Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe
Resource
win10v2004-20221111-en
General
-
Target
87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe
-
Size
72KB
-
MD5
0017cc9d67fc48f7e6e24008008c3503
-
SHA1
45bb770de0332875ac40b15913ecda77e71bb072
-
SHA256
87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f
-
SHA512
9558df9fd4f5adc599b4bffeb882f7daf089dddd4ad8c0564abe673a34e525457624f8eeeef50092d87038f06e9bd1cefb81ca66f3dbf2ef6d9074d3e00d2b5f
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2G:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPS
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe -
Executes dropped EXE 64 IoCs
pid Process 1756 backup.exe 520 backup.exe 1164 backup.exe 1764 backup.exe 1820 backup.exe 1488 backup.exe 1768 backup.exe 1076 update.exe 1676 backup.exe 2020 backup.exe 1208 backup.exe 1008 System Restore.exe 2008 backup.exe 1080 backup.exe 764 backup.exe 1400 System Restore.exe 1656 backup.exe 1472 backup.exe 1764 backup.exe 560 backup.exe 1500 backup.exe 1552 backup.exe 736 backup.exe 1768 backup.exe 1000 backup.exe 1864 backup.exe 756 backup.exe 960 backup.exe 1200 System Restore.exe 1712 backup.exe 1576 backup.exe 1560 backup.exe 1956 backup.exe 1292 update.exe 2000 backup.exe 2008 backup.exe 1624 backup.exe 336 backup.exe 1244 backup.exe 1508 backup.exe 1760 data.exe 1600 backup.exe 944 backup.exe 112 backup.exe 876 backup.exe 1692 backup.exe 1804 backup.exe 1752 backup.exe 440 backup.exe 580 backup.exe 1052 backup.exe 1412 backup.exe 1200 backup.exe 1984 backup.exe 1792 backup.exe 1924 update.exe 1628 backup.exe 2008 backup.exe 1176 update.exe 1168 backup.exe 688 backup.exe 1112 backup.exe 1760 backup.exe 1820 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1076 update.exe 1076 update.exe 1676 backup.exe 1676 backup.exe 1676 backup.exe 1676 backup.exe 1676 backup.exe 2020 backup.exe 2020 backup.exe 2020 backup.exe 1076 update.exe 1076 update.exe 1208 backup.exe 1208 backup.exe 1208 backup.exe 1208 backup.exe 1208 backup.exe 1008 System Restore.exe 1008 System Restore.exe 1008 System Restore.exe 1008 System Restore.exe 1008 System Restore.exe 2008 backup.exe 2008 backup.exe 2008 backup.exe 1208 backup.exe 1208 backup.exe 1080 backup.exe 1080 backup.exe 1080 backup.exe 1816 System Restore.exe 1816 System Restore.exe 764 backup.exe 764 backup.exe 764 backup.exe 1816 System Restore.exe 1816 System Restore.exe 1400 System Restore.exe 1400 System Restore.exe 1400 System Restore.exe 1400 System Restore.exe 1400 System Restore.exe 1656 backup.exe 1656 backup.exe 1656 backup.exe 1400 System Restore.exe 1400 System Restore.exe 1472 backup.exe 1472 backup.exe 1472 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\update.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\System Restore.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files\7-Zip\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\System Restore.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe System Restore.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 1756 backup.exe 520 backup.exe 1164 backup.exe 1764 backup.exe 1820 backup.exe 1488 backup.exe 1768 backup.exe 1076 update.exe 1676 backup.exe 2020 backup.exe 1208 backup.exe 1008 System Restore.exe 2008 backup.exe 1816 System Restore.exe 764 backup.exe 1400 System Restore.exe 1656 backup.exe 1472 backup.exe 1764 backup.exe 560 backup.exe 1500 backup.exe 1552 backup.exe 736 backup.exe 1768 backup.exe 1000 backup.exe 1864 backup.exe 756 backup.exe 960 backup.exe 1200 System Restore.exe 1712 backup.exe 1576 backup.exe 1560 backup.exe 1956 backup.exe 1292 update.exe 2000 backup.exe 2008 backup.exe 1624 backup.exe 336 backup.exe 1244 backup.exe 1508 backup.exe 1760 data.exe 1600 backup.exe 944 backup.exe 112 backup.exe 876 backup.exe 1692 backup.exe 1804 backup.exe 1752 backup.exe 440 backup.exe 580 backup.exe 1052 backup.exe 1200 backup.exe 1984 backup.exe 1412 backup.exe 1144 System Restore.exe 1792 backup.exe 1924 update.exe 1100 backup.exe 1176 backup.exe 1628 backup.exe 2008 backup.exe 1168 backup.exe 688 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1756 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 28 PID 1352 wrote to memory of 1756 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 28 PID 1352 wrote to memory of 1756 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 28 PID 1352 wrote to memory of 1756 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 28 PID 1352 wrote to memory of 520 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 29 PID 1352 wrote to memory of 520 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 29 PID 1352 wrote to memory of 520 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 29 PID 1352 wrote to memory of 520 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 29 PID 1352 wrote to memory of 1164 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 30 PID 1352 wrote to memory of 1164 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 30 PID 1352 wrote to memory of 1164 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 30 PID 1352 wrote to memory of 1164 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 30 PID 1352 wrote to memory of 1764 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 31 PID 1352 wrote to memory of 1764 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 31 PID 1352 wrote to memory of 1764 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 31 PID 1352 wrote to memory of 1764 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 31 PID 1352 wrote to memory of 1820 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 32 PID 1352 wrote to memory of 1820 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 32 PID 1352 wrote to memory of 1820 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 32 PID 1352 wrote to memory of 1820 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 32 PID 1352 wrote to memory of 1488 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 33 PID 1352 wrote to memory of 1488 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 33 PID 1352 wrote to memory of 1488 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 33 PID 1352 wrote to memory of 1488 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 33 PID 1352 wrote to memory of 1768 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 35 PID 1352 wrote to memory of 1768 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 35 PID 1352 wrote to memory of 1768 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 35 PID 1352 wrote to memory of 1768 1352 87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe 35 PID 1756 wrote to memory of 1076 1756 backup.exe 34 PID 1756 wrote to memory of 1076 1756 backup.exe 34 PID 1756 wrote to memory of 1076 1756 backup.exe 34 PID 1756 wrote to memory of 1076 1756 backup.exe 34 PID 1756 wrote to memory of 1076 1756 backup.exe 34 PID 1756 wrote to memory of 1076 1756 backup.exe 34 PID 1756 wrote to memory of 1076 1756 backup.exe 34 PID 1076 wrote to memory of 1676 1076 update.exe 36 PID 1076 wrote to memory of 1676 1076 update.exe 36 PID 1076 wrote to memory of 1676 1076 update.exe 36 PID 1076 wrote to memory of 1676 1076 update.exe 36 PID 1076 wrote to memory of 1676 1076 update.exe 36 PID 1076 wrote to memory of 1676 1076 update.exe 36 PID 1076 wrote to memory of 1676 1076 update.exe 36 PID 1676 wrote to memory of 2020 1676 backup.exe 37 PID 1676 wrote to memory of 2020 1676 backup.exe 37 PID 1676 wrote to memory of 2020 1676 backup.exe 37 PID 1676 wrote to memory of 2020 1676 backup.exe 37 PID 1676 wrote to memory of 2020 1676 backup.exe 37 PID 1676 wrote to memory of 2020 1676 backup.exe 37 PID 1676 wrote to memory of 2020 1676 backup.exe 37 PID 1076 wrote to memory of 1208 1076 update.exe 38 PID 1076 wrote to memory of 1208 1076 update.exe 38 PID 1076 wrote to memory of 1208 1076 update.exe 38 PID 1076 wrote to memory of 1208 1076 update.exe 38 PID 1076 wrote to memory of 1208 1076 update.exe 38 PID 1076 wrote to memory of 1208 1076 update.exe 38 PID 1076 wrote to memory of 1208 1076 update.exe 38 PID 1208 wrote to memory of 1008 1208 backup.exe 39 PID 1208 wrote to memory of 1008 1208 backup.exe 39 PID 1208 wrote to memory of 1008 1208 backup.exe 39 PID 1208 wrote to memory of 1008 1208 backup.exe 39 PID 1208 wrote to memory of 1008 1208 backup.exe 39 PID 1208 wrote to memory of 1008 1208 backup.exe 39 PID 1208 wrote to memory of 1008 1208 backup.exe 39 PID 1008 wrote to memory of 2008 1008 System Restore.exe 40 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe"C:\Users\Admin\AppData\Local\Temp\87e99386afa7ef49888cc7f90446c73589ebbbe8a1fb3ef444f9161c46e9f48f.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\1270038774\backup.exeC:\Users\Admin\AppData\Local\Temp\1270038774\backup.exe C:\Users\Admin\AppData\Local\Temp\1270038774\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1756 -
C:\update.exe\update.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1076 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1676 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files\7-Zip\System Restore.exe"C:\Program Files\7-Zip\System Restore.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1008 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
PID:1080 -
C:\Program Files\Common Files\Microsoft Shared\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:764
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1656
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1472
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:756
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1200
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1576
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:336
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1244
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:112
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1692
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1752
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1628
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1692
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\8⤵
- Disables RegEdit via registry modification
PID:1916
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\8⤵
- System policy modification
PID:1920
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\8⤵PID:1772
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1200 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\update.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
PID:1176
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:1480
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:756
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1036
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1656
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1796 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Disables RegEdit via registry modification
PID:1356
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1420
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1176
-
-
-
C:\Program Files\Common Files\Services\System Restore.exe"C:\Program Files\Common Files\Services\System Restore.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:316 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1212 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1616
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1176
-
-
C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe"C:\Program Files\Common Files\System\ado\es-ES\System Restore.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1872
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1784
-
-
C:\Program Files\Common Files\System\ado\it-IT\update.exe"C:\Program Files\Common Files\System\ado\it-IT\update.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1600
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:896
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1412 -
C:\Program Files\DVD Maker\de-DE\update.exe"C:\Program Files\DVD Maker\de-DE\update.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1168
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1112
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1048
-
-
C:\Program Files\DVD Maker\it-IT\data.exe"C:\Program Files\DVD Maker\it-IT\data.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Disables RegEdit via registry modification
PID:1864
-
-
C:\Program Files\DVD Maker\ja-JP\System Restore.exe"C:\Program Files\DVD Maker\ja-JP\System Restore.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1184
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1396 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Drops file in Program Files directory
- System policy modification
PID:1152 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1472
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1728
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:1508
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1564 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1244 -
C:\Program Files\Google\Chrome\Application\update.exe"C:\Program Files\Google\Chrome\Application\update.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1480
-
-
-
-
C:\Program Files\Internet Explorer\update.exe"C:\Program Files\Internet Explorer\update.exe" C:\Program Files\Internet Explorer\5⤵PID:556
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:1820
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:856 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵PID:440
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:1960
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1360
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1096
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1500
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:1576
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5da6e79aabd0a33c88a677646d5214a22
SHA1df4c02480e882dd40061bbef58aea5517b37fb25
SHA25612f832e46d476f38845cdaf90539e44ce70e135a25beb278436bb3bea7bfb5c9
SHA5126a0c325c3fa7fa50c42231b34bef4fcefd92c1b1c5db8a0f2c3d1d5ed6944750a1a608f7c7abef8e48a1c7b2bebfaa2a9f775ca516ddc33913d22ce6497a2667
-
Filesize
72KB
MD5da6e79aabd0a33c88a677646d5214a22
SHA1df4c02480e882dd40061bbef58aea5517b37fb25
SHA25612f832e46d476f38845cdaf90539e44ce70e135a25beb278436bb3bea7bfb5c9
SHA5126a0c325c3fa7fa50c42231b34bef4fcefd92c1b1c5db8a0f2c3d1d5ed6944750a1a608f7c7abef8e48a1c7b2bebfaa2a9f775ca516ddc33913d22ce6497a2667
-
Filesize
72KB
MD5def1f3ee3b97a24a57c7e2ad5b8d2c35
SHA1da56fde77ad5106563fa1eefc58df486ca3de9d2
SHA256d54df6fcae69e38ee81d2921fdb7bc73742aebb638f4fb866375fdd1f8ec7a28
SHA51214714f0e803fef61ee7b09c2125b1bb471a7c3c4c609c22535c32fb0ae05c9b0286e66d4bcdff457168f81ad866a8c5ccf48160c2ce9ec73bd0de81405ddcdd1
-
Filesize
72KB
MD5def1f3ee3b97a24a57c7e2ad5b8d2c35
SHA1da56fde77ad5106563fa1eefc58df486ca3de9d2
SHA256d54df6fcae69e38ee81d2921fdb7bc73742aebb638f4fb866375fdd1f8ec7a28
SHA51214714f0e803fef61ee7b09c2125b1bb471a7c3c4c609c22535c32fb0ae05c9b0286e66d4bcdff457168f81ad866a8c5ccf48160c2ce9ec73bd0de81405ddcdd1
-
Filesize
72KB
MD56576735e5223ad125a7ea375d1ef50a3
SHA190646051f368c99568ae93a608d82b730ddd38c3
SHA2569daef55463f8cbb5e18c9af83aa9dd1b33f80d461b04bd845a51d0f1f71c1515
SHA512e76de7aa2d98a6e59a85384baa175e9b66899c4be8681d56ea913aac7f7709128b739b469f0706550e225df3a0295e666b0b3af4d9381236a21e57b1be8e3510
-
Filesize
72KB
MD56576735e5223ad125a7ea375d1ef50a3
SHA190646051f368c99568ae93a608d82b730ddd38c3
SHA2569daef55463f8cbb5e18c9af83aa9dd1b33f80d461b04bd845a51d0f1f71c1515
SHA512e76de7aa2d98a6e59a85384baa175e9b66899c4be8681d56ea913aac7f7709128b739b469f0706550e225df3a0295e666b0b3af4d9381236a21e57b1be8e3510
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD5b64bb73705e1c41a6da665ad63eb025d
SHA1c76b904ffcbdb2ea209f182224b685717f99dced
SHA256fe52c37b29394048dba6ddb2843dccee80c21d87bc276b160fad2db041d4e96e
SHA5123b73478e9f9203e82a8b0eee5be45b0e5cc4aef060b6fee5e67ba9b8dd98737ed465d8ed746a3d58fae1251e2d2495b0b13f9bee61a7026455dd055f1f5ddf86
-
Filesize
72KB
MD5b64bb73705e1c41a6da665ad63eb025d
SHA1c76b904ffcbdb2ea209f182224b685717f99dced
SHA256fe52c37b29394048dba6ddb2843dccee80c21d87bc276b160fad2db041d4e96e
SHA5123b73478e9f9203e82a8b0eee5be45b0e5cc4aef060b6fee5e67ba9b8dd98737ed465d8ed746a3d58fae1251e2d2495b0b13f9bee61a7026455dd055f1f5ddf86
-
Filesize
72KB
MD5944d4135cb65bcb0c68475c513dd5921
SHA174dc52bf8fa34b4de44140e748ce0501fc19caa0
SHA25641c9ae67f32293bf20c53ecf08612e7d25a29c765c22730663df397585376876
SHA512d5f82290b7837f94d581115d4bfd6a805426cb689ae7af15c3359a2ec6be1055b10626bc962ab4ab7436d9983a39f58afa1aab5088764de43e113ece8156468b
-
Filesize
72KB
MD5944d4135cb65bcb0c68475c513dd5921
SHA174dc52bf8fa34b4de44140e748ce0501fc19caa0
SHA25641c9ae67f32293bf20c53ecf08612e7d25a29c765c22730663df397585376876
SHA512d5f82290b7837f94d581115d4bfd6a805426cb689ae7af15c3359a2ec6be1055b10626bc962ab4ab7436d9983a39f58afa1aab5088764de43e113ece8156468b
-
Filesize
72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
Filesize
72KB
MD58fc030a8131fc59463d76517060168b6
SHA14eb715c8c780e7a50a61078437f2970266127676
SHA256b04e0b988bc00f51993237c98c2ae57d219fb32e27df5ae7be9240f2496a4393
SHA5123a3c6cad29b835058408ad8ab7716a48df68b61f61c436510c355a1bbe59f1effc9e2e7ef9af38280d11c96b2f527ac060acf5453eeded2a701179cc29d2bef5
-
Filesize
72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
Filesize
72KB
MD5270b271d376cc6bce8800662a9cbc4d7
SHA10b826eb85438e16e50cb7afd96b6652063a8592b
SHA25606220083a018ed19971695dbcb2530922a53af1390f92b24e24bfbc28feaa877
SHA51235ebdd815a9e1df58a2cf52c915cafb32d852d25bf0213b0fec3951408d820efbb77f87e10a3c32b56fe4dd7caf60edba34778bfb37d90cbc0046f79ffde8337
-
Filesize
72KB
MD50ef12be62eecedc06d41e9f54623e0ca
SHA13389534d8d600a6a0b8d63ec365d3c54acc366b3
SHA25687a3fe8bc750360a81f481d784edf4c72caa36a5653105ec6cd8507a8a34a67c
SHA512db067125b5f8f73782f5d7668d9edc6e731783e88a3c07dedfaae6334984da1379bc22686201858032ab01ba5366c42da81ffc59195dad702547e367e5a77b6e
-
Filesize
72KB
MD50ef12be62eecedc06d41e9f54623e0ca
SHA13389534d8d600a6a0b8d63ec365d3c54acc366b3
SHA25687a3fe8bc750360a81f481d784edf4c72caa36a5653105ec6cd8507a8a34a67c
SHA512db067125b5f8f73782f5d7668d9edc6e731783e88a3c07dedfaae6334984da1379bc22686201858032ab01ba5366c42da81ffc59195dad702547e367e5a77b6e
-
Filesize
72KB
MD5da6e79aabd0a33c88a677646d5214a22
SHA1df4c02480e882dd40061bbef58aea5517b37fb25
SHA25612f832e46d476f38845cdaf90539e44ce70e135a25beb278436bb3bea7bfb5c9
SHA5126a0c325c3fa7fa50c42231b34bef4fcefd92c1b1c5db8a0f2c3d1d5ed6944750a1a608f7c7abef8e48a1c7b2bebfaa2a9f775ca516ddc33913d22ce6497a2667
-
Filesize
72KB
MD5da6e79aabd0a33c88a677646d5214a22
SHA1df4c02480e882dd40061bbef58aea5517b37fb25
SHA25612f832e46d476f38845cdaf90539e44ce70e135a25beb278436bb3bea7bfb5c9
SHA5126a0c325c3fa7fa50c42231b34bef4fcefd92c1b1c5db8a0f2c3d1d5ed6944750a1a608f7c7abef8e48a1c7b2bebfaa2a9f775ca516ddc33913d22ce6497a2667
-
Filesize
72KB
MD5da6e79aabd0a33c88a677646d5214a22
SHA1df4c02480e882dd40061bbef58aea5517b37fb25
SHA25612f832e46d476f38845cdaf90539e44ce70e135a25beb278436bb3bea7bfb5c9
SHA5126a0c325c3fa7fa50c42231b34bef4fcefd92c1b1c5db8a0f2c3d1d5ed6944750a1a608f7c7abef8e48a1c7b2bebfaa2a9f775ca516ddc33913d22ce6497a2667
-
Filesize
72KB
MD5da6e79aabd0a33c88a677646d5214a22
SHA1df4c02480e882dd40061bbef58aea5517b37fb25
SHA25612f832e46d476f38845cdaf90539e44ce70e135a25beb278436bb3bea7bfb5c9
SHA5126a0c325c3fa7fa50c42231b34bef4fcefd92c1b1c5db8a0f2c3d1d5ed6944750a1a608f7c7abef8e48a1c7b2bebfaa2a9f775ca516ddc33913d22ce6497a2667
-
Filesize
72KB
MD5da6e79aabd0a33c88a677646d5214a22
SHA1df4c02480e882dd40061bbef58aea5517b37fb25
SHA25612f832e46d476f38845cdaf90539e44ce70e135a25beb278436bb3bea7bfb5c9
SHA5126a0c325c3fa7fa50c42231b34bef4fcefd92c1b1c5db8a0f2c3d1d5ed6944750a1a608f7c7abef8e48a1c7b2bebfaa2a9f775ca516ddc33913d22ce6497a2667
-
Filesize
72KB
MD5def1f3ee3b97a24a57c7e2ad5b8d2c35
SHA1da56fde77ad5106563fa1eefc58df486ca3de9d2
SHA256d54df6fcae69e38ee81d2921fdb7bc73742aebb638f4fb866375fdd1f8ec7a28
SHA51214714f0e803fef61ee7b09c2125b1bb471a7c3c4c609c22535c32fb0ae05c9b0286e66d4bcdff457168f81ad866a8c5ccf48160c2ce9ec73bd0de81405ddcdd1
-
Filesize
72KB
MD5def1f3ee3b97a24a57c7e2ad5b8d2c35
SHA1da56fde77ad5106563fa1eefc58df486ca3de9d2
SHA256d54df6fcae69e38ee81d2921fdb7bc73742aebb638f4fb866375fdd1f8ec7a28
SHA51214714f0e803fef61ee7b09c2125b1bb471a7c3c4c609c22535c32fb0ae05c9b0286e66d4bcdff457168f81ad866a8c5ccf48160c2ce9ec73bd0de81405ddcdd1
-
Filesize
72KB
MD5def1f3ee3b97a24a57c7e2ad5b8d2c35
SHA1da56fde77ad5106563fa1eefc58df486ca3de9d2
SHA256d54df6fcae69e38ee81d2921fdb7bc73742aebb638f4fb866375fdd1f8ec7a28
SHA51214714f0e803fef61ee7b09c2125b1bb471a7c3c4c609c22535c32fb0ae05c9b0286e66d4bcdff457168f81ad866a8c5ccf48160c2ce9ec73bd0de81405ddcdd1
-
Filesize
72KB
MD5def1f3ee3b97a24a57c7e2ad5b8d2c35
SHA1da56fde77ad5106563fa1eefc58df486ca3de9d2
SHA256d54df6fcae69e38ee81d2921fdb7bc73742aebb638f4fb866375fdd1f8ec7a28
SHA51214714f0e803fef61ee7b09c2125b1bb471a7c3c4c609c22535c32fb0ae05c9b0286e66d4bcdff457168f81ad866a8c5ccf48160c2ce9ec73bd0de81405ddcdd1
-
Filesize
72KB
MD5def1f3ee3b97a24a57c7e2ad5b8d2c35
SHA1da56fde77ad5106563fa1eefc58df486ca3de9d2
SHA256d54df6fcae69e38ee81d2921fdb7bc73742aebb638f4fb866375fdd1f8ec7a28
SHA51214714f0e803fef61ee7b09c2125b1bb471a7c3c4c609c22535c32fb0ae05c9b0286e66d4bcdff457168f81ad866a8c5ccf48160c2ce9ec73bd0de81405ddcdd1
-
Filesize
72KB
MD56576735e5223ad125a7ea375d1ef50a3
SHA190646051f368c99568ae93a608d82b730ddd38c3
SHA2569daef55463f8cbb5e18c9af83aa9dd1b33f80d461b04bd845a51d0f1f71c1515
SHA512e76de7aa2d98a6e59a85384baa175e9b66899c4be8681d56ea913aac7f7709128b739b469f0706550e225df3a0295e666b0b3af4d9381236a21e57b1be8e3510
-
Filesize
72KB
MD56576735e5223ad125a7ea375d1ef50a3
SHA190646051f368c99568ae93a608d82b730ddd38c3
SHA2569daef55463f8cbb5e18c9af83aa9dd1b33f80d461b04bd845a51d0f1f71c1515
SHA512e76de7aa2d98a6e59a85384baa175e9b66899c4be8681d56ea913aac7f7709128b739b469f0706550e225df3a0295e666b0b3af4d9381236a21e57b1be8e3510
-
Filesize
72KB
MD56576735e5223ad125a7ea375d1ef50a3
SHA190646051f368c99568ae93a608d82b730ddd38c3
SHA2569daef55463f8cbb5e18c9af83aa9dd1b33f80d461b04bd845a51d0f1f71c1515
SHA512e76de7aa2d98a6e59a85384baa175e9b66899c4be8681d56ea913aac7f7709128b739b469f0706550e225df3a0295e666b0b3af4d9381236a21e57b1be8e3510
-
Filesize
72KB
MD56576735e5223ad125a7ea375d1ef50a3
SHA190646051f368c99568ae93a608d82b730ddd38c3
SHA2569daef55463f8cbb5e18c9af83aa9dd1b33f80d461b04bd845a51d0f1f71c1515
SHA512e76de7aa2d98a6e59a85384baa175e9b66899c4be8681d56ea913aac7f7709128b739b469f0706550e225df3a0295e666b0b3af4d9381236a21e57b1be8e3510
-
Filesize
72KB
MD56576735e5223ad125a7ea375d1ef50a3
SHA190646051f368c99568ae93a608d82b730ddd38c3
SHA2569daef55463f8cbb5e18c9af83aa9dd1b33f80d461b04bd845a51d0f1f71c1515
SHA512e76de7aa2d98a6e59a85384baa175e9b66899c4be8681d56ea913aac7f7709128b739b469f0706550e225df3a0295e666b0b3af4d9381236a21e57b1be8e3510
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD57feda2c1af06ec9779816be8312ef522
SHA1b006ac61318c99038de65307af82924fc1cf5488
SHA256792e5aa1c1ac036da1de55a239be65faabe0853379b73703fb0537bed2d89fb1
SHA512980cc27171a152cc32d4885dfebb7cc284b930f2f7ae9249a642fcdef03dd5e0d923b3aa389e9e9a5383bc1753e53db1f579e727c8f9ef0ef44fe9dcf351d313
-
Filesize
72KB
MD5b64bb73705e1c41a6da665ad63eb025d
SHA1c76b904ffcbdb2ea209f182224b685717f99dced
SHA256fe52c37b29394048dba6ddb2843dccee80c21d87bc276b160fad2db041d4e96e
SHA5123b73478e9f9203e82a8b0eee5be45b0e5cc4aef060b6fee5e67ba9b8dd98737ed465d8ed746a3d58fae1251e2d2495b0b13f9bee61a7026455dd055f1f5ddf86
-
Filesize
72KB
MD5b64bb73705e1c41a6da665ad63eb025d
SHA1c76b904ffcbdb2ea209f182224b685717f99dced
SHA256fe52c37b29394048dba6ddb2843dccee80c21d87bc276b160fad2db041d4e96e
SHA5123b73478e9f9203e82a8b0eee5be45b0e5cc4aef060b6fee5e67ba9b8dd98737ed465d8ed746a3d58fae1251e2d2495b0b13f9bee61a7026455dd055f1f5ddf86
-
Filesize
72KB
MD5b64bb73705e1c41a6da665ad63eb025d
SHA1c76b904ffcbdb2ea209f182224b685717f99dced
SHA256fe52c37b29394048dba6ddb2843dccee80c21d87bc276b160fad2db041d4e96e
SHA5123b73478e9f9203e82a8b0eee5be45b0e5cc4aef060b6fee5e67ba9b8dd98737ed465d8ed746a3d58fae1251e2d2495b0b13f9bee61a7026455dd055f1f5ddf86
-
Filesize
72KB
MD5b64bb73705e1c41a6da665ad63eb025d
SHA1c76b904ffcbdb2ea209f182224b685717f99dced
SHA256fe52c37b29394048dba6ddb2843dccee80c21d87bc276b160fad2db041d4e96e
SHA5123b73478e9f9203e82a8b0eee5be45b0e5cc4aef060b6fee5e67ba9b8dd98737ed465d8ed746a3d58fae1251e2d2495b0b13f9bee61a7026455dd055f1f5ddf86
-
Filesize
72KB
MD5b64bb73705e1c41a6da665ad63eb025d
SHA1c76b904ffcbdb2ea209f182224b685717f99dced
SHA256fe52c37b29394048dba6ddb2843dccee80c21d87bc276b160fad2db041d4e96e
SHA5123b73478e9f9203e82a8b0eee5be45b0e5cc4aef060b6fee5e67ba9b8dd98737ed465d8ed746a3d58fae1251e2d2495b0b13f9bee61a7026455dd055f1f5ddf86
-
Filesize
72KB
MD5944d4135cb65bcb0c68475c513dd5921
SHA174dc52bf8fa34b4de44140e748ce0501fc19caa0
SHA25641c9ae67f32293bf20c53ecf08612e7d25a29c765c22730663df397585376876
SHA512d5f82290b7837f94d581115d4bfd6a805426cb689ae7af15c3359a2ec6be1055b10626bc962ab4ab7436d9983a39f58afa1aab5088764de43e113ece8156468b
-
Filesize
72KB
MD5944d4135cb65bcb0c68475c513dd5921
SHA174dc52bf8fa34b4de44140e748ce0501fc19caa0
SHA25641c9ae67f32293bf20c53ecf08612e7d25a29c765c22730663df397585376876
SHA512d5f82290b7837f94d581115d4bfd6a805426cb689ae7af15c3359a2ec6be1055b10626bc962ab4ab7436d9983a39f58afa1aab5088764de43e113ece8156468b
-
Filesize
72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
Filesize
72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
Filesize
72KB
MD58fc030a8131fc59463d76517060168b6
SHA14eb715c8c780e7a50a61078437f2970266127676
SHA256b04e0b988bc00f51993237c98c2ae57d219fb32e27df5ae7be9240f2496a4393
SHA5123a3c6cad29b835058408ad8ab7716a48df68b61f61c436510c355a1bbe59f1effc9e2e7ef9af38280d11c96b2f527ac060acf5453eeded2a701179cc29d2bef5
-
Filesize
72KB
MD58fc030a8131fc59463d76517060168b6
SHA14eb715c8c780e7a50a61078437f2970266127676
SHA256b04e0b988bc00f51993237c98c2ae57d219fb32e27df5ae7be9240f2496a4393
SHA5123a3c6cad29b835058408ad8ab7716a48df68b61f61c436510c355a1bbe59f1effc9e2e7ef9af38280d11c96b2f527ac060acf5453eeded2a701179cc29d2bef5
-
Filesize
72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
Filesize
72KB
MD538f31194796e73dcc148a4e080241bc5
SHA107bdb343bd8243c36d17b4eb5a539dda98257ac1
SHA256cec3b16149321eb1eeae8dfdce51442ac0dc44812ab3c4f07d326a22daf9c761
SHA5121c4bdce4079554915c2e622015c8d749c04f314a6fc644ce4dafb9f3df15dddcf0a6a574b10b99c9ea91a5ff6b667872c65a51098c9c8034b499c58c79fd0a44
-
Filesize
72KB
MD5270b271d376cc6bce8800662a9cbc4d7
SHA10b826eb85438e16e50cb7afd96b6652063a8592b
SHA25606220083a018ed19971695dbcb2530922a53af1390f92b24e24bfbc28feaa877
SHA51235ebdd815a9e1df58a2cf52c915cafb32d852d25bf0213b0fec3951408d820efbb77f87e10a3c32b56fe4dd7caf60edba34778bfb37d90cbc0046f79ffde8337
-
Filesize
72KB
MD5270b271d376cc6bce8800662a9cbc4d7
SHA10b826eb85438e16e50cb7afd96b6652063a8592b
SHA25606220083a018ed19971695dbcb2530922a53af1390f92b24e24bfbc28feaa877
SHA51235ebdd815a9e1df58a2cf52c915cafb32d852d25bf0213b0fec3951408d820efbb77f87e10a3c32b56fe4dd7caf60edba34778bfb37d90cbc0046f79ffde8337