Analysis
-
max time kernel
158s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe
Resource
win10v2004-20220812-en
General
-
Target
72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe
-
Size
72KB
-
MD5
33f16395cd0977b83bcc175bf3345150
-
SHA1
d36c1fe5e9c5f84cf24f72b99923412414bed888
-
SHA256
72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d
-
SHA512
c3cfa7b9d044b6ab5e54b190323d8da189d50de1a816d3d22ba38a1b9e35ec85e03444a5050530f9d17b95ca5f69cddeddb42a601f407c8ef9f8e5023840d459
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2I:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr4h
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 2012 backup.exe 1992 backup.exe 1948 backup.exe 1908 backup.exe 1160 backup.exe 1404 backup.exe 384 backup.exe 1008 backup.exe 960 backup.exe 1812 backup.exe 1928 backup.exe 580 backup.exe 1916 backup.exe 532 backup.exe 664 backup.exe 1968 backup.exe 548 backup.exe 1520 backup.exe 1328 backup.exe 1944 backup.exe 2000 backup.exe 1940 backup.exe 916 backup.exe 924 update.exe 628 backup.exe 1316 backup.exe 856 backup.exe 1588 backup.exe 780 backup.exe 272 backup.exe 960 backup.exe 1472 backup.exe 268 backup.exe 1168 backup.exe 360 backup.exe 676 backup.exe 1456 backup.exe 832 backup.exe 1772 backup.exe 2024 backup.exe 1564 update.exe 1548 backup.exe 1652 backup.exe 2004 backup.exe 1952 backup.exe 1976 backup.exe 1984 backup.exe 1944 backup.exe 1300 backup.exe 1504 backup.exe 1908 backup.exe 920 backup.exe 1608 backup.exe 1848 backup.exe 924 backup.exe 780 backup.exe 1720 backup.exe 1924 backup.exe 1860 backup.exe 1256 backup.exe 268 backup.exe 1688 backup.exe 1428 backup.exe 432 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1160 backup.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1160 backup.exe 384 backup.exe 384 backup.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1160 backup.exe 1160 backup.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 1812 backup.exe 1812 backup.exe 580 backup.exe 580 backup.exe 1812 backup.exe 1812 backup.exe 532 backup.exe 532 backup.exe 664 backup.exe 664 backup.exe 664 backup.exe 664 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 1160 backup.exe 1160 backup.exe 916 backup.exe 916 backup.exe 628 backup.exe 628 backup.exe 1316 backup.exe 1316 backup.exe 1316 backup.exe 1316 backup.exe 924 update.exe 924 update.exe 924 update.exe 1588 backup.exe 1588 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 548 backup.exe 1588 backup.exe 1588 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\MSBuild\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\data.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 2012 backup.exe 1992 backup.exe 1948 backup.exe 1908 backup.exe 1160 backup.exe 1404 backup.exe 384 backup.exe 1008 backup.exe 960 backup.exe 1812 backup.exe 1928 backup.exe 580 backup.exe 1916 backup.exe 532 backup.exe 664 backup.exe 1968 backup.exe 548 backup.exe 1520 backup.exe 1328 backup.exe 1944 backup.exe 2000 backup.exe 1940 backup.exe 916 backup.exe 628 backup.exe 1316 backup.exe 856 backup.exe 1588 backup.exe 924 update.exe 780 backup.exe 272 backup.exe 960 backup.exe 1472 backup.exe 268 backup.exe 1168 backup.exe 360 backup.exe 676 backup.exe 1456 backup.exe 832 backup.exe 1772 backup.exe 2024 backup.exe 1548 backup.exe 1564 update.exe 2004 backup.exe 1952 backup.exe 1976 backup.exe 1984 backup.exe 1944 backup.exe 1300 backup.exe 1504 backup.exe 1908 backup.exe 920 backup.exe 1848 backup.exe 924 backup.exe 780 backup.exe 1720 backup.exe 1924 backup.exe 1860 backup.exe 1256 backup.exe 268 backup.exe 1688 backup.exe 1428 backup.exe 432 backup.exe 760 data.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2012 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 27 PID 1412 wrote to memory of 2012 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 27 PID 1412 wrote to memory of 2012 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 27 PID 1412 wrote to memory of 2012 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 27 PID 1412 wrote to memory of 1992 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 28 PID 1412 wrote to memory of 1992 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 28 PID 1412 wrote to memory of 1992 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 28 PID 1412 wrote to memory of 1992 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 28 PID 1412 wrote to memory of 1948 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 29 PID 1412 wrote to memory of 1948 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 29 PID 1412 wrote to memory of 1948 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 29 PID 1412 wrote to memory of 1948 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 29 PID 1412 wrote to memory of 1908 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 30 PID 1412 wrote to memory of 1908 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 30 PID 1412 wrote to memory of 1908 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 30 PID 1412 wrote to memory of 1908 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 30 PID 2012 wrote to memory of 1160 2012 backup.exe 31 PID 2012 wrote to memory of 1160 2012 backup.exe 31 PID 2012 wrote to memory of 1160 2012 backup.exe 31 PID 2012 wrote to memory of 1160 2012 backup.exe 31 PID 1412 wrote to memory of 1404 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 32 PID 1412 wrote to memory of 1404 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 32 PID 1412 wrote to memory of 1404 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 32 PID 1412 wrote to memory of 1404 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 32 PID 1160 wrote to memory of 384 1160 backup.exe 33 PID 1160 wrote to memory of 384 1160 backup.exe 33 PID 1160 wrote to memory of 384 1160 backup.exe 33 PID 1160 wrote to memory of 384 1160 backup.exe 33 PID 384 wrote to memory of 1008 384 backup.exe 34 PID 384 wrote to memory of 1008 384 backup.exe 34 PID 384 wrote to memory of 1008 384 backup.exe 34 PID 384 wrote to memory of 1008 384 backup.exe 34 PID 1412 wrote to memory of 960 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 35 PID 1412 wrote to memory of 960 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 35 PID 1412 wrote to memory of 960 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 35 PID 1412 wrote to memory of 960 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 35 PID 1160 wrote to memory of 1812 1160 backup.exe 36 PID 1160 wrote to memory of 1812 1160 backup.exe 36 PID 1160 wrote to memory of 1812 1160 backup.exe 36 PID 1160 wrote to memory of 1812 1160 backup.exe 36 PID 1412 wrote to memory of 1928 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 37 PID 1412 wrote to memory of 1928 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 37 PID 1412 wrote to memory of 1928 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 37 PID 1412 wrote to memory of 1928 1412 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe 37 PID 1812 wrote to memory of 580 1812 backup.exe 38 PID 1812 wrote to memory of 580 1812 backup.exe 38 PID 1812 wrote to memory of 580 1812 backup.exe 38 PID 1812 wrote to memory of 580 1812 backup.exe 38 PID 580 wrote to memory of 1916 580 backup.exe 39 PID 580 wrote to memory of 1916 580 backup.exe 39 PID 580 wrote to memory of 1916 580 backup.exe 39 PID 580 wrote to memory of 1916 580 backup.exe 39 PID 1812 wrote to memory of 532 1812 backup.exe 40 PID 1812 wrote to memory of 532 1812 backup.exe 40 PID 1812 wrote to memory of 532 1812 backup.exe 40 PID 1812 wrote to memory of 532 1812 backup.exe 40 PID 532 wrote to memory of 664 532 backup.exe 41 PID 532 wrote to memory of 664 532 backup.exe 41 PID 532 wrote to memory of 664 532 backup.exe 41 PID 532 wrote to memory of 664 532 backup.exe 41 PID 664 wrote to memory of 1968 664 backup.exe 42 PID 664 wrote to memory of 1968 664 backup.exe 42 PID 664 wrote to memory of 1968 664 backup.exe 42 PID 664 wrote to memory of 1968 664 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe"C:\Users\Admin\AppData\Local\Temp\72deab61cb034501701ef97a689e144281e081f9db3248785b185dd85652c51d.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\4052472143\backup.exeC:\Users\Admin\AppData\Local\Temp\4052472143\backup.exe C:\Users\Admin\AppData\Local\Temp\4052472143\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2012 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1160 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:384 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1812 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:580 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1916
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:532 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:548 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1520
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1328
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:272
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:920 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1848
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:1528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:428
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵PID:1472
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵PID:1552
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:272
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1132
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:384
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:1888
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:788
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:924
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1632
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1252
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1868
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1548
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1684
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:952
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1848
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1272
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:240
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:360
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:676 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1772
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1300 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
PID:1608
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1700
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1656
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1708
-
-
C:\Program Files\Common Files\System\fr-FR\update.exe"C:\Program Files\Common Files\System\fr-FR\update.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:628
-
-
C:\Program Files\Common Files\System\it-IT\update.exe"C:\Program Files\Common Files\System\it-IT\update.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:652
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1008
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:2056
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1548
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1652
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:780
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1256
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1428 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:1804
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:2024
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1992
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:284
-
-
C:\Program Files\Microsoft Games\System Restore.exe"C:\Program Files\Microsoft Games\System Restore.exe" C:\Program Files\Microsoft Games\5⤵PID:360
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1960
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1072
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:1988
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:916 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:628 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1316 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:856
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:780
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1472
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1564 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵PID:1784
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵PID:112
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵PID:1164
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵PID:1624
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1932
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1448
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:960
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1496
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1956
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:432 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1572
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1540
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1256
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:280
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1996
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft Office\update.exe"C:\Program Files (x86)\Microsoft Office\update.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:856
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft Sync Framework\data.exe"C:\Program Files (x86)\Microsoft Sync Framework\data.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2040
-
-
-
C:\Users\data.exeC:\Users\data.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:760 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:956
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1356
-
-
-
C:\Windows\data.exeC:\Windows\data.exe C:\Windows\4⤵PID:1952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD593a5ef011a2ba29923c441fc9de9ba55
SHA1b2fb96355f82271b173adb8e35b66f48be0cc15b
SHA256b9d6ee2659aceaf51804cf903157a749212786ccbb9d1c8555095457a6251a96
SHA512687d5c1be39d03748ccea63938fbe692379985990a9c1fb70c840c308d20ba971b9a52f1491bc4744dca2bb7961a06a0f2a977f0f410278b4e8f6f35620d5a6d
-
Filesize
72KB
MD5fc5a1b4cb4bf8c26e6f8cf37af325727
SHA1c0ec2b3d05d32af7c2566619c821f63c5f56cc40
SHA25628888b7e31bb45855444cf734ac93695d1565186f6885a571c611137369dd059
SHA5122786d1e52147030e9fba40bce8728ce27fb41210f4a5fd2a8257f4dfa73ede9d7c62b4830dc601261d3096272b1a32568377e8330d4bcb18436f6d04d35008a2
-
Filesize
72KB
MD5fc5a1b4cb4bf8c26e6f8cf37af325727
SHA1c0ec2b3d05d32af7c2566619c821f63c5f56cc40
SHA25628888b7e31bb45855444cf734ac93695d1565186f6885a571c611137369dd059
SHA5122786d1e52147030e9fba40bce8728ce27fb41210f4a5fd2a8257f4dfa73ede9d7c62b4830dc601261d3096272b1a32568377e8330d4bcb18436f6d04d35008a2
-
Filesize
72KB
MD5490f24346f9ea65f628be9605d84e0e6
SHA1157b498fab2ca6a583e2f39bdd30be4532a29b7c
SHA25600556eb8bbfb9b095a16832306ca2161e3554713db04287cb3783f233ba7e97d
SHA5127cde4890cd85ec30963bb58af926ab39f80a701a6d6228f168962ea87b085de7d76dafa7d0a45b62d19e2b456b12a2998d6a7e556e1619213f55a7b1a0fbe6e8
-
Filesize
72KB
MD51bc0dd9879d701e2a31986e827d51d82
SHA1de543a8c82de2ccfc3706fda624ff1355f9ee217
SHA256df3eef249a14f94f175ce561af15810ff79ae6bb4daeb57c960b1c25d7e515ae
SHA512d4961215e39c9906fd581b833b237ee0e706c1852b9d13f006c4d028039165ca6815b42c13da4ae9a2938f4e09a85cb4e01252a1abd1d0a4958e182745429e15
-
Filesize
72KB
MD51bc0dd9879d701e2a31986e827d51d82
SHA1de543a8c82de2ccfc3706fda624ff1355f9ee217
SHA256df3eef249a14f94f175ce561af15810ff79ae6bb4daeb57c960b1c25d7e515ae
SHA512d4961215e39c9906fd581b833b237ee0e706c1852b9d13f006c4d028039165ca6815b42c13da4ae9a2938f4e09a85cb4e01252a1abd1d0a4958e182745429e15
-
Filesize
72KB
MD5d2904498821b20137165f51d5eda915d
SHA133c3e24c74a8428e6ee136cde67ca79fe61a2042
SHA256b85b8047185388216a41456ad89ba6503ff6a98df82bf97c89a440a340701442
SHA5127979836795af20521f28939e9b2a7a508994fdd93c3dc64fde7b34dbc5744093001cfcf89f9c9ad6dfb9a17e43dc2fe6355537a0de6eb13619fd91336b14b321
-
Filesize
72KB
MD51a0c02e72a21d92832304f66d79dc1bb
SHA13981e5b4888e5e7be454037c28e9d0d6d8a9985d
SHA256d3241187f8bd4aa040cdf123192dca21bc616a4ee2bda2cba44bcb48e79bf9af
SHA5128b778ed3f320c0d7a509b811e2451a9ae0fa5f7da1922ff4423c7fe813364d192445f44db9aa8de0470e5a39ee3c98d2d0c4a5e4f61716384123462571c7d1d2
-
Filesize
72KB
MD51a0c02e72a21d92832304f66d79dc1bb
SHA13981e5b4888e5e7be454037c28e9d0d6d8a9985d
SHA256d3241187f8bd4aa040cdf123192dca21bc616a4ee2bda2cba44bcb48e79bf9af
SHA5128b778ed3f320c0d7a509b811e2451a9ae0fa5f7da1922ff4423c7fe813364d192445f44db9aa8de0470e5a39ee3c98d2d0c4a5e4f61716384123462571c7d1d2
-
Filesize
72KB
MD5b5b128ad90bc694f8f3b729de8c95214
SHA1a70885fa3f945a226501c51d6402a371e31ddd01
SHA256332c152ef230193eda582dc1ce6b65e532bf0af2513aa0240310bfdabf07d4c3
SHA51253ae34345fa56d5bb2805ef1191ff29166136d2ee0ffa10dfaceec4f9b30149392fd39cf0330754633f4adb5f26e3c99a63d4c1f405115643ea1372942ea59f0
-
Filesize
72KB
MD5d2904498821b20137165f51d5eda915d
SHA133c3e24c74a8428e6ee136cde67ca79fe61a2042
SHA256b85b8047185388216a41456ad89ba6503ff6a98df82bf97c89a440a340701442
SHA5127979836795af20521f28939e9b2a7a508994fdd93c3dc64fde7b34dbc5744093001cfcf89f9c9ad6dfb9a17e43dc2fe6355537a0de6eb13619fd91336b14b321
-
Filesize
72KB
MD5d2904498821b20137165f51d5eda915d
SHA133c3e24c74a8428e6ee136cde67ca79fe61a2042
SHA256b85b8047185388216a41456ad89ba6503ff6a98df82bf97c89a440a340701442
SHA5127979836795af20521f28939e9b2a7a508994fdd93c3dc64fde7b34dbc5744093001cfcf89f9c9ad6dfb9a17e43dc2fe6355537a0de6eb13619fd91336b14b321
-
Filesize
72KB
MD5b5b128ad90bc694f8f3b729de8c95214
SHA1a70885fa3f945a226501c51d6402a371e31ddd01
SHA256332c152ef230193eda582dc1ce6b65e532bf0af2513aa0240310bfdabf07d4c3
SHA51253ae34345fa56d5bb2805ef1191ff29166136d2ee0ffa10dfaceec4f9b30149392fd39cf0330754633f4adb5f26e3c99a63d4c1f405115643ea1372942ea59f0
-
Filesize
72KB
MD52e1be915fbb85c70191c695a8d616f78
SHA13e5b1a1736427603e8daa8d3cb3f6c49fdbfb74a
SHA2564275148269e4535773f5a98e6e8b6db808401db513ae118dce93bab3e6613acb
SHA51242e07ac369c9c05b1fd43106dc7387ce9ce76a5b48f248d7237317c5f06bf9bc5771d506f0d6c23010809f2056f6c0324c09c940c18de2f816e0f7b0a975bd73
-
Filesize
72KB
MD52e1be915fbb85c70191c695a8d616f78
SHA13e5b1a1736427603e8daa8d3cb3f6c49fdbfb74a
SHA2564275148269e4535773f5a98e6e8b6db808401db513ae118dce93bab3e6613acb
SHA51242e07ac369c9c05b1fd43106dc7387ce9ce76a5b48f248d7237317c5f06bf9bc5771d506f0d6c23010809f2056f6c0324c09c940c18de2f816e0f7b0a975bd73
-
Filesize
72KB
MD54e570018c0c19a58b60d9091f77f651c
SHA10e6e4433d27e67fc6c2debae776a6874cd2d4a98
SHA256b6969526d55de86fc6850310dfcec4e4d8c9bf2e97fd479e03f111fbf571ce99
SHA512d01f59b156e5f59fd6256f8517df8471ea025fe2b9db2b9be06f430c58070c0effca598c63fb2132ad3158093b263f1061b06eea86a775d20e0eea910f201f60
-
Filesize
72KB
MD54e570018c0c19a58b60d9091f77f651c
SHA10e6e4433d27e67fc6c2debae776a6874cd2d4a98
SHA256b6969526d55de86fc6850310dfcec4e4d8c9bf2e97fd479e03f111fbf571ce99
SHA512d01f59b156e5f59fd6256f8517df8471ea025fe2b9db2b9be06f430c58070c0effca598c63fb2132ad3158093b263f1061b06eea86a775d20e0eea910f201f60
-
Filesize
72KB
MD5cba05123ab067c83f1a65b9426dcaf6e
SHA151d0a4b2d2bf73d630cea7e38befcd47d952a449
SHA2560743905f8915d3a639d672ce245b1246f0d51fa4cd1ac328a56cec872365e133
SHA512d91f37e6160e54cbeaf946107843412d39a237ee3cf60f2ec4abd6e136b5fa3c1aff66ca66646488442b66bdc5472a4e9b0d112bc49bf20290d6b2848a9944f4
-
Filesize
72KB
MD5cba05123ab067c83f1a65b9426dcaf6e
SHA151d0a4b2d2bf73d630cea7e38befcd47d952a449
SHA2560743905f8915d3a639d672ce245b1246f0d51fa4cd1ac328a56cec872365e133
SHA512d91f37e6160e54cbeaf946107843412d39a237ee3cf60f2ec4abd6e136b5fa3c1aff66ca66646488442b66bdc5472a4e9b0d112bc49bf20290d6b2848a9944f4
-
Filesize
72KB
MD5c93569bc91345b378bcf8b18c32f6267
SHA1acf6569b887fbdfb793d6eba6301ab433c3a3c0e
SHA25657069bebd9fdfd8b369a57a3f5391983a23d11e12f4ac11cdffafaa55b0d7a11
SHA51250f53d08ac051f8d954591da2fb7c386357ab6d29b3284bb48b84bc79b515005597890e5dce6128ef12e4d25cc1d428f282e8c8b20cecd060df80e03f009696b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD550ff2455d93d8390f88f3a64d8fd9fe3
SHA1b942fb35270231cfb88fa81fdbfacd70766bc17e
SHA256e899e765dfdc5964efa04166fe78ae872f9efc9b3c16ad0c74d5dbd964c9c2ed
SHA512ef3f029e13dcf627730b58120fe2061c47ac9a1cd52f2eb43607b13891abceca085af49a1355914657c1b02a11d0b6867aa6eb6badbb9f17b561aa820bfd76c3
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bef015ee58500dc75f543bcca85d0a9b
SHA16c222623054683fb59cb0498afa4ca83a8c7b711
SHA256ad9e4357f0ae4d2b18435603ecade8b590d4c0dcb8e96cbe988b6c7a1eb9c82a
SHA512e9211358fe989b48567c06aa83824385ab811f0eed124dbff7f5169668dcac90c5b512482112dbd9ab6c721f560c32c49260cf608b18a283770bc2c117e18b73
-
Filesize
72KB
MD589a3e00a75303cf322cced8b3af668cb
SHA1e026f0b1536ec1bba8c2bd6a30003bf918eee641
SHA2568a14f73ea592f4b810d6965d9af4a02ae6e80fb5e7f9cb2bd958fa6f2a691077
SHA51271a8ed4483335ba0a53e9fba1d58af769b13125c51b0ac0a1047711ddabf7c0b985a188f79317e9b9a4c14264e3fd9ea1e9c0e7746dea20b61672754ea524b02
-
Filesize
72KB
MD5c93569bc91345b378bcf8b18c32f6267
SHA1acf6569b887fbdfb793d6eba6301ab433c3a3c0e
SHA25657069bebd9fdfd8b369a57a3f5391983a23d11e12f4ac11cdffafaa55b0d7a11
SHA51250f53d08ac051f8d954591da2fb7c386357ab6d29b3284bb48b84bc79b515005597890e5dce6128ef12e4d25cc1d428f282e8c8b20cecd060df80e03f009696b
-
Filesize
72KB
MD5349a055cb9923cca5ac25e74a96160bc
SHA1f6fce86f5bbd0a870c7b006068bcf28ff42cfa07
SHA256ed9519d25d5744f35819cc546f2cee627b716b672982aeb67ed57fdc2aa08a5a
SHA512dea63f4a69e9d4c3fa255bc68d456058cfe278cf29840ba99e36cbf5474c0f4464ab897be8672ec1a7e7c589bb23e61d07897b48c3f051a6865118d0c7533ce1
-
Filesize
72KB
MD54ee9623a940fd456eee541132786bddd
SHA1c12a793fb84f120677c875970f798a4f2b790891
SHA256db92573123b6611181c4c13d5393b53cbc30191ff851292963073379d0ede674
SHA5126908d95a62bf52caddaa88f6f9f162634959b2478e2028143cc758d985d965f5e5efd4a1699eb4e69f2ebe6fb69abf7b052eea21a4531a5c118d856837fa2220
-
Filesize
72KB
MD54ee9623a940fd456eee541132786bddd
SHA1c12a793fb84f120677c875970f798a4f2b790891
SHA256db92573123b6611181c4c13d5393b53cbc30191ff851292963073379d0ede674
SHA5126908d95a62bf52caddaa88f6f9f162634959b2478e2028143cc758d985d965f5e5efd4a1699eb4e69f2ebe6fb69abf7b052eea21a4531a5c118d856837fa2220
-
Filesize
72KB
MD593a5ef011a2ba29923c441fc9de9ba55
SHA1b2fb96355f82271b173adb8e35b66f48be0cc15b
SHA256b9d6ee2659aceaf51804cf903157a749212786ccbb9d1c8555095457a6251a96
SHA512687d5c1be39d03748ccea63938fbe692379985990a9c1fb70c840c308d20ba971b9a52f1491bc4744dca2bb7961a06a0f2a977f0f410278b4e8f6f35620d5a6d
-
Filesize
72KB
MD593a5ef011a2ba29923c441fc9de9ba55
SHA1b2fb96355f82271b173adb8e35b66f48be0cc15b
SHA256b9d6ee2659aceaf51804cf903157a749212786ccbb9d1c8555095457a6251a96
SHA512687d5c1be39d03748ccea63938fbe692379985990a9c1fb70c840c308d20ba971b9a52f1491bc4744dca2bb7961a06a0f2a977f0f410278b4e8f6f35620d5a6d
-
Filesize
72KB
MD5fc5a1b4cb4bf8c26e6f8cf37af325727
SHA1c0ec2b3d05d32af7c2566619c821f63c5f56cc40
SHA25628888b7e31bb45855444cf734ac93695d1565186f6885a571c611137369dd059
SHA5122786d1e52147030e9fba40bce8728ce27fb41210f4a5fd2a8257f4dfa73ede9d7c62b4830dc601261d3096272b1a32568377e8330d4bcb18436f6d04d35008a2
-
Filesize
72KB
MD5fc5a1b4cb4bf8c26e6f8cf37af325727
SHA1c0ec2b3d05d32af7c2566619c821f63c5f56cc40
SHA25628888b7e31bb45855444cf734ac93695d1565186f6885a571c611137369dd059
SHA5122786d1e52147030e9fba40bce8728ce27fb41210f4a5fd2a8257f4dfa73ede9d7c62b4830dc601261d3096272b1a32568377e8330d4bcb18436f6d04d35008a2
-
Filesize
72KB
MD5490f24346f9ea65f628be9605d84e0e6
SHA1157b498fab2ca6a583e2f39bdd30be4532a29b7c
SHA25600556eb8bbfb9b095a16832306ca2161e3554713db04287cb3783f233ba7e97d
SHA5127cde4890cd85ec30963bb58af926ab39f80a701a6d6228f168962ea87b085de7d76dafa7d0a45b62d19e2b456b12a2998d6a7e556e1619213f55a7b1a0fbe6e8
-
Filesize
72KB
MD5490f24346f9ea65f628be9605d84e0e6
SHA1157b498fab2ca6a583e2f39bdd30be4532a29b7c
SHA25600556eb8bbfb9b095a16832306ca2161e3554713db04287cb3783f233ba7e97d
SHA5127cde4890cd85ec30963bb58af926ab39f80a701a6d6228f168962ea87b085de7d76dafa7d0a45b62d19e2b456b12a2998d6a7e556e1619213f55a7b1a0fbe6e8
-
Filesize
72KB
MD51bc0dd9879d701e2a31986e827d51d82
SHA1de543a8c82de2ccfc3706fda624ff1355f9ee217
SHA256df3eef249a14f94f175ce561af15810ff79ae6bb4daeb57c960b1c25d7e515ae
SHA512d4961215e39c9906fd581b833b237ee0e706c1852b9d13f006c4d028039165ca6815b42c13da4ae9a2938f4e09a85cb4e01252a1abd1d0a4958e182745429e15
-
Filesize
72KB
MD51bc0dd9879d701e2a31986e827d51d82
SHA1de543a8c82de2ccfc3706fda624ff1355f9ee217
SHA256df3eef249a14f94f175ce561af15810ff79ae6bb4daeb57c960b1c25d7e515ae
SHA512d4961215e39c9906fd581b833b237ee0e706c1852b9d13f006c4d028039165ca6815b42c13da4ae9a2938f4e09a85cb4e01252a1abd1d0a4958e182745429e15
-
Filesize
72KB
MD5d2904498821b20137165f51d5eda915d
SHA133c3e24c74a8428e6ee136cde67ca79fe61a2042
SHA256b85b8047185388216a41456ad89ba6503ff6a98df82bf97c89a440a340701442
SHA5127979836795af20521f28939e9b2a7a508994fdd93c3dc64fde7b34dbc5744093001cfcf89f9c9ad6dfb9a17e43dc2fe6355537a0de6eb13619fd91336b14b321
-
Filesize
72KB
MD5d2904498821b20137165f51d5eda915d
SHA133c3e24c74a8428e6ee136cde67ca79fe61a2042
SHA256b85b8047185388216a41456ad89ba6503ff6a98df82bf97c89a440a340701442
SHA5127979836795af20521f28939e9b2a7a508994fdd93c3dc64fde7b34dbc5744093001cfcf89f9c9ad6dfb9a17e43dc2fe6355537a0de6eb13619fd91336b14b321
-
Filesize
72KB
MD51a0c02e72a21d92832304f66d79dc1bb
SHA13981e5b4888e5e7be454037c28e9d0d6d8a9985d
SHA256d3241187f8bd4aa040cdf123192dca21bc616a4ee2bda2cba44bcb48e79bf9af
SHA5128b778ed3f320c0d7a509b811e2451a9ae0fa5f7da1922ff4423c7fe813364d192445f44db9aa8de0470e5a39ee3c98d2d0c4a5e4f61716384123462571c7d1d2
-
Filesize
72KB
MD51a0c02e72a21d92832304f66d79dc1bb
SHA13981e5b4888e5e7be454037c28e9d0d6d8a9985d
SHA256d3241187f8bd4aa040cdf123192dca21bc616a4ee2bda2cba44bcb48e79bf9af
SHA5128b778ed3f320c0d7a509b811e2451a9ae0fa5f7da1922ff4423c7fe813364d192445f44db9aa8de0470e5a39ee3c98d2d0c4a5e4f61716384123462571c7d1d2
-
Filesize
72KB
MD5b5b128ad90bc694f8f3b729de8c95214
SHA1a70885fa3f945a226501c51d6402a371e31ddd01
SHA256332c152ef230193eda582dc1ce6b65e532bf0af2513aa0240310bfdabf07d4c3
SHA51253ae34345fa56d5bb2805ef1191ff29166136d2ee0ffa10dfaceec4f9b30149392fd39cf0330754633f4adb5f26e3c99a63d4c1f405115643ea1372942ea59f0
-
Filesize
72KB
MD5b5b128ad90bc694f8f3b729de8c95214
SHA1a70885fa3f945a226501c51d6402a371e31ddd01
SHA256332c152ef230193eda582dc1ce6b65e532bf0af2513aa0240310bfdabf07d4c3
SHA51253ae34345fa56d5bb2805ef1191ff29166136d2ee0ffa10dfaceec4f9b30149392fd39cf0330754633f4adb5f26e3c99a63d4c1f405115643ea1372942ea59f0
-
Filesize
72KB
MD5d2904498821b20137165f51d5eda915d
SHA133c3e24c74a8428e6ee136cde67ca79fe61a2042
SHA256b85b8047185388216a41456ad89ba6503ff6a98df82bf97c89a440a340701442
SHA5127979836795af20521f28939e9b2a7a508994fdd93c3dc64fde7b34dbc5744093001cfcf89f9c9ad6dfb9a17e43dc2fe6355537a0de6eb13619fd91336b14b321
-
Filesize
72KB
MD5d2904498821b20137165f51d5eda915d
SHA133c3e24c74a8428e6ee136cde67ca79fe61a2042
SHA256b85b8047185388216a41456ad89ba6503ff6a98df82bf97c89a440a340701442
SHA5127979836795af20521f28939e9b2a7a508994fdd93c3dc64fde7b34dbc5744093001cfcf89f9c9ad6dfb9a17e43dc2fe6355537a0de6eb13619fd91336b14b321
-
Filesize
72KB
MD5b5b128ad90bc694f8f3b729de8c95214
SHA1a70885fa3f945a226501c51d6402a371e31ddd01
SHA256332c152ef230193eda582dc1ce6b65e532bf0af2513aa0240310bfdabf07d4c3
SHA51253ae34345fa56d5bb2805ef1191ff29166136d2ee0ffa10dfaceec4f9b30149392fd39cf0330754633f4adb5f26e3c99a63d4c1f405115643ea1372942ea59f0
-
Filesize
72KB
MD5b5b128ad90bc694f8f3b729de8c95214
SHA1a70885fa3f945a226501c51d6402a371e31ddd01
SHA256332c152ef230193eda582dc1ce6b65e532bf0af2513aa0240310bfdabf07d4c3
SHA51253ae34345fa56d5bb2805ef1191ff29166136d2ee0ffa10dfaceec4f9b30149392fd39cf0330754633f4adb5f26e3c99a63d4c1f405115643ea1372942ea59f0
-
Filesize
72KB
MD52d61c676a32eb01e9230987a3a7ef025
SHA150480e964373baf98a4946d69a613602fe6b2e21
SHA256026a759e2eb1b954c1543fd1ee735e2e0cfbf19b1c305dd8a8ae405e8bbdf676
SHA512fab5219b9d040c8cad867d9869c1d478b2390293a35b168e4fb7cedb9b3b9aaf430a396c0b9df2bf9bb126354df27f806fd3160b361c9e19dcd674af6859a323
-
Filesize
72KB
MD52e1be915fbb85c70191c695a8d616f78
SHA13e5b1a1736427603e8daa8d3cb3f6c49fdbfb74a
SHA2564275148269e4535773f5a98e6e8b6db808401db513ae118dce93bab3e6613acb
SHA51242e07ac369c9c05b1fd43106dc7387ce9ce76a5b48f248d7237317c5f06bf9bc5771d506f0d6c23010809f2056f6c0324c09c940c18de2f816e0f7b0a975bd73
-
Filesize
72KB
MD52e1be915fbb85c70191c695a8d616f78
SHA13e5b1a1736427603e8daa8d3cb3f6c49fdbfb74a
SHA2564275148269e4535773f5a98e6e8b6db808401db513ae118dce93bab3e6613acb
SHA51242e07ac369c9c05b1fd43106dc7387ce9ce76a5b48f248d7237317c5f06bf9bc5771d506f0d6c23010809f2056f6c0324c09c940c18de2f816e0f7b0a975bd73
-
Filesize
72KB
MD54e570018c0c19a58b60d9091f77f651c
SHA10e6e4433d27e67fc6c2debae776a6874cd2d4a98
SHA256b6969526d55de86fc6850310dfcec4e4d8c9bf2e97fd479e03f111fbf571ce99
SHA512d01f59b156e5f59fd6256f8517df8471ea025fe2b9db2b9be06f430c58070c0effca598c63fb2132ad3158093b263f1061b06eea86a775d20e0eea910f201f60
-
Filesize
72KB
MD54e570018c0c19a58b60d9091f77f651c
SHA10e6e4433d27e67fc6c2debae776a6874cd2d4a98
SHA256b6969526d55de86fc6850310dfcec4e4d8c9bf2e97fd479e03f111fbf571ce99
SHA512d01f59b156e5f59fd6256f8517df8471ea025fe2b9db2b9be06f430c58070c0effca598c63fb2132ad3158093b263f1061b06eea86a775d20e0eea910f201f60
-
Filesize
72KB
MD5cba05123ab067c83f1a65b9426dcaf6e
SHA151d0a4b2d2bf73d630cea7e38befcd47d952a449
SHA2560743905f8915d3a639d672ce245b1246f0d51fa4cd1ac328a56cec872365e133
SHA512d91f37e6160e54cbeaf946107843412d39a237ee3cf60f2ec4abd6e136b5fa3c1aff66ca66646488442b66bdc5472a4e9b0d112bc49bf20290d6b2848a9944f4
-
Filesize
72KB
MD5cba05123ab067c83f1a65b9426dcaf6e
SHA151d0a4b2d2bf73d630cea7e38befcd47d952a449
SHA2560743905f8915d3a639d672ce245b1246f0d51fa4cd1ac328a56cec872365e133
SHA512d91f37e6160e54cbeaf946107843412d39a237ee3cf60f2ec4abd6e136b5fa3c1aff66ca66646488442b66bdc5472a4e9b0d112bc49bf20290d6b2848a9944f4
-
Filesize
72KB
MD5c93569bc91345b378bcf8b18c32f6267
SHA1acf6569b887fbdfb793d6eba6301ab433c3a3c0e
SHA25657069bebd9fdfd8b369a57a3f5391983a23d11e12f4ac11cdffafaa55b0d7a11
SHA51250f53d08ac051f8d954591da2fb7c386357ab6d29b3284bb48b84bc79b515005597890e5dce6128ef12e4d25cc1d428f282e8c8b20cecd060df80e03f009696b
-
Filesize
72KB
MD5c93569bc91345b378bcf8b18c32f6267
SHA1acf6569b887fbdfb793d6eba6301ab433c3a3c0e
SHA25657069bebd9fdfd8b369a57a3f5391983a23d11e12f4ac11cdffafaa55b0d7a11
SHA51250f53d08ac051f8d954591da2fb7c386357ab6d29b3284bb48b84bc79b515005597890e5dce6128ef12e4d25cc1d428f282e8c8b20cecd060df80e03f009696b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD550ff2455d93d8390f88f3a64d8fd9fe3
SHA1b942fb35270231cfb88fa81fdbfacd70766bc17e
SHA256e899e765dfdc5964efa04166fe78ae872f9efc9b3c16ad0c74d5dbd964c9c2ed
SHA512ef3f029e13dcf627730b58120fe2061c47ac9a1cd52f2eb43607b13891abceca085af49a1355914657c1b02a11d0b6867aa6eb6badbb9f17b561aa820bfd76c3
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD550ff2455d93d8390f88f3a64d8fd9fe3
SHA1b942fb35270231cfb88fa81fdbfacd70766bc17e
SHA256e899e765dfdc5964efa04166fe78ae872f9efc9b3c16ad0c74d5dbd964c9c2ed
SHA512ef3f029e13dcf627730b58120fe2061c47ac9a1cd52f2eb43607b13891abceca085af49a1355914657c1b02a11d0b6867aa6eb6badbb9f17b561aa820bfd76c3
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bef015ee58500dc75f543bcca85d0a9b
SHA16c222623054683fb59cb0498afa4ca83a8c7b711
SHA256ad9e4357f0ae4d2b18435603ecade8b590d4c0dcb8e96cbe988b6c7a1eb9c82a
SHA512e9211358fe989b48567c06aa83824385ab811f0eed124dbff7f5169668dcac90c5b512482112dbd9ab6c721f560c32c49260cf608b18a283770bc2c117e18b73
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bef015ee58500dc75f543bcca85d0a9b
SHA16c222623054683fb59cb0498afa4ca83a8c7b711
SHA256ad9e4357f0ae4d2b18435603ecade8b590d4c0dcb8e96cbe988b6c7a1eb9c82a
SHA512e9211358fe989b48567c06aa83824385ab811f0eed124dbff7f5169668dcac90c5b512482112dbd9ab6c721f560c32c49260cf608b18a283770bc2c117e18b73
-
Filesize
72KB
MD589a3e00a75303cf322cced8b3af668cb
SHA1e026f0b1536ec1bba8c2bd6a30003bf918eee641
SHA2568a14f73ea592f4b810d6965d9af4a02ae6e80fb5e7f9cb2bd958fa6f2a691077
SHA51271a8ed4483335ba0a53e9fba1d58af769b13125c51b0ac0a1047711ddabf7c0b985a188f79317e9b9a4c14264e3fd9ea1e9c0e7746dea20b61672754ea524b02
-
Filesize
72KB
MD589a3e00a75303cf322cced8b3af668cb
SHA1e026f0b1536ec1bba8c2bd6a30003bf918eee641
SHA2568a14f73ea592f4b810d6965d9af4a02ae6e80fb5e7f9cb2bd958fa6f2a691077
SHA51271a8ed4483335ba0a53e9fba1d58af769b13125c51b0ac0a1047711ddabf7c0b985a188f79317e9b9a4c14264e3fd9ea1e9c0e7746dea20b61672754ea524b02
-
Filesize
72KB
MD5c93569bc91345b378bcf8b18c32f6267
SHA1acf6569b887fbdfb793d6eba6301ab433c3a3c0e
SHA25657069bebd9fdfd8b369a57a3f5391983a23d11e12f4ac11cdffafaa55b0d7a11
SHA51250f53d08ac051f8d954591da2fb7c386357ab6d29b3284bb48b84bc79b515005597890e5dce6128ef12e4d25cc1d428f282e8c8b20cecd060df80e03f009696b
-
Filesize
72KB
MD5c93569bc91345b378bcf8b18c32f6267
SHA1acf6569b887fbdfb793d6eba6301ab433c3a3c0e
SHA25657069bebd9fdfd8b369a57a3f5391983a23d11e12f4ac11cdffafaa55b0d7a11
SHA51250f53d08ac051f8d954591da2fb7c386357ab6d29b3284bb48b84bc79b515005597890e5dce6128ef12e4d25cc1d428f282e8c8b20cecd060df80e03f009696b
-
Filesize
72KB
MD5349a055cb9923cca5ac25e74a96160bc
SHA1f6fce86f5bbd0a870c7b006068bcf28ff42cfa07
SHA256ed9519d25d5744f35819cc546f2cee627b716b672982aeb67ed57fdc2aa08a5a
SHA512dea63f4a69e9d4c3fa255bc68d456058cfe278cf29840ba99e36cbf5474c0f4464ab897be8672ec1a7e7c589bb23e61d07897b48c3f051a6865118d0c7533ce1
-
Filesize
72KB
MD5349a055cb9923cca5ac25e74a96160bc
SHA1f6fce86f5bbd0a870c7b006068bcf28ff42cfa07
SHA256ed9519d25d5744f35819cc546f2cee627b716b672982aeb67ed57fdc2aa08a5a
SHA512dea63f4a69e9d4c3fa255bc68d456058cfe278cf29840ba99e36cbf5474c0f4464ab897be8672ec1a7e7c589bb23e61d07897b48c3f051a6865118d0c7533ce1