Analysis
-
max time kernel
78s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe
Resource
win10v2004-20220812-en
General
-
Target
a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe
-
Size
72KB
-
MD5
072b48eb2b8b99c932387be298ac5d80
-
SHA1
d3c06da77d89892f543c995c17cd4660760b12f9
-
SHA256
a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef
-
SHA512
bc3495234bc4b4f2ab484957a392be722beebe67aafcec059f6715c3f104a60f711bb7351bda2dd91e8cb24b821657f12f4bfd9b5757563c772687b164348a47
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2O:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrC
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 59 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1588 backup.exe 592 backup.exe 1772 backup.exe 952 backup.exe 1860 data.exe 1268 backup.exe 1152 backup.exe 1868 update.exe 2036 backup.exe 808 backup.exe 984 backup.exe 364 backup.exe 1560 backup.exe 1184 backup.exe 956 backup.exe 988 backup.exe 1496 update.exe 1568 backup.exe 1444 backup.exe 1780 backup.exe 592 backup.exe 1572 backup.exe 932 System Restore.exe 1312 backup.exe 1880 backup.exe 2024 backup.exe 960 backup.exe 1872 backup.exe 2012 backup.exe 816 backup.exe 1736 backup.exe 552 backup.exe 980 backup.exe 1692 backup.exe 1848 backup.exe 1764 update.exe 1052 update.exe 1828 System Restore.exe 1116 update.exe 1260 backup.exe 1644 backup.exe 1244 backup.exe 744 backup.exe 1760 backup.exe 2000 backup.exe 592 backup.exe 1572 backup.exe 932 backup.exe 884 backup.exe 1864 backup.exe 1332 backup.exe 1616 backup.exe 1484 backup.exe 1872 backup.exe 1164 backup.exe 628 backup.exe 1036 backup.exe 1660 backup.exe 552 backup.exe 980 backup.exe 1756 backup.exe 1956 backup.exe 1944 backup.exe 1828 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1860 data.exe 1860 data.exe 1152 backup.exe 1152 backup.exe 1860 data.exe 1860 data.exe 808 backup.exe 808 backup.exe 984 backup.exe 984 backup.exe 808 backup.exe 808 backup.exe 1868 update.exe 1868 update.exe 1868 update.exe 1560 backup.exe 1560 backup.exe 1184 backup.exe 1184 backup.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1184 backup.exe 1496 update.exe 1496 update.exe 1496 update.exe 1496 update.exe 1496 update.exe 1568 backup.exe 1568 backup.exe 1568 backup.exe 1496 update.exe 1496 update.exe 1444 backup.exe 1444 backup.exe 1444 backup.exe 1496 update.exe 1496 update.exe 1780 backup.exe 1780 backup.exe 1780 backup.exe 1496 update.exe 1496 update.exe 592 backup.exe 592 backup.exe 592 backup.exe 1496 update.exe 1496 update.exe 1572 backup.exe 1572 backup.exe 1572 backup.exe 1496 update.exe 1496 update.exe 932 System Restore.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\update.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe update.exe File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\update.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\update.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\update.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe update.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\update.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\data.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe update.exe File opened for modification C:\Program Files\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe update.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe update.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 1588 backup.exe 592 backup.exe 1772 backup.exe 952 backup.exe 1860 data.exe 1268 backup.exe 1152 backup.exe 2036 backup.exe 808 backup.exe 984 backup.exe 364 backup.exe 1560 backup.exe 1868 update.exe 1184 backup.exe 956 backup.exe 988 backup.exe 1496 update.exe 1568 backup.exe 1444 backup.exe 1780 backup.exe 592 backup.exe 1572 backup.exe 932 System Restore.exe 1312 backup.exe 1880 backup.exe 2024 backup.exe 960 backup.exe 1872 backup.exe 2012 backup.exe 816 backup.exe 1736 backup.exe 552 backup.exe 980 backup.exe 1692 backup.exe 1764 update.exe 1052 update.exe 1828 System Restore.exe 1116 update.exe 1260 backup.exe 1644 backup.exe 1244 backup.exe 744 backup.exe 1760 backup.exe 2000 backup.exe 592 backup.exe 1572 backup.exe 932 backup.exe 884 backup.exe 1864 backup.exe 1332 backup.exe 1616 backup.exe 1484 backup.exe 1872 backup.exe 1164 backup.exe 1036 backup.exe 1660 backup.exe 552 backup.exe 980 backup.exe 1756 backup.exe 1956 backup.exe 1944 backup.exe 1288 backup.exe 1260 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1588 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 26 PID 1472 wrote to memory of 1588 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 26 PID 1472 wrote to memory of 1588 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 26 PID 1472 wrote to memory of 1588 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 26 PID 1472 wrote to memory of 592 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 27 PID 1472 wrote to memory of 592 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 27 PID 1472 wrote to memory of 592 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 27 PID 1472 wrote to memory of 592 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 27 PID 1472 wrote to memory of 1772 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 28 PID 1472 wrote to memory of 1772 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 28 PID 1472 wrote to memory of 1772 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 28 PID 1472 wrote to memory of 1772 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 28 PID 1472 wrote to memory of 952 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 29 PID 1472 wrote to memory of 952 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 29 PID 1472 wrote to memory of 952 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 29 PID 1472 wrote to memory of 952 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 29 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1472 wrote to memory of 1268 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 31 PID 1472 wrote to memory of 1268 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 31 PID 1472 wrote to memory of 1268 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 31 PID 1472 wrote to memory of 1268 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 31 PID 1860 wrote to memory of 1152 1860 data.exe 33 PID 1860 wrote to memory of 1152 1860 data.exe 33 PID 1860 wrote to memory of 1152 1860 data.exe 33 PID 1860 wrote to memory of 1152 1860 data.exe 33 PID 1152 wrote to memory of 2036 1152 backup.exe 34 PID 1152 wrote to memory of 2036 1152 backup.exe 34 PID 1152 wrote to memory of 2036 1152 backup.exe 34 PID 1152 wrote to memory of 2036 1152 backup.exe 34 PID 1472 wrote to memory of 1868 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 32 PID 1472 wrote to memory of 1868 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 32 PID 1472 wrote to memory of 1868 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 32 PID 1472 wrote to memory of 1868 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 32 PID 1472 wrote to memory of 1868 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 32 PID 1472 wrote to memory of 1868 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 32 PID 1472 wrote to memory of 1868 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 32 PID 1860 wrote to memory of 808 1860 data.exe 35 PID 1860 wrote to memory of 808 1860 data.exe 35 PID 1860 wrote to memory of 808 1860 data.exe 35 PID 1860 wrote to memory of 808 1860 data.exe 35 PID 808 wrote to memory of 984 808 backup.exe 36 PID 808 wrote to memory of 984 808 backup.exe 36 PID 808 wrote to memory of 984 808 backup.exe 36 PID 808 wrote to memory of 984 808 backup.exe 36 PID 984 wrote to memory of 364 984 backup.exe 37 PID 984 wrote to memory of 364 984 backup.exe 37 PID 984 wrote to memory of 364 984 backup.exe 37 PID 984 wrote to memory of 364 984 backup.exe 37 PID 808 wrote to memory of 1560 808 backup.exe 38 PID 808 wrote to memory of 1560 808 backup.exe 38 PID 808 wrote to memory of 1560 808 backup.exe 38 PID 808 wrote to memory of 1560 808 backup.exe 38 PID 1560 wrote to memory of 1184 1560 backup.exe 39 PID 1560 wrote to memory of 1184 1560 backup.exe 39 PID 1560 wrote to memory of 1184 1560 backup.exe 39 PID 1560 wrote to memory of 1184 1560 backup.exe 39 PID 1184 wrote to memory of 956 1184 backup.exe 40 PID 1184 wrote to memory of 956 1184 backup.exe 40 PID 1184 wrote to memory of 956 1184 backup.exe 40 PID 1184 wrote to memory of 956 1184 backup.exe 40 PID 1472 wrote to memory of 988 1472 a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe"C:\Users\Admin\AppData\Local\Temp\a15e93a6576a8d95950ef14000fd241e8ac8d989d78181e4d6a5d9cde36afbef.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\2981751828\backup.exeC:\Users\Admin\AppData\Local\Temp\2981751828\backup.exe C:\Users\Admin\AppData\Local\Temp\2981751828\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1588 -
C:\data.exe\data.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1860 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1152 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:984 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:364
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1560 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1184 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1444
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1880
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1872
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2012 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:552
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:980
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Executes dropped EXE
PID:1848
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Suspicious use of SetWindowsHookEx
PID:1288
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵PID:1748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:652
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:552
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Executes dropped EXE
PID:1828
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1808
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:1192
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵PID:1624
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1332 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:552
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1956
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1652
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:428
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:364
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1268
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:604
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1088
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:748
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:1492
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:592
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:932 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1484
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Program Files\Common Files\System\de-DE\data.exe"C:\Program Files\Common Files\System\de-DE\data.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:940
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1488
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1388
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1592
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:936
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1400
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:1124
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:2064
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:884
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1888
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1152
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1856
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:1444
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:2016
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1408
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1576
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:328
-
-
C:\Program Files\Mozilla Firefox\data.exe"C:\Program Files\Mozilla Firefox\data.exe" C:\Program Files\Mozilla Firefox\5⤵PID:392
-
-
C:\Program Files\MSBuild\update.exe"C:\Program Files\MSBuild\update.exe" C:\Program Files\MSBuild\5⤵PID:1672
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:1056
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1692 -
C:\Program Files (x86)\Adobe\update.exe"C:\Program Files (x86)\Adobe\update.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764 -
C:\Program Files (x86)\Adobe\Reader 9.0\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1052 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1828
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1116 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1260
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1244
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1864 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1872
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Executes dropped EXE
PID:628
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:944
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1536
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1380
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:1636
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1604
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:876
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1132
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:1036
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:2024
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵PID:988
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:560
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1100
-
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1632
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:612
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1460
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1900
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:1696
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:892
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:960
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft Office\System Restore.exe"C:\Program Files (x86)\Microsoft Office\System Restore.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:816
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:684
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\update.exe"C:\Program Files (x86)\Microsoft Synchronization Services\update.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe"C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe" C:\Program Files (x86)\Microsoft Visual Studio 8\5⤵PID:1080
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b4733229f1afe64224d229f5a447907a
SHA1f27f48d066928436cad4eceac6216c3aedf111a7
SHA256248b987e52dd25b77241f4ebc74fe431b3929a73b12a2014505ee4d50c3710a6
SHA51290cfac8e03179d73ab4a84d81f95cd5713d5fc453685dfcb341196a76135b793c546c08d7204d08957ae4b69eb22af7f9f7392ae3d6ea99279247a59094ce405
-
Filesize
72KB
MD5fc9952540ed46940e0f18248fe065e92
SHA13b9fba53f198300da487841b35c61320edd9568a
SHA256607befa75a298d01b8f0ff6273808affd533e4a683d0c4eb5badba66c98fe805
SHA512ef88ab23b8b963b7b9ecaf518c58661aacb6b76f7d212206de1dd4a25a26679f3d508d5de87e57dfd0332c720ebe2e70041259f07ba20802b25f1e0482b3cfb2
-
Filesize
72KB
MD5fc9952540ed46940e0f18248fe065e92
SHA13b9fba53f198300da487841b35c61320edd9568a
SHA256607befa75a298d01b8f0ff6273808affd533e4a683d0c4eb5badba66c98fe805
SHA512ef88ab23b8b963b7b9ecaf518c58661aacb6b76f7d212206de1dd4a25a26679f3d508d5de87e57dfd0332c720ebe2e70041259f07ba20802b25f1e0482b3cfb2
-
Filesize
72KB
MD512a48020e88c9854c685fdf39cf59a59
SHA16edbf2ec6f9fcc187ad886ed1a2e63001230239b
SHA2565c341dec445b25449a2410ea58d7c537b5d87c8924933e7d84c44a3f9c018904
SHA512a1a90498ab504c9ceb0a3304cdf93290731de359ff2d029ee69c38b45c0f90c06e4730e73b1a3483465bb630b1daf54f3d468f0a93019a46e5cc68cbba48769c
-
Filesize
72KB
MD5623b4066bd48623050611bc87a311f84
SHA166c0cc3ae63f949d18acc260ae6f1c6ab6be35af
SHA2569ca541355e3147483bdddd3436adb8bd1ce1e0c96a6b77754bf8ba553194cc9c
SHA512ec8daef5f27e0218b1b3b8fca345f05a56ca39e4f4cbaf3103af775c5191483a05f0ee9abaecd38f56712b3d2f788f82c52c52a2c47a7a10efe63ec2544aea82
-
Filesize
72KB
MD5623b4066bd48623050611bc87a311f84
SHA166c0cc3ae63f949d18acc260ae6f1c6ab6be35af
SHA2569ca541355e3147483bdddd3436adb8bd1ce1e0c96a6b77754bf8ba553194cc9c
SHA512ec8daef5f27e0218b1b3b8fca345f05a56ca39e4f4cbaf3103af775c5191483a05f0ee9abaecd38f56712b3d2f788f82c52c52a2c47a7a10efe63ec2544aea82
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD5e1bda64bb19c92b12bd9305a4e5065c6
SHA17aaaedd73237f2ba41143e327f5f3aea17dcb6ef
SHA25665447321557b3a6e9902e7dbb5a99af82cb19bab2da8345f1c3515ff31d93f88
SHA51283f5d2006b6a68e5f60b47edf48b48a8a40effa1d11b62cca52979eafc0ab7de25d11bfef561e0473c53d28514c71d7db3a05acd7dc6e9ca2768b29654883188
-
Filesize
72KB
MD5e1bda64bb19c92b12bd9305a4e5065c6
SHA17aaaedd73237f2ba41143e327f5f3aea17dcb6ef
SHA25665447321557b3a6e9902e7dbb5a99af82cb19bab2da8345f1c3515ff31d93f88
SHA51283f5d2006b6a68e5f60b47edf48b48a8a40effa1d11b62cca52979eafc0ab7de25d11bfef561e0473c53d28514c71d7db3a05acd7dc6e9ca2768b29654883188
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD5cd132ace0bf758b602dfbe5fa62d54f2
SHA1701f4a0e04e93b3fc80cd89327cf93a42f2345aa
SHA256c17fdcb7c1fab55ad6f52814e1262880e67cccc073d9dba45b2836bbdd5164a0
SHA5125624c2ff49fcdbf9e5ac547c451f41b66451970d1f2859fe565c82d9e03410639b6be7511e29556fe23f2ac9ad24cfb00b8bd802c5ec274f36bda7e2f829dfaf
-
Filesize
72KB
MD5cd132ace0bf758b602dfbe5fa62d54f2
SHA1701f4a0e04e93b3fc80cd89327cf93a42f2345aa
SHA256c17fdcb7c1fab55ad6f52814e1262880e67cccc073d9dba45b2836bbdd5164a0
SHA5125624c2ff49fcdbf9e5ac547c451f41b66451970d1f2859fe565c82d9e03410639b6be7511e29556fe23f2ac9ad24cfb00b8bd802c5ec274f36bda7e2f829dfaf
-
Filesize
72KB
MD51023307b33593a7ebd833d38e5b2b898
SHA1ba8e31756d5be431cea31e627b32ce95e4f2a470
SHA25685d0dd8a682f08d60d02dc5da2f81be95287263556519bcefd65e9f85364c870
SHA512cf4ea131871a8ec2dc4a90800806f0524a71ff9a19611aa7e9bb9e20f22dd66437507dbd27a307126a65dd577f3cc8c3e5ab3aa1425e33b7bcfbdaaeb53f6472
-
Filesize
72KB
MD51023307b33593a7ebd833d38e5b2b898
SHA1ba8e31756d5be431cea31e627b32ce95e4f2a470
SHA25685d0dd8a682f08d60d02dc5da2f81be95287263556519bcefd65e9f85364c870
SHA512cf4ea131871a8ec2dc4a90800806f0524a71ff9a19611aa7e9bb9e20f22dd66437507dbd27a307126a65dd577f3cc8c3e5ab3aa1425e33b7bcfbdaaeb53f6472
-
Filesize
72KB
MD565c3c4ed1a2251c4d75136022dfe08c3
SHA184151342a5bb93778dbb2c35221ff91393f3e3fc
SHA2569cc41c0cce7666f321d9a22a915e0ac56662c59676f5fdfb4c27aef490f6109d
SHA512727538f6a795b8c96281619ae14982b80bfde6f930762a31aaf2a4ad093dbd1ebe0ccda7e244447c3aaf563a5af10f07bda9e6ce110c67c5a114a589ded9b8da
-
Filesize
72KB
MD565c3c4ed1a2251c4d75136022dfe08c3
SHA184151342a5bb93778dbb2c35221ff91393f3e3fc
SHA2569cc41c0cce7666f321d9a22a915e0ac56662c59676f5fdfb4c27aef490f6109d
SHA512727538f6a795b8c96281619ae14982b80bfde6f930762a31aaf2a4ad093dbd1ebe0ccda7e244447c3aaf563a5af10f07bda9e6ce110c67c5a114a589ded9b8da
-
Filesize
72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
Filesize
72KB
MD56f9c365168b173a89003e2b8ac06fa92
SHA1901530d84eeb03e84708de446027e20542bde1f8
SHA256e00023691fd10058e342823626091693297a2708f6b42c37b552d77d041e5b8a
SHA51297b0d99a7d5f8eb29fc86e52cf951e7a1b8328a87b0c706287e9f15858f8caca6fbe387644ad8ba2cd994f2aa6dab842da3dad459dd38f7b30613c9c1b182795
-
Filesize
72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
Filesize
72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
Filesize
72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
Filesize
72KB
MD5c24f3884b7bf5270f3d320435efbd931
SHA15a275a3567b207d19f25e7901d282f1da546c9fc
SHA25679142c116d426900c50fac21c0360df92de9ee9d995c48fbada6db7d2d597bcd
SHA512dfa020bfb4123408c29369671abb848ae1c0450ec4096e304a23b3588d3aa5e094e0c72a5d0c3ca29421e7e27153921af414228dd0fe24cb6ba3d23da674a5f4
-
Filesize
72KB
MD5c24f3884b7bf5270f3d320435efbd931
SHA15a275a3567b207d19f25e7901d282f1da546c9fc
SHA25679142c116d426900c50fac21c0360df92de9ee9d995c48fbada6db7d2d597bcd
SHA512dfa020bfb4123408c29369671abb848ae1c0450ec4096e304a23b3588d3aa5e094e0c72a5d0c3ca29421e7e27153921af414228dd0fe24cb6ba3d23da674a5f4
-
Filesize
72KB
MD5b4733229f1afe64224d229f5a447907a
SHA1f27f48d066928436cad4eceac6216c3aedf111a7
SHA256248b987e52dd25b77241f4ebc74fe431b3929a73b12a2014505ee4d50c3710a6
SHA51290cfac8e03179d73ab4a84d81f95cd5713d5fc453685dfcb341196a76135b793c546c08d7204d08957ae4b69eb22af7f9f7392ae3d6ea99279247a59094ce405
-
Filesize
72KB
MD5b4733229f1afe64224d229f5a447907a
SHA1f27f48d066928436cad4eceac6216c3aedf111a7
SHA256248b987e52dd25b77241f4ebc74fe431b3929a73b12a2014505ee4d50c3710a6
SHA51290cfac8e03179d73ab4a84d81f95cd5713d5fc453685dfcb341196a76135b793c546c08d7204d08957ae4b69eb22af7f9f7392ae3d6ea99279247a59094ce405
-
Filesize
72KB
MD5fc9952540ed46940e0f18248fe065e92
SHA13b9fba53f198300da487841b35c61320edd9568a
SHA256607befa75a298d01b8f0ff6273808affd533e4a683d0c4eb5badba66c98fe805
SHA512ef88ab23b8b963b7b9ecaf518c58661aacb6b76f7d212206de1dd4a25a26679f3d508d5de87e57dfd0332c720ebe2e70041259f07ba20802b25f1e0482b3cfb2
-
Filesize
72KB
MD5fc9952540ed46940e0f18248fe065e92
SHA13b9fba53f198300da487841b35c61320edd9568a
SHA256607befa75a298d01b8f0ff6273808affd533e4a683d0c4eb5badba66c98fe805
SHA512ef88ab23b8b963b7b9ecaf518c58661aacb6b76f7d212206de1dd4a25a26679f3d508d5de87e57dfd0332c720ebe2e70041259f07ba20802b25f1e0482b3cfb2
-
Filesize
72KB
MD512a48020e88c9854c685fdf39cf59a59
SHA16edbf2ec6f9fcc187ad886ed1a2e63001230239b
SHA2565c341dec445b25449a2410ea58d7c537b5d87c8924933e7d84c44a3f9c018904
SHA512a1a90498ab504c9ceb0a3304cdf93290731de359ff2d029ee69c38b45c0f90c06e4730e73b1a3483465bb630b1daf54f3d468f0a93019a46e5cc68cbba48769c
-
Filesize
72KB
MD512a48020e88c9854c685fdf39cf59a59
SHA16edbf2ec6f9fcc187ad886ed1a2e63001230239b
SHA2565c341dec445b25449a2410ea58d7c537b5d87c8924933e7d84c44a3f9c018904
SHA512a1a90498ab504c9ceb0a3304cdf93290731de359ff2d029ee69c38b45c0f90c06e4730e73b1a3483465bb630b1daf54f3d468f0a93019a46e5cc68cbba48769c
-
Filesize
72KB
MD5623b4066bd48623050611bc87a311f84
SHA166c0cc3ae63f949d18acc260ae6f1c6ab6be35af
SHA2569ca541355e3147483bdddd3436adb8bd1ce1e0c96a6b77754bf8ba553194cc9c
SHA512ec8daef5f27e0218b1b3b8fca345f05a56ca39e4f4cbaf3103af775c5191483a05f0ee9abaecd38f56712b3d2f788f82c52c52a2c47a7a10efe63ec2544aea82
-
Filesize
72KB
MD5623b4066bd48623050611bc87a311f84
SHA166c0cc3ae63f949d18acc260ae6f1c6ab6be35af
SHA2569ca541355e3147483bdddd3436adb8bd1ce1e0c96a6b77754bf8ba553194cc9c
SHA512ec8daef5f27e0218b1b3b8fca345f05a56ca39e4f4cbaf3103af775c5191483a05f0ee9abaecd38f56712b3d2f788f82c52c52a2c47a7a10efe63ec2544aea82
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD5e1bda64bb19c92b12bd9305a4e5065c6
SHA17aaaedd73237f2ba41143e327f5f3aea17dcb6ef
SHA25665447321557b3a6e9902e7dbb5a99af82cb19bab2da8345f1c3515ff31d93f88
SHA51283f5d2006b6a68e5f60b47edf48b48a8a40effa1d11b62cca52979eafc0ab7de25d11bfef561e0473c53d28514c71d7db3a05acd7dc6e9ca2768b29654883188
-
Filesize
72KB
MD5e1bda64bb19c92b12bd9305a4e5065c6
SHA17aaaedd73237f2ba41143e327f5f3aea17dcb6ef
SHA25665447321557b3a6e9902e7dbb5a99af82cb19bab2da8345f1c3515ff31d93f88
SHA51283f5d2006b6a68e5f60b47edf48b48a8a40effa1d11b62cca52979eafc0ab7de25d11bfef561e0473c53d28514c71d7db3a05acd7dc6e9ca2768b29654883188
-
Filesize
72KB
MD5932b822bb7a91cfcf5eaf5b3cd892ede
SHA180d2933f6536d4dc5cce8e38c7c104d7841ebbcb
SHA2562fbf6b7335573fb3cb8394e0c77d7a7498e7652791d091d77a9f67967a8ee549
SHA51268f3dbccfd9f1a13dbbc09a5681f7b828d481243e3d71c7ca35ad399d4d3e6b70e69f76da38942c087a8f4456f398765b45751030018da85b2bb8eaac0ef2671
-
Filesize
72KB
MD5932b822bb7a91cfcf5eaf5b3cd892ede
SHA180d2933f6536d4dc5cce8e38c7c104d7841ebbcb
SHA2562fbf6b7335573fb3cb8394e0c77d7a7498e7652791d091d77a9f67967a8ee549
SHA51268f3dbccfd9f1a13dbbc09a5681f7b828d481243e3d71c7ca35ad399d4d3e6b70e69f76da38942c087a8f4456f398765b45751030018da85b2bb8eaac0ef2671
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD56d44f3e17c4605c71a1d388e510d6412
SHA162b724bae3ba112dd5a69a427c5a6527364138df
SHA2562c4e129a4bda1a12838fe00ecd553f8d356f81332c77b9d33c74d4c507f0df80
SHA512c936b3862e99217583179fe9270d645d9d15e244699166c101b610842fd02ea37f298d416e2f650c13285a0b67409d2c1d98392484f0a82c6802146543311ff7
-
Filesize
72KB
MD5cd132ace0bf758b602dfbe5fa62d54f2
SHA1701f4a0e04e93b3fc80cd89327cf93a42f2345aa
SHA256c17fdcb7c1fab55ad6f52814e1262880e67cccc073d9dba45b2836bbdd5164a0
SHA5125624c2ff49fcdbf9e5ac547c451f41b66451970d1f2859fe565c82d9e03410639b6be7511e29556fe23f2ac9ad24cfb00b8bd802c5ec274f36bda7e2f829dfaf
-
Filesize
72KB
MD5cd132ace0bf758b602dfbe5fa62d54f2
SHA1701f4a0e04e93b3fc80cd89327cf93a42f2345aa
SHA256c17fdcb7c1fab55ad6f52814e1262880e67cccc073d9dba45b2836bbdd5164a0
SHA5125624c2ff49fcdbf9e5ac547c451f41b66451970d1f2859fe565c82d9e03410639b6be7511e29556fe23f2ac9ad24cfb00b8bd802c5ec274f36bda7e2f829dfaf
-
Filesize
72KB
MD51023307b33593a7ebd833d38e5b2b898
SHA1ba8e31756d5be431cea31e627b32ce95e4f2a470
SHA25685d0dd8a682f08d60d02dc5da2f81be95287263556519bcefd65e9f85364c870
SHA512cf4ea131871a8ec2dc4a90800806f0524a71ff9a19611aa7e9bb9e20f22dd66437507dbd27a307126a65dd577f3cc8c3e5ab3aa1425e33b7bcfbdaaeb53f6472
-
Filesize
72KB
MD51023307b33593a7ebd833d38e5b2b898
SHA1ba8e31756d5be431cea31e627b32ce95e4f2a470
SHA25685d0dd8a682f08d60d02dc5da2f81be95287263556519bcefd65e9f85364c870
SHA512cf4ea131871a8ec2dc4a90800806f0524a71ff9a19611aa7e9bb9e20f22dd66437507dbd27a307126a65dd577f3cc8c3e5ab3aa1425e33b7bcfbdaaeb53f6472
-
Filesize
72KB
MD565c3c4ed1a2251c4d75136022dfe08c3
SHA184151342a5bb93778dbb2c35221ff91393f3e3fc
SHA2569cc41c0cce7666f321d9a22a915e0ac56662c59676f5fdfb4c27aef490f6109d
SHA512727538f6a795b8c96281619ae14982b80bfde6f930762a31aaf2a4ad093dbd1ebe0ccda7e244447c3aaf563a5af10f07bda9e6ce110c67c5a114a589ded9b8da
-
Filesize
72KB
MD565c3c4ed1a2251c4d75136022dfe08c3
SHA184151342a5bb93778dbb2c35221ff91393f3e3fc
SHA2569cc41c0cce7666f321d9a22a915e0ac56662c59676f5fdfb4c27aef490f6109d
SHA512727538f6a795b8c96281619ae14982b80bfde6f930762a31aaf2a4ad093dbd1ebe0ccda7e244447c3aaf563a5af10f07bda9e6ce110c67c5a114a589ded9b8da
-
Filesize
72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
Filesize
72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
Filesize
72KB
MD56f9c365168b173a89003e2b8ac06fa92
SHA1901530d84eeb03e84708de446027e20542bde1f8
SHA256e00023691fd10058e342823626091693297a2708f6b42c37b552d77d041e5b8a
SHA51297b0d99a7d5f8eb29fc86e52cf951e7a1b8328a87b0c706287e9f15858f8caca6fbe387644ad8ba2cd994f2aa6dab842da3dad459dd38f7b30613c9c1b182795
-
Filesize
72KB
MD56f9c365168b173a89003e2b8ac06fa92
SHA1901530d84eeb03e84708de446027e20542bde1f8
SHA256e00023691fd10058e342823626091693297a2708f6b42c37b552d77d041e5b8a
SHA51297b0d99a7d5f8eb29fc86e52cf951e7a1b8328a87b0c706287e9f15858f8caca6fbe387644ad8ba2cd994f2aa6dab842da3dad459dd38f7b30613c9c1b182795
-
Filesize
72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
Filesize
72KB
MD5311fc62019a3c967fe9ff26eb1066b40
SHA1a7d5d8eb5cc8b22cb00c2a86c4a61a328e081626
SHA256e72274081e68471030f03f37414aad8b7938749d9482eafde6fc609fe5713e22
SHA5123abc4eafce4c1eb3abcab50a4a394b4526539af187a5155c9740c1b6c40c1f40d3ecf0157f7ec55835dc47b30873241efc93014c3b18fe4e22eee4e35c7a4db6
-
Filesize
72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
Filesize
72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
Filesize
72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa
-
Filesize
72KB
MD52c97a6d178513107620ecb64a6da000a
SHA17a52ec6c48c68468c4c2325297fd9556395871b2
SHA256956ec7bb0aa0584721e76cec4bdfdef31df1a5b4b414fc94f2652d0cc170489a
SHA51227c33eda4485a2574618d91ec4dbd4bcc6a1183b2df50bbbc4bf1f55d3e50b19df49be30be5f6a1ef781e58c6c957ed51180eed7f7f0b7eaeba4d06b58abafaa