Analysis
-
max time kernel
132s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe
Resource
win10v2004-20220812-en
General
-
Target
ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe
-
Size
72KB
-
MD5
0e96723fcc94d9c91e293a91f6aff249
-
SHA1
120e4f47df0a2b92dab9c25f06c20595c3d7e9b6
-
SHA256
ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a
-
SHA512
5f4d68e00f5ac1c0ee7035d8d1444391fbc2dff95865807fcab06ae78c01ad45bd28091406157a9d10d44638c2ec9247316dd42c5d41d85d66e2e81ce6512e92
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2W:ipQNwC3BEddsEqOt/hyJF+x3BEJwRra
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1296 backup.exe 1472 backup.exe 1080 System Restore.exe 2040 backup.exe 964 backup.exe 1336 backup.exe 1488 System Restore.exe 684 data.exe 1744 backup.exe 1512 backup.exe 576 backup.exe 2016 backup.exe 1196 backup.exe 1056 backup.exe 1576 backup.exe 1928 backup.exe 976 backup.exe 832 backup.exe 2044 backup.exe 548 update.exe 520 System Restore.exe 1468 update.exe 1632 backup.exe 1536 backup.exe 1596 backup.exe 552 backup.exe 572 backup.exe 1496 backup.exe 1648 backup.exe 1744 backup.exe 2000 backup.exe 1512 backup.exe 1732 System Restore.exe 788 backup.exe 1760 backup.exe 1540 backup.exe 1952 backup.exe 1900 backup.exe 1172 backup.exe 1956 backup.exe 1232 backup.exe 1192 backup.exe 1472 backup.exe 1076 backup.exe 1452 backup.exe 760 backup.exe 660 backup.exe 1164 backup.exe 1632 backup.exe 1336 backup.exe 1592 backup.exe 2036 backup.exe 1380 backup.exe 816 backup.exe 556 update.exe 1932 update.exe 1084 backup.exe 788 backup.exe 276 backup.exe 1500 backup.exe 852 backup.exe 1252 backup.exe 1396 backup.exe 1540 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 684 data.exe 684 data.exe 1744 backup.exe 1744 backup.exe 684 data.exe 684 data.exe 576 backup.exe 576 backup.exe 2016 backup.exe 2016 backup.exe 576 backup.exe 576 backup.exe 1056 backup.exe 1056 backup.exe 1576 backup.exe 1576 backup.exe 1576 backup.exe 1576 backup.exe 976 backup.exe 976 backup.exe 976 backup.exe 976 backup.exe 976 backup.exe 548 update.exe 548 update.exe 548 update.exe 976 backup.exe 976 backup.exe 976 backup.exe 1468 update.exe 1468 update.exe 1468 update.exe 976 backup.exe 976 backup.exe 976 backup.exe 976 backup.exe 976 backup.exe 976 backup.exe 684 data.exe 1576 backup.exe 576 backup.exe 684 data.exe 576 backup.exe 1056 backup.exe 1056 backup.exe 1576 backup.exe 1056 backup.exe 976 backup.exe 1056 backup.exe 976 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\update.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 1296 backup.exe 1472 backup.exe 1080 System Restore.exe 2040 backup.exe 964 backup.exe 1336 backup.exe 1488 System Restore.exe 684 data.exe 1744 backup.exe 1512 backup.exe 576 backup.exe 2016 backup.exe 1196 backup.exe 1056 backup.exe 1576 backup.exe 1928 backup.exe 976 backup.exe 832 backup.exe 2044 backup.exe 548 update.exe 520 System Restore.exe 1468 update.exe 1632 backup.exe 1536 backup.exe 1596 backup.exe 552 backup.exe 572 backup.exe 1496 backup.exe 1648 backup.exe 2000 backup.exe 1744 backup.exe 788 backup.exe 1512 backup.exe 1732 System Restore.exe 1760 backup.exe 1540 backup.exe 1952 backup.exe 1900 backup.exe 1172 backup.exe 1956 backup.exe 1232 backup.exe 1192 backup.exe 1472 backup.exe 1076 backup.exe 1452 backup.exe 760 backup.exe 660 backup.exe 1164 backup.exe 1336 backup.exe 1632 backup.exe 1592 backup.exe 816 backup.exe 556 update.exe 1932 update.exe 2036 backup.exe 1380 backup.exe 1084 backup.exe 788 backup.exe 276 backup.exe 1500 backup.exe 852 backup.exe 1252 backup.exe 1540 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1296 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 28 PID 1756 wrote to memory of 1296 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 28 PID 1756 wrote to memory of 1296 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 28 PID 1756 wrote to memory of 1296 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 28 PID 1756 wrote to memory of 1472 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 29 PID 1756 wrote to memory of 1472 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 29 PID 1756 wrote to memory of 1472 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 29 PID 1756 wrote to memory of 1472 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 29 PID 1756 wrote to memory of 1080 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 30 PID 1756 wrote to memory of 1080 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 30 PID 1756 wrote to memory of 1080 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 30 PID 1756 wrote to memory of 1080 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 30 PID 1756 wrote to memory of 2040 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 31 PID 1756 wrote to memory of 2040 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 31 PID 1756 wrote to memory of 2040 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 31 PID 1756 wrote to memory of 2040 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 31 PID 1756 wrote to memory of 964 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 32 PID 1756 wrote to memory of 964 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 32 PID 1756 wrote to memory of 964 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 32 PID 1756 wrote to memory of 964 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 32 PID 1756 wrote to memory of 1336 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 33 PID 1756 wrote to memory of 1336 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 33 PID 1756 wrote to memory of 1336 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 33 PID 1756 wrote to memory of 1336 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 33 PID 1756 wrote to memory of 1488 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 34 PID 1756 wrote to memory of 1488 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 34 PID 1756 wrote to memory of 1488 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 34 PID 1756 wrote to memory of 1488 1756 ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe 34 PID 1296 wrote to memory of 684 1296 backup.exe 35 PID 1296 wrote to memory of 684 1296 backup.exe 35 PID 1296 wrote to memory of 684 1296 backup.exe 35 PID 1296 wrote to memory of 684 1296 backup.exe 35 PID 684 wrote to memory of 1744 684 data.exe 36 PID 684 wrote to memory of 1744 684 data.exe 36 PID 684 wrote to memory of 1744 684 data.exe 36 PID 684 wrote to memory of 1744 684 data.exe 36 PID 1744 wrote to memory of 1512 1744 backup.exe 37 PID 1744 wrote to memory of 1512 1744 backup.exe 37 PID 1744 wrote to memory of 1512 1744 backup.exe 37 PID 1744 wrote to memory of 1512 1744 backup.exe 37 PID 684 wrote to memory of 576 684 data.exe 38 PID 684 wrote to memory of 576 684 data.exe 38 PID 684 wrote to memory of 576 684 data.exe 38 PID 684 wrote to memory of 576 684 data.exe 38 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 576 wrote to memory of 2016 576 backup.exe 39 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 2016 wrote to memory of 1196 2016 backup.exe 40 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 576 wrote to memory of 1056 576 backup.exe 41 PID 1056 wrote to memory of 1576 1056 backup.exe 42 PID 1056 wrote to memory of 1576 1056 backup.exe 42 PID 1056 wrote to memory of 1576 1056 backup.exe 42 PID 1056 wrote to memory of 1576 1056 backup.exe 42 PID 1576 wrote to memory of 1928 1576 backup.exe 43 PID 1576 wrote to memory of 1928 1576 backup.exe 43 PID 1576 wrote to memory of 1928 1576 backup.exe 43 PID 1576 wrote to memory of 1928 1576 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe"C:\Users\Admin\AppData\Local\Temp\ae83d9bc203e81d897bb8fc734ba468b4c791dba82c36b0e8ab0e50a33cb2a9a.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\1414319608\backup.exeC:\Users\Admin\AppData\Local\Temp\1414319608\backup.exe C:\Users\Admin\AppData\Local\Temp\1414319608\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\data.exe\data.exe \3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:684 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1744 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:576 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2016 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1056 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:976 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2044
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:520
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:1796
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:1492
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1200
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1580
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:552 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:660
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- System policy modification
PID:1956
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1128
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1796
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1164 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:904
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:840
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1956 -
C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\8⤵PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\8⤵PID:1872
-
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1820
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:108
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1232 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:760 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Executes dropped EXE
PID:1396
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1132
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1472
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2024
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
PID:1536
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1204
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1676
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:440
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1680
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:788
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1900
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:276
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1212 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1704
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵
- System policy modification
PID:1608
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:1668
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵PID:2040
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵PID:556
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\8⤵PID:1084
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\8⤵PID:548
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1900 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:856
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:620
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1572
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1932
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1252
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:636
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1988
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1332
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:2024
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:564
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:636
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1252
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1704
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:2032
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:572
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1192
-
-
-
C:\Users\update.exeC:\Users\update.exe C:\Users\4⤵PID:852
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:1828
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\Low\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\Low\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50e8eecc8e20ad40597f69fbc8fd868b2
SHA15540e125add61cdb53a3f900e0c590b8c056cb54
SHA256b724b9812dc2c1db5319302fc457c95fca01aadbdc773b6dfc324791269b81a1
SHA512946fb87a0a182e6b81cd109f3905fed272d47e6268bff7766d3dc0a1d39e3289885c4fe11293e265f2204c58837a66f2eac51a5b092ede3d274c5757b8ead721
-
Filesize
72KB
MD5a5e1d7c5c99e1f123f0e3f59e90d980a
SHA1e229bbdad74c2cc11547e3d11b099018dcec5ba4
SHA256230a8b8e6b0320fc6efe6abbed11d16397ae97e0c750cef20163e3922df9805f
SHA512daaf7d24c082744b38ad5b88f9028e5d50bc598e3f5f75b16217272888635b73681e1afbb12b4b33a8bfcb9198a92ecb95a7b5fc3c7d0f89010f89309c15726d
-
Filesize
72KB
MD5a5e1d7c5c99e1f123f0e3f59e90d980a
SHA1e229bbdad74c2cc11547e3d11b099018dcec5ba4
SHA256230a8b8e6b0320fc6efe6abbed11d16397ae97e0c750cef20163e3922df9805f
SHA512daaf7d24c082744b38ad5b88f9028e5d50bc598e3f5f75b16217272888635b73681e1afbb12b4b33a8bfcb9198a92ecb95a7b5fc3c7d0f89010f89309c15726d
-
Filesize
72KB
MD5b60713a4e55e6ccc95edba02a7f241ce
SHA1fd27389fdb882264c38edcbae804ddbdc175011c
SHA25665f1aa7346f564bdb197b4fa43b134353cab0e8a8d944154d0421c0e0fef10fe
SHA5123b2fb6d59bb32f6e6d7da8de950d370026e1e983f4eaf2533fb166e95539f2c2684e8cec976b0e6a69dc0d6320ab7904f8a9e968ded4bec9d95ddcc2d5b109d9
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD5e2ba2b720b850cad84d93887dd1afa3c
SHA1f0430a4071cfe5b8c3bb26690391cdff2dfa8dd9
SHA25643744e4f843db9b554b2dea11c71e678f8567db2ff2de1e521009a2d79266e6a
SHA512b092e73c1c4b4eea5568b90d6f24271b89c393fc7b91a9d74c617751c18831a575d13357a3618552f4e2111ddcf7074a3c3357cfcd3587699b13a07883209a2f
-
Filesize
72KB
MD5b60713a4e55e6ccc95edba02a7f241ce
SHA1fd27389fdb882264c38edcbae804ddbdc175011c
SHA25665f1aa7346f564bdb197b4fa43b134353cab0e8a8d944154d0421c0e0fef10fe
SHA5123b2fb6d59bb32f6e6d7da8de950d370026e1e983f4eaf2533fb166e95539f2c2684e8cec976b0e6a69dc0d6320ab7904f8a9e968ded4bec9d95ddcc2d5b109d9
-
Filesize
72KB
MD5b60713a4e55e6ccc95edba02a7f241ce
SHA1fd27389fdb882264c38edcbae804ddbdc175011c
SHA25665f1aa7346f564bdb197b4fa43b134353cab0e8a8d944154d0421c0e0fef10fe
SHA5123b2fb6d59bb32f6e6d7da8de950d370026e1e983f4eaf2533fb166e95539f2c2684e8cec976b0e6a69dc0d6320ab7904f8a9e968ded4bec9d95ddcc2d5b109d9
-
Filesize
72KB
MD535d047731ebd589ae7879eac114c3e9f
SHA1e052831a0eb5cbe11ffa9e5a1d52696789bfa6be
SHA25637f84b9a0245f63c83e0623c0509798e7b64041561819780c187b9c1a30b5de8
SHA512533ba7ac36233af6ded70282181d351d65c0be91b2284a3b060b58ec21027e22d075a83f794305c5e169f5e773c90ad25ae15c1904f6eff02d979c8bae82138e
-
Filesize
72KB
MD520b3ab145554594d7935a48bb39c5d63
SHA1edbae54ec4d8775b4d3bc07b37091dbdde8d6785
SHA256f53545bc0e37cad89e1086b37d1aa3321eab4748c11780cd256b91b56fe8171c
SHA512b388d317705369e79a1956c62515311960c2c96df96ee70f62fe949223c96ead00e0e0d5adf60878db43b25fbc1380b3b5f9bb22f77969a43458e16192eb8203
-
Filesize
72KB
MD520b3ab145554594d7935a48bb39c5d63
SHA1edbae54ec4d8775b4d3bc07b37091dbdde8d6785
SHA256f53545bc0e37cad89e1086b37d1aa3321eab4748c11780cd256b91b56fe8171c
SHA512b388d317705369e79a1956c62515311960c2c96df96ee70f62fe949223c96ead00e0e0d5adf60878db43b25fbc1380b3b5f9bb22f77969a43458e16192eb8203
-
Filesize
72KB
MD535d047731ebd589ae7879eac114c3e9f
SHA1e052831a0eb5cbe11ffa9e5a1d52696789bfa6be
SHA25637f84b9a0245f63c83e0623c0509798e7b64041561819780c187b9c1a30b5de8
SHA512533ba7ac36233af6ded70282181d351d65c0be91b2284a3b060b58ec21027e22d075a83f794305c5e169f5e773c90ad25ae15c1904f6eff02d979c8bae82138e
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD544e562ebdf843029ad12548d0b399754
SHA1bb6a7a4081a7fa59c18b75e728e8f4991b5a3a0a
SHA2566f01b19323bdfdf771e4381339edec5b19565cca70acb2a612fc226077d6f45a
SHA51274427385ca6b273802408c482c3972346d1b8011ba3ff02d7efe0a576b3cdbcc6624ba8ca632a6b76238ebf0d38853663d3fbce749f9c87651f9d1773f857d78
-
Filesize
72KB
MD544e562ebdf843029ad12548d0b399754
SHA1bb6a7a4081a7fa59c18b75e728e8f4991b5a3a0a
SHA2566f01b19323bdfdf771e4381339edec5b19565cca70acb2a612fc226077d6f45a
SHA51274427385ca6b273802408c482c3972346d1b8011ba3ff02d7efe0a576b3cdbcc6624ba8ca632a6b76238ebf0d38853663d3fbce749f9c87651f9d1773f857d78
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
Filesize
72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
Filesize
72KB
MD5eb9154188c6460d59977375773838f37
SHA19dc01cae83ec4ffe3f44e376b266e19ffbc70fb2
SHA256f263348c5a8b9ff8c484e79736aacb214e85cd0fbc7a0504f65b6ff40be60375
SHA512465e152d16e5737bf177fd1d069250c5bb4d4e151fbb697af503710970bb18fdc5cccd447821d6486a954aeecb5c72497a9732578c0536d9351fab569a6476bf
-
Filesize
72KB
MD5eb9154188c6460d59977375773838f37
SHA19dc01cae83ec4ffe3f44e376b266e19ffbc70fb2
SHA256f263348c5a8b9ff8c484e79736aacb214e85cd0fbc7a0504f65b6ff40be60375
SHA512465e152d16e5737bf177fd1d069250c5bb4d4e151fbb697af503710970bb18fdc5cccd447821d6486a954aeecb5c72497a9732578c0536d9351fab569a6476bf
-
Filesize
72KB
MD50e8eecc8e20ad40597f69fbc8fd868b2
SHA15540e125add61cdb53a3f900e0c590b8c056cb54
SHA256b724b9812dc2c1db5319302fc457c95fca01aadbdc773b6dfc324791269b81a1
SHA512946fb87a0a182e6b81cd109f3905fed272d47e6268bff7766d3dc0a1d39e3289885c4fe11293e265f2204c58837a66f2eac51a5b092ede3d274c5757b8ead721
-
Filesize
72KB
MD50e8eecc8e20ad40597f69fbc8fd868b2
SHA15540e125add61cdb53a3f900e0c590b8c056cb54
SHA256b724b9812dc2c1db5319302fc457c95fca01aadbdc773b6dfc324791269b81a1
SHA512946fb87a0a182e6b81cd109f3905fed272d47e6268bff7766d3dc0a1d39e3289885c4fe11293e265f2204c58837a66f2eac51a5b092ede3d274c5757b8ead721
-
Filesize
72KB
MD5a5e1d7c5c99e1f123f0e3f59e90d980a
SHA1e229bbdad74c2cc11547e3d11b099018dcec5ba4
SHA256230a8b8e6b0320fc6efe6abbed11d16397ae97e0c750cef20163e3922df9805f
SHA512daaf7d24c082744b38ad5b88f9028e5d50bc598e3f5f75b16217272888635b73681e1afbb12b4b33a8bfcb9198a92ecb95a7b5fc3c7d0f89010f89309c15726d
-
Filesize
72KB
MD5a5e1d7c5c99e1f123f0e3f59e90d980a
SHA1e229bbdad74c2cc11547e3d11b099018dcec5ba4
SHA256230a8b8e6b0320fc6efe6abbed11d16397ae97e0c750cef20163e3922df9805f
SHA512daaf7d24c082744b38ad5b88f9028e5d50bc598e3f5f75b16217272888635b73681e1afbb12b4b33a8bfcb9198a92ecb95a7b5fc3c7d0f89010f89309c15726d
-
Filesize
72KB
MD5b60713a4e55e6ccc95edba02a7f241ce
SHA1fd27389fdb882264c38edcbae804ddbdc175011c
SHA25665f1aa7346f564bdb197b4fa43b134353cab0e8a8d944154d0421c0e0fef10fe
SHA5123b2fb6d59bb32f6e6d7da8de950d370026e1e983f4eaf2533fb166e95539f2c2684e8cec976b0e6a69dc0d6320ab7904f8a9e968ded4bec9d95ddcc2d5b109d9
-
Filesize
72KB
MD5b60713a4e55e6ccc95edba02a7f241ce
SHA1fd27389fdb882264c38edcbae804ddbdc175011c
SHA25665f1aa7346f564bdb197b4fa43b134353cab0e8a8d944154d0421c0e0fef10fe
SHA5123b2fb6d59bb32f6e6d7da8de950d370026e1e983f4eaf2533fb166e95539f2c2684e8cec976b0e6a69dc0d6320ab7904f8a9e968ded4bec9d95ddcc2d5b109d9
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD5e2ba2b720b850cad84d93887dd1afa3c
SHA1f0430a4071cfe5b8c3bb26690391cdff2dfa8dd9
SHA25643744e4f843db9b554b2dea11c71e678f8567db2ff2de1e521009a2d79266e6a
SHA512b092e73c1c4b4eea5568b90d6f24271b89c393fc7b91a9d74c617751c18831a575d13357a3618552f4e2111ddcf7074a3c3357cfcd3587699b13a07883209a2f
-
Filesize
72KB
MD5e2ba2b720b850cad84d93887dd1afa3c
SHA1f0430a4071cfe5b8c3bb26690391cdff2dfa8dd9
SHA25643744e4f843db9b554b2dea11c71e678f8567db2ff2de1e521009a2d79266e6a
SHA512b092e73c1c4b4eea5568b90d6f24271b89c393fc7b91a9d74c617751c18831a575d13357a3618552f4e2111ddcf7074a3c3357cfcd3587699b13a07883209a2f
-
Filesize
72KB
MD5b60713a4e55e6ccc95edba02a7f241ce
SHA1fd27389fdb882264c38edcbae804ddbdc175011c
SHA25665f1aa7346f564bdb197b4fa43b134353cab0e8a8d944154d0421c0e0fef10fe
SHA5123b2fb6d59bb32f6e6d7da8de950d370026e1e983f4eaf2533fb166e95539f2c2684e8cec976b0e6a69dc0d6320ab7904f8a9e968ded4bec9d95ddcc2d5b109d9
-
Filesize
72KB
MD5b60713a4e55e6ccc95edba02a7f241ce
SHA1fd27389fdb882264c38edcbae804ddbdc175011c
SHA25665f1aa7346f564bdb197b4fa43b134353cab0e8a8d944154d0421c0e0fef10fe
SHA5123b2fb6d59bb32f6e6d7da8de950d370026e1e983f4eaf2533fb166e95539f2c2684e8cec976b0e6a69dc0d6320ab7904f8a9e968ded4bec9d95ddcc2d5b109d9
-
Filesize
72KB
MD535d047731ebd589ae7879eac114c3e9f
SHA1e052831a0eb5cbe11ffa9e5a1d52696789bfa6be
SHA25637f84b9a0245f63c83e0623c0509798e7b64041561819780c187b9c1a30b5de8
SHA512533ba7ac36233af6ded70282181d351d65c0be91b2284a3b060b58ec21027e22d075a83f794305c5e169f5e773c90ad25ae15c1904f6eff02d979c8bae82138e
-
Filesize
72KB
MD535d047731ebd589ae7879eac114c3e9f
SHA1e052831a0eb5cbe11ffa9e5a1d52696789bfa6be
SHA25637f84b9a0245f63c83e0623c0509798e7b64041561819780c187b9c1a30b5de8
SHA512533ba7ac36233af6ded70282181d351d65c0be91b2284a3b060b58ec21027e22d075a83f794305c5e169f5e773c90ad25ae15c1904f6eff02d979c8bae82138e
-
Filesize
72KB
MD520b3ab145554594d7935a48bb39c5d63
SHA1edbae54ec4d8775b4d3bc07b37091dbdde8d6785
SHA256f53545bc0e37cad89e1086b37d1aa3321eab4748c11780cd256b91b56fe8171c
SHA512b388d317705369e79a1956c62515311960c2c96df96ee70f62fe949223c96ead00e0e0d5adf60878db43b25fbc1380b3b5f9bb22f77969a43458e16192eb8203
-
Filesize
72KB
MD520b3ab145554594d7935a48bb39c5d63
SHA1edbae54ec4d8775b4d3bc07b37091dbdde8d6785
SHA256f53545bc0e37cad89e1086b37d1aa3321eab4748c11780cd256b91b56fe8171c
SHA512b388d317705369e79a1956c62515311960c2c96df96ee70f62fe949223c96ead00e0e0d5adf60878db43b25fbc1380b3b5f9bb22f77969a43458e16192eb8203
-
Filesize
72KB
MD535d047731ebd589ae7879eac114c3e9f
SHA1e052831a0eb5cbe11ffa9e5a1d52696789bfa6be
SHA25637f84b9a0245f63c83e0623c0509798e7b64041561819780c187b9c1a30b5de8
SHA512533ba7ac36233af6ded70282181d351d65c0be91b2284a3b060b58ec21027e22d075a83f794305c5e169f5e773c90ad25ae15c1904f6eff02d979c8bae82138e
-
Filesize
72KB
MD535d047731ebd589ae7879eac114c3e9f
SHA1e052831a0eb5cbe11ffa9e5a1d52696789bfa6be
SHA25637f84b9a0245f63c83e0623c0509798e7b64041561819780c187b9c1a30b5de8
SHA512533ba7ac36233af6ded70282181d351d65c0be91b2284a3b060b58ec21027e22d075a83f794305c5e169f5e773c90ad25ae15c1904f6eff02d979c8bae82138e
-
Filesize
72KB
MD535d047731ebd589ae7879eac114c3e9f
SHA1e052831a0eb5cbe11ffa9e5a1d52696789bfa6be
SHA25637f84b9a0245f63c83e0623c0509798e7b64041561819780c187b9c1a30b5de8
SHA512533ba7ac36233af6ded70282181d351d65c0be91b2284a3b060b58ec21027e22d075a83f794305c5e169f5e773c90ad25ae15c1904f6eff02d979c8bae82138e
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD54e034d512d4ce420a55960cc8fd3fbae
SHA14a7dcf2c5b31a1b1037215c98046e8791e31a9cd
SHA2568bef0f140ca28093788f8c24d03a9c92a97fa653cc15ac459f1014635993c862
SHA512c1ba1ea57c545d2f6127df86052513534071d723460ecd26d64ee0ce1cf3a9ecc394db766ad6ca99398b06671c7e718a69bf1f9762ecc4be1f001d3003ecc7ce
-
Filesize
72KB
MD544e562ebdf843029ad12548d0b399754
SHA1bb6a7a4081a7fa59c18b75e728e8f4991b5a3a0a
SHA2566f01b19323bdfdf771e4381339edec5b19565cca70acb2a612fc226077d6f45a
SHA51274427385ca6b273802408c482c3972346d1b8011ba3ff02d7efe0a576b3cdbcc6624ba8ca632a6b76238ebf0d38853663d3fbce749f9c87651f9d1773f857d78
-
Filesize
72KB
MD544e562ebdf843029ad12548d0b399754
SHA1bb6a7a4081a7fa59c18b75e728e8f4991b5a3a0a
SHA2566f01b19323bdfdf771e4381339edec5b19565cca70acb2a612fc226077d6f45a
SHA51274427385ca6b273802408c482c3972346d1b8011ba3ff02d7efe0a576b3cdbcc6624ba8ca632a6b76238ebf0d38853663d3fbce749f9c87651f9d1773f857d78
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
Filesize
72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
Filesize
72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD509983791e69e0aed9af340389699f734
SHA173925dddc599968d960bfbf47fe5c3fde4e07c56
SHA256138f1dea3f6476b73633597fb4fd13ee4feb31d53bdff745d93161ba8f15751a
SHA512f3d837ab4025f6b4af0239345a7a3987559a7e8d7fb248d890a409722660b823c97c1c1d35ffea8ca78bfa70a2e6ffdd217f5baedfeeafecb18d48c6b9c62494
-
Filesize
72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0
-
Filesize
72KB
MD5c9f4377d13dc6c4b8a43d2bd23691050
SHA165462d9bc27ff2e46158fe5b2658cb7a7c5cfea9
SHA2565335feba12094969b2c04fe59fb59e8c315a1e8318e3cc140bfd7b021af9d7fb
SHA512e8cbcd504dff61cde3c7b411caa3ba191f18ccc2bc4695c11aac106055af77de54986eee6dbc8295ea621541710fc95ae9144c9a7b2b5a304d66dccb47c218f0