141398bb7802cb883eed4330d703c70f95e245fb6c523c85963f7d8098449a1a65d57c69579f76616997
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5e21f7fc5ce94b8362956654e3e931357
SHA1f748bd4c1b8b23c2a638903d8109a03b3c91df9a
SHA2564fddb49f452e7b66d9e397dfa78068a707ee5f5b566c3bb9d213c8022c64825d
SHA512c2b1ffafa439c2761ec5729ccd644b8237b3c374719b3849eb1ee1edccdf6f28fa7dd9b561614a92b9a9b2558c350c9e836843dd2210f911a36aa10d4778ef97
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5f5bfaec0f320df8d912d0af2272734f5
SHA18c58ce6ca4953257a62d2b5e084995e74a787384
SHA256074267f27359663d5475eb1b561d9b6708f1e8b58acdd333c881b92cc448a875
SHA512cb0240d301c15e296f3d13b14d392a2f6e3cf1a7668b01ec0e346359e39c76f68f30222e6497551a3dd244b28cc31afdfe64a1cf6e1fea76e7bcab0fd96fe8ff
-
Filesize
72KB
MD5f5bfaec0f320df8d912d0af2272734f5
SHA18c58ce6ca4953257a62d2b5e084995e74a787384
SHA256074267f27359663d5475eb1b561d9b6708f1e8b58acdd333c881b92cc448a875
SHA512cb0240d301c15e296f3d13b14d392a2f6e3cf1a7668b01ec0e346359e39c76f68f30222e6497551a3dd244b28cc31afdfe64a1cf6e1fea76e7bcab0fd96fe8ff
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5d002af5be9d3b278339d346e095f308c
SHA119fe142366aa2cc9308896a59a457648cc4d4313
SHA256391b3098682691bde9cd9f7d7b1a29faf2a543e8c76ae672af51272358bf5242
SHA512340108b60ab0f5c135402e15a46cf50989f3310dd10f55db696caad4d41789f473868952168d33c3a8a76487c2bd9a811af2dc40698136e5febebf2df2e231f5
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD504bd3d3f4bfeccf4d52e94319890066f
SHA1ae220e390192f230ef805f33839730d5b5b49363
SHA2566864d215b9f7e3d211a984befc038adfd2819ff4690d825744d580db33b951d6
SHA512732fc60cd3a08d47c3aea02134274e8f7091fa2fd203010ada666f44311ce5130bad5def43c5c754fc6df9b8ca60c98dd3576631b0ecfebfeab468319e70e1f8
-
Filesize
72KB
MD504bd3d3f4bfeccf4d52e94319890066f
SHA1ae220e390192f230ef805f33839730d5b5b49363
SHA2566864d215b9f7e3d211a984befc038adfd2819ff4690d825744d580db33b951d6
SHA512732fc60cd3a08d47c3aea02134274e8f7091fa2fd203010ada666f44311ce5130bad5def43c5c754fc6df9b8ca60c98dd3576631b0ecfebfeab468319e70e1f8
-
Filesize
72KB
MD52ac8b67ed8b07bb715d77632ab4c506f
SHA16b184284e3043887ded0bfbf4c92b7ec449512da
SHA2569a2aabb20beff71eb9ec289f915676e7c2d660f5d6f50321879bd6532811a607
SHA51290f1b1fdbea7c3b4a1eec52a5d315cb1dfd20e353912141398bb7802cb883eed4330d703c70f95e245fb6c523c85963f7d8098449a1a65d57c69579f76616997
-
Filesize
72KB
MD52ac8b67ed8b07bb715d77632ab4c506f
SHA16b184284e3043887ded0bfbf4c92b7ec449512da
SHA2569a2aabb20beff71eb9ec289f915676e7c2d660f5d6f50321879bd6532811a607
SHA51290f1b1fdbea7c3b4a1eec52a5d315cb1dfd20e353912141398bb7802cb883eed4330d703c70f95e245fb6c523c85963f7d8098449a1a65d57c69579f76616997
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5e21f7fc5ce94b8362956654e3e931357
SHA1f748bd4c1b8b23c2a638903d8109a03b3c91df9a
SHA2564fddb49f452e7b66d9e397dfa78068a707ee5f5b566c3bb9d213c8022c64825d
SHA512c2b1ffafa439c2761ec5729ccd644b8237b3c374719b3849eb1ee1edccdf6f28fa7dd9b561614a92b9a9b2558c350c9e836843dd2210f911a36aa10d4778ef97
-
Filesize
72KB
MD5e21f7fc5ce94b8362956654e3e931357
SHA1f748bd4c1b8b23c2a638903d8109a03b3c91df9a
SHA2564fddb49f452e7b66d9e397dfa78068a707ee5f5b566c3bb9d213c8022c64825d
SHA512c2b1ffafa439c2761ec5729ccd644b8237b3c374719b3849eb1ee1edccdf6f28fa7dd9b561614a92b9a9b2558c350c9e836843dd2210f911a36aa10d4778ef97
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5ea057f57a47e245010ddafd10cf5b6c1
SHA1b45111119c2f6d1e062d4e3cec494bc297afad0b
SHA2561c3f8b468408bc4a2c59de5c35e1ca095594f2d47be942e2309433c0947e3a68
SHA512166527f77417dc2665f548c98815413a02dc6179b975a82983986423ec40b1072bfff6454025ffd1d8a54625a9c8cdd94a1c9d0710f19edb4581408e7c3d8dea
-
Filesize
72KB
MD5937db32992795c54ded4e199a36f6310
SHA15cc02948646b385242602f7977d9b5c58520be1d
SHA25651ce92a3af7be3151acca79fe975ca22c8b754aaf8ae4f5caeeed63b3a999b7b
SHA512446dc5c4edac725c007d9590ad3f6199337f10bf9c1a5be0da83264cfa2e878fbf7bf662998ff611987657b2c4cf0abb8391f679198c57f93546b05b700aa228
-
Filesize
72KB
MD5f5bfaec0f320df8d912d0af2272734f5
SHA18c58ce6ca4953257a62d2b5e084995e74a787384
SHA256074267f27359663d5475eb1b561d9b6708f1e8b58acdd333c881b92cc448a875
SHA512cb0240d301c15e296f3d13b14d392a2f6e3cf1a7668b01ec0e346359e39c76f68f30222e6497551a3dd244b28cc31afdfe64a1cf6e1fea76e7bcab0fd96fe8ff
-
Filesize
72KB
MD5f5bfaec0f320df8d912d0af2272734f5
SHA18c58ce6ca4953257a62d2b5e084995e74a787384
SHA256074267f27359663d5475eb1b561d9b6708f1e8b58acdd333c881b92cc448a875
SHA512cb0240d301c15e296f3d13b14d392a2f6e3cf1a7668b01ec0e346359e39c76f68f30222e6497551a3dd244b28cc31afdfe64a1cf6e1fea76e7bcab0fd96fe8ff
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ca11263dd02853bf2c096d8a0e2f3db7
SHA17988efbcae6ba7661b4a24ce7eda7f18d991af21
SHA2569178f4f5b6bdd4e2cbd82f5a39e60b3a40dc87f5491eb28bb3495641775f3662
SHA51281d2a1d944336d16fb6850b21a527d8c4d8d230a08508c199548f510e6ba5f65d7eda76c14aed34fb3165eaa63f07199eb6f81cca09eaf882771bc0ff3df7008
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5ccb386213d5e5837790bee4d5c6835bb
SHA1279bedb7bc0a1e7a375ac5550d36b29895a44398
SHA2560e565ca41cafa87b2e4e9c056f8703a890f9f3ce027e130e7678b30a4757d9b6
SHA51253b8e4be2451c9a37f576703782c0741af2bafaabaedbfb9ef1e13a7a090a9a6565a326671702aa69e436d54ca282c69e56a8f0e5f37e0c4ecdc680f823213c6
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5d002af5be9d3b278339d346e095f308c
SHA119fe142366aa2cc9308896a59a457648cc4d4313
SHA256391b3098682691bde9cd9f7d7b1a29faf2a543e8c76ae672af51272358bf5242
SHA512340108b60ab0f5c135402e15a46cf50989f3310dd10f55db696caad4d41789f473868952168d33c3a8a76487c2bd9a811af2dc40698136e5febebf2df2e231f5
-
Filesize
72KB
MD5d002af5be9d3b278339d346e095f308c
SHA119fe142366aa2cc9308896a59a457648cc4d4313
SHA256391b3098682691bde9cd9f7d7b1a29faf2a543e8c76ae672af51272358bf5242
SHA512340108b60ab0f5c135402e15a46cf50989f3310dd10f55db696caad4d41789f473868952168d33c3a8a76487c2bd9a811af2dc40698136e5febebf2df2e231f5
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf
-
Filesize
72KB
MD5e5141eaf528cc91c9c9fe1a859ae8f86
SHA1e153fd6b376cbc610496d2b6f1b000dd4de7ad76
SHA2569a9f6b725f4283fba82fa95e33c8a90c2e769717d64897062df9a7e1f9ce6928
SHA51251c4ffb20909214f6e4de2f3ce89289697c4b1aff9b4004bc1b990464a71122d21e39ecdfd26daa4c3a002d22aa50ba0a5254846b49ebf4426890108477f1ddf