Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe
Resource
win10v2004-20221111-en
General
-
Target
f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe
-
Size
72KB
-
MD5
f0cc4f4e382b1d8712ed4afaa3dfd86c
-
SHA1
e01668b53b67d0619d998e8258d669159a3d0eeb
-
SHA256
f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452
-
SHA512
e94c897d2f8c3aa427caf51d41dcb6f6e0546a5369600ba92c861f6d927ae61439f9efdb24985638a16f2bc1ac03b07d52e214bc59b43cf1ba1af6367315df67
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2r:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrn
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1784 backup.exe 688 backup.exe 1164 backup.exe 368 backup.exe 1688 backup.exe 396 backup.exe 1360 backup.exe 1628 System Restore.exe 1244 backup.exe 1324 update.exe 1732 backup.exe 1976 backup.exe 868 backup.exe 1744 update.exe 2028 backup.exe 1612 backup.exe 1472 backup.exe 584 backup.exe 1920 backup.exe 1280 backup.exe 696 backup.exe 1688 backup.exe 1740 backup.exe 1548 backup.exe 2024 backup.exe 1260 backup.exe 1808 backup.exe 1768 backup.exe 1372 data.exe 1408 backup.exe 1868 backup.exe 1524 backup.exe 996 backup.exe 1812 backup.exe 1060 backup.exe 2020 backup.exe 964 backup.exe 1468 backup.exe 900 backup.exe 592 backup.exe 580 backup.exe 688 backup.exe 872 backup.exe 696 backup.exe 1116 backup.exe 1368 backup.exe 1360 backup.exe 1736 backup.exe 1156 backup.exe 1572 backup.exe 1260 backup.exe 976 backup.exe 892 backup.exe 1788 data.exe 836 backup.exe 1112 backup.exe 756 backup.exe 2008 backup.exe 2004 backup.exe 1508 backup.exe 1940 backup.exe 1632 backup.exe 1716 backup.exe 1956 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1628 System Restore.exe 1628 System Restore.exe 1244 backup.exe 1324 update.exe 1324 update.exe 1324 update.exe 1628 System Restore.exe 1628 System Restore.exe 1732 backup.exe 1732 backup.exe 1976 backup.exe 1976 backup.exe 1732 backup.exe 1744 update.exe 1744 update.exe 1744 update.exe 1744 update.exe 1744 update.exe 2028 backup.exe 2028 backup.exe 2028 backup.exe 2028 backup.exe 2028 backup.exe 1612 backup.exe 1612 backup.exe 1612 backup.exe 2028 backup.exe 2028 backup.exe 1472 backup.exe 1472 backup.exe 1472 backup.exe 1472 backup.exe 1472 backup.exe 584 backup.exe 584 backup.exe 584 backup.exe 1472 backup.exe 1472 backup.exe 1920 backup.exe 1920 backup.exe 1920 backup.exe 1472 backup.exe 1472 backup.exe 1280 backup.exe 1280 backup.exe 1280 backup.exe 1472 backup.exe 1472 backup.exe 696 backup.exe 696 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe data.exe File opened for modification C:\Program Files (x86)\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe System Restore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 1784 backup.exe 688 backup.exe 1164 backup.exe 368 backup.exe 1688 backup.exe 396 backup.exe 1360 backup.exe 1628 System Restore.exe 1244 backup.exe 1324 update.exe 1732 backup.exe 1976 backup.exe 868 backup.exe 1744 update.exe 2028 backup.exe 1612 backup.exe 1472 backup.exe 584 backup.exe 1920 backup.exe 1280 backup.exe 696 backup.exe 1688 backup.exe 1740 backup.exe 1548 backup.exe 2024 backup.exe 1260 backup.exe 1808 backup.exe 1768 backup.exe 1372 data.exe 1408 backup.exe 1868 backup.exe 1524 backup.exe 996 backup.exe 1812 backup.exe 1060 backup.exe 2020 backup.exe 964 backup.exe 1468 backup.exe 900 backup.exe 580 backup.exe 688 backup.exe 592 backup.exe 872 backup.exe 696 backup.exe 1116 backup.exe 1368 backup.exe 1360 backup.exe 1156 backup.exe 1260 backup.exe 1572 backup.exe 1736 backup.exe 892 backup.exe 976 backup.exe 836 backup.exe 1788 data.exe 1112 backup.exe 756 backup.exe 2004 backup.exe 2008 backup.exe 1940 backup.exe 1632 backup.exe 1716 backup.exe 1508 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1784 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 28 PID 1952 wrote to memory of 1784 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 28 PID 1952 wrote to memory of 1784 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 28 PID 1952 wrote to memory of 1784 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 28 PID 1952 wrote to memory of 688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 29 PID 1952 wrote to memory of 688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 29 PID 1952 wrote to memory of 688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 29 PID 1952 wrote to memory of 688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 29 PID 1952 wrote to memory of 1164 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 30 PID 1952 wrote to memory of 1164 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 30 PID 1952 wrote to memory of 1164 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 30 PID 1952 wrote to memory of 1164 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 30 PID 1952 wrote to memory of 368 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 31 PID 1952 wrote to memory of 368 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 31 PID 1952 wrote to memory of 368 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 31 PID 1952 wrote to memory of 368 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 31 PID 1952 wrote to memory of 1688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 32 PID 1952 wrote to memory of 1688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 32 PID 1952 wrote to memory of 1688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 32 PID 1952 wrote to memory of 1688 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 32 PID 1952 wrote to memory of 396 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 33 PID 1952 wrote to memory of 396 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 33 PID 1952 wrote to memory of 396 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 33 PID 1952 wrote to memory of 396 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 33 PID 1952 wrote to memory of 1360 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 34 PID 1952 wrote to memory of 1360 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 34 PID 1952 wrote to memory of 1360 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 34 PID 1952 wrote to memory of 1360 1952 f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe 34 PID 1784 wrote to memory of 1628 1784 backup.exe 35 PID 1784 wrote to memory of 1628 1784 backup.exe 35 PID 1784 wrote to memory of 1628 1784 backup.exe 35 PID 1784 wrote to memory of 1628 1784 backup.exe 35 PID 1628 wrote to memory of 1244 1628 System Restore.exe 36 PID 1628 wrote to memory of 1244 1628 System Restore.exe 36 PID 1628 wrote to memory of 1244 1628 System Restore.exe 36 PID 1628 wrote to memory of 1244 1628 System Restore.exe 36 PID 1244 wrote to memory of 1324 1244 backup.exe 37 PID 1244 wrote to memory of 1324 1244 backup.exe 37 PID 1244 wrote to memory of 1324 1244 backup.exe 37 PID 1244 wrote to memory of 1324 1244 backup.exe 37 PID 1244 wrote to memory of 1324 1244 backup.exe 37 PID 1244 wrote to memory of 1324 1244 backup.exe 37 PID 1244 wrote to memory of 1324 1244 backup.exe 37 PID 1628 wrote to memory of 1732 1628 System Restore.exe 38 PID 1628 wrote to memory of 1732 1628 System Restore.exe 38 PID 1628 wrote to memory of 1732 1628 System Restore.exe 38 PID 1628 wrote to memory of 1732 1628 System Restore.exe 38 PID 1732 wrote to memory of 1976 1732 backup.exe 39 PID 1732 wrote to memory of 1976 1732 backup.exe 39 PID 1732 wrote to memory of 1976 1732 backup.exe 39 PID 1732 wrote to memory of 1976 1732 backup.exe 39 PID 1976 wrote to memory of 868 1976 backup.exe 40 PID 1976 wrote to memory of 868 1976 backup.exe 40 PID 1976 wrote to memory of 868 1976 backup.exe 40 PID 1976 wrote to memory of 868 1976 backup.exe 40 PID 1732 wrote to memory of 1744 1732 backup.exe 41 PID 1732 wrote to memory of 1744 1732 backup.exe 41 PID 1732 wrote to memory of 1744 1732 backup.exe 41 PID 1732 wrote to memory of 1744 1732 backup.exe 41 PID 1732 wrote to memory of 1744 1732 backup.exe 41 PID 1732 wrote to memory of 1744 1732 backup.exe 41 PID 1732 wrote to memory of 1744 1732 backup.exe 41 PID 1744 wrote to memory of 2028 1744 update.exe 42 PID 1744 wrote to memory of 2028 1744 update.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe"C:\Users\Admin\AppData\Local\Temp\f02df0a18fbc40c596f7217c7eb257f9a903ef42e087f0ea5580b336e2205452.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\1690172537\backup.exeC:\Users\Admin\AppData\Local\Temp\1690172537\backup.exe C:\Users\Admin\AppData\Local\Temp\1690172537\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1784 -
C:\System Restore.exe"\System Restore.exe" \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\PerfLogs\Admin\update.exeC:\PerfLogs\Admin\update.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1324
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1732 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:868
-
-
-
C:\Program Files\Common Files\update.exe"C:\Program Files\Common Files\update.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1472 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1280
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:696
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1808
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1408
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1868
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:996
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:696
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1792
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵PID:1692
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1112
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
PID:1956
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1368
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1660
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1552 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1612
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\update.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\update.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1632
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:900
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:976 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:636
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1556
-
-
C:\Program Files\Common Files\System\ado\es-ES\data.exe"C:\Program Files\Common Files\System\ado\es-ES\data.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1392
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1708
-
-
C:\Program Files\Common Files\System\ado\it-IT\data.exe"C:\Program Files\Common Files\System\ado\it-IT\data.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1740
-
-
C:\Program Files\Common Files\System\ado\ja-JP\data.exe"C:\Program Files\Common Files\System\ado\ja-JP\data.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1500
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:892
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1604
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Disables RegEdit via registry modification
PID:1512
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- System policy modification
PID:1156
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:868
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:2012 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1264 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵PID:1572
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:868
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:2040
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1980
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1736
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1260 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:756 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:572 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- System policy modification
PID:1704
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:1768
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Disables RegEdit via registry modification
PID:1980
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:112 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1108
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1388
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1148
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1456
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1112
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1532
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1768
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:952
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:524
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1360 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:892
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2008
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- System policy modification
PID:1612
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:696
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1268
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1328
-
-
C:\Users\Admin\Music\data.exeC:\Users\Admin\Music\data.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
PID:1532
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:280
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵
- Disables RegEdit via registry modification
PID:1776
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵PID:636
-
-
C:\Users\Admin\Videos\backup.exeC:\Users\Admin\Videos\backup.exe C:\Users\Admin\Videos\6⤵PID:564
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:700
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:2020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d6d56f9892db93f470b78b2dcaeb4831
SHA1c6dea1a880f5580a9041539dbd2fb066ddab8ab7
SHA256db7414cd9277eecf6aa5e4f8e14885ad00ab71aca85c6f2fa45ca081244fa528
SHA512ab861a13615f4efb1ba2b51f09a4511c9a3f930568d6812f244969053cd8e288481bc86839cbd92b141db91b5aee1eba97d641ba9e76c1fadc72069ed5e9b56a
-
Filesize
72KB
MD5d6d56f9892db93f470b78b2dcaeb4831
SHA1c6dea1a880f5580a9041539dbd2fb066ddab8ab7
SHA256db7414cd9277eecf6aa5e4f8e14885ad00ab71aca85c6f2fa45ca081244fa528
SHA512ab861a13615f4efb1ba2b51f09a4511c9a3f930568d6812f244969053cd8e288481bc86839cbd92b141db91b5aee1eba97d641ba9e76c1fadc72069ed5e9b56a
-
Filesize
72KB
MD5d194f9f4ae7f3d9413aa262f4e9812d2
SHA191d287c858bd54e81253ffa5c65b2dbfd7f5c0fe
SHA256d57779395ddb88e014183e537eb7d2368d4a8037370605ec54634b7d26b50383
SHA51227cc6bfd439be1773edac5318e97943342ef9dabf245ff6e0b644dafd136cbd7846828500bac90e5d8d3536088bb469f75139aeee2604fb5745bd9b38d472e57
-
Filesize
72KB
MD5d194f9f4ae7f3d9413aa262f4e9812d2
SHA191d287c858bd54e81253ffa5c65b2dbfd7f5c0fe
SHA256d57779395ddb88e014183e537eb7d2368d4a8037370605ec54634b7d26b50383
SHA51227cc6bfd439be1773edac5318e97943342ef9dabf245ff6e0b644dafd136cbd7846828500bac90e5d8d3536088bb469f75139aeee2604fb5745bd9b38d472e57
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD5059f93c0f43a3333d3865f727d1c5633
SHA1bd44a815cb3071b13766f48dde2719b8ccf3f742
SHA25629abde3f171959efcdfcad74adc43d574e979abde0511bf65024aaed936a3cf5
SHA51223852ac629b4e6ef6c6c32e956268a599e12d4fe6ee7819f1ebacbabad43681a71a30cd13f66f1a9c373dd13974ce3acc39a9edd2fd12a6dc29545866d3ede43
-
Filesize
72KB
MD5059f93c0f43a3333d3865f727d1c5633
SHA1bd44a815cb3071b13766f48dde2719b8ccf3f742
SHA25629abde3f171959efcdfcad74adc43d574e979abde0511bf65024aaed936a3cf5
SHA51223852ac629b4e6ef6c6c32e956268a599e12d4fe6ee7819f1ebacbabad43681a71a30cd13f66f1a9c373dd13974ce3acc39a9edd2fd12a6dc29545866d3ede43
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD59cbf348a9fb7aa0a7dcf2feacf16236b
SHA13e5f6cab595814cc2e927c9103cd5af4917a3653
SHA2564509cf34b3b8284aa22872062a92e7b95ddf9447735d624c08f8e008a2b7561e
SHA512fc701b3dd3c387db73428bdef727ebdb69d1ef8210d2b3ba153462027ee711f1e86e5369ec76bf59a0e9cbc9930dc49bb3e884d8b327427c68646fc24b3ffe0c
-
Filesize
72KB
MD59cbf348a9fb7aa0a7dcf2feacf16236b
SHA13e5f6cab595814cc2e927c9103cd5af4917a3653
SHA2564509cf34b3b8284aa22872062a92e7b95ddf9447735d624c08f8e008a2b7561e
SHA512fc701b3dd3c387db73428bdef727ebdb69d1ef8210d2b3ba153462027ee711f1e86e5369ec76bf59a0e9cbc9930dc49bb3e884d8b327427c68646fc24b3ffe0c
-
Filesize
72KB
MD5e8f156e516e8512bc483f52cb428b44c
SHA196cb4e0c3d1d65cce9a74b5851db4eeeb626cbec
SHA256d8c54b8f32de0f50f8c392208326ab3003ae30cbae7c19af4bad8812c520bf97
SHA5128c99e0b723d50b151017c48fdb43421b53ff0d852591f52f02ade84d7a2a2631e677f58f4b5385d58c316af088ca8b2d5b8fc5b3234b332ef0e0d41f6c20eb8a
-
Filesize
72KB
MD5e8f156e516e8512bc483f52cb428b44c
SHA196cb4e0c3d1d65cce9a74b5851db4eeeb626cbec
SHA256d8c54b8f32de0f50f8c392208326ab3003ae30cbae7c19af4bad8812c520bf97
SHA5128c99e0b723d50b151017c48fdb43421b53ff0d852591f52f02ade84d7a2a2631e677f58f4b5385d58c316af088ca8b2d5b8fc5b3234b332ef0e0d41f6c20eb8a
-
Filesize
72KB
MD55174f3df791f50a46ebeeb8540583026
SHA1dba538087770a9a2e60292f3ecb5fd6953647a49
SHA256344d69aab330a3fbca694d247418dec5df04ef611e6a582110cedb6108cdd88b
SHA5123d9e7e5823a37ef86b011332b90faa9739cc9f8ff668ec57d854763a5e27e13d3e2911a1a6644c9bd8f530ecec7f1213db3c8ba2f4a5681f6978454bf420561c
-
Filesize
72KB
MD55174f3df791f50a46ebeeb8540583026
SHA1dba538087770a9a2e60292f3ecb5fd6953647a49
SHA256344d69aab330a3fbca694d247418dec5df04ef611e6a582110cedb6108cdd88b
SHA5123d9e7e5823a37ef86b011332b90faa9739cc9f8ff668ec57d854763a5e27e13d3e2911a1a6644c9bd8f530ecec7f1213db3c8ba2f4a5681f6978454bf420561c
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD5d6d56f9892db93f470b78b2dcaeb4831
SHA1c6dea1a880f5580a9041539dbd2fb066ddab8ab7
SHA256db7414cd9277eecf6aa5e4f8e14885ad00ab71aca85c6f2fa45ca081244fa528
SHA512ab861a13615f4efb1ba2b51f09a4511c9a3f930568d6812f244969053cd8e288481bc86839cbd92b141db91b5aee1eba97d641ba9e76c1fadc72069ed5e9b56a
-
Filesize
72KB
MD5d6d56f9892db93f470b78b2dcaeb4831
SHA1c6dea1a880f5580a9041539dbd2fb066ddab8ab7
SHA256db7414cd9277eecf6aa5e4f8e14885ad00ab71aca85c6f2fa45ca081244fa528
SHA512ab861a13615f4efb1ba2b51f09a4511c9a3f930568d6812f244969053cd8e288481bc86839cbd92b141db91b5aee1eba97d641ba9e76c1fadc72069ed5e9b56a
-
Filesize
72KB
MD5d6d56f9892db93f470b78b2dcaeb4831
SHA1c6dea1a880f5580a9041539dbd2fb066ddab8ab7
SHA256db7414cd9277eecf6aa5e4f8e14885ad00ab71aca85c6f2fa45ca081244fa528
SHA512ab861a13615f4efb1ba2b51f09a4511c9a3f930568d6812f244969053cd8e288481bc86839cbd92b141db91b5aee1eba97d641ba9e76c1fadc72069ed5e9b56a
-
Filesize
72KB
MD5d6d56f9892db93f470b78b2dcaeb4831
SHA1c6dea1a880f5580a9041539dbd2fb066ddab8ab7
SHA256db7414cd9277eecf6aa5e4f8e14885ad00ab71aca85c6f2fa45ca081244fa528
SHA512ab861a13615f4efb1ba2b51f09a4511c9a3f930568d6812f244969053cd8e288481bc86839cbd92b141db91b5aee1eba97d641ba9e76c1fadc72069ed5e9b56a
-
Filesize
72KB
MD5d194f9f4ae7f3d9413aa262f4e9812d2
SHA191d287c858bd54e81253ffa5c65b2dbfd7f5c0fe
SHA256d57779395ddb88e014183e537eb7d2368d4a8037370605ec54634b7d26b50383
SHA51227cc6bfd439be1773edac5318e97943342ef9dabf245ff6e0b644dafd136cbd7846828500bac90e5d8d3536088bb469f75139aeee2604fb5745bd9b38d472e57
-
Filesize
72KB
MD5d194f9f4ae7f3d9413aa262f4e9812d2
SHA191d287c858bd54e81253ffa5c65b2dbfd7f5c0fe
SHA256d57779395ddb88e014183e537eb7d2368d4a8037370605ec54634b7d26b50383
SHA51227cc6bfd439be1773edac5318e97943342ef9dabf245ff6e0b644dafd136cbd7846828500bac90e5d8d3536088bb469f75139aeee2604fb5745bd9b38d472e57
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD5059f93c0f43a3333d3865f727d1c5633
SHA1bd44a815cb3071b13766f48dde2719b8ccf3f742
SHA25629abde3f171959efcdfcad74adc43d574e979abde0511bf65024aaed936a3cf5
SHA51223852ac629b4e6ef6c6c32e956268a599e12d4fe6ee7819f1ebacbabad43681a71a30cd13f66f1a9c373dd13974ce3acc39a9edd2fd12a6dc29545866d3ede43
-
Filesize
72KB
MD5059f93c0f43a3333d3865f727d1c5633
SHA1bd44a815cb3071b13766f48dde2719b8ccf3f742
SHA25629abde3f171959efcdfcad74adc43d574e979abde0511bf65024aaed936a3cf5
SHA51223852ac629b4e6ef6c6c32e956268a599e12d4fe6ee7819f1ebacbabad43681a71a30cd13f66f1a9c373dd13974ce3acc39a9edd2fd12a6dc29545866d3ede43
-
Filesize
72KB
MD5059f93c0f43a3333d3865f727d1c5633
SHA1bd44a815cb3071b13766f48dde2719b8ccf3f742
SHA25629abde3f171959efcdfcad74adc43d574e979abde0511bf65024aaed936a3cf5
SHA51223852ac629b4e6ef6c6c32e956268a599e12d4fe6ee7819f1ebacbabad43681a71a30cd13f66f1a9c373dd13974ce3acc39a9edd2fd12a6dc29545866d3ede43
-
Filesize
72KB
MD5059f93c0f43a3333d3865f727d1c5633
SHA1bd44a815cb3071b13766f48dde2719b8ccf3f742
SHA25629abde3f171959efcdfcad74adc43d574e979abde0511bf65024aaed936a3cf5
SHA51223852ac629b4e6ef6c6c32e956268a599e12d4fe6ee7819f1ebacbabad43681a71a30cd13f66f1a9c373dd13974ce3acc39a9edd2fd12a6dc29545866d3ede43
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD5690cd6c02e4baaba1f177aa79693610b
SHA1385eab37ba317febb8533adc88f573ec37fc1669
SHA2563380eef52adff7858ebb4a0ef28aa1db7f5e20dfb3c5ee4a6b6b27431cc91f46
SHA512437359f2115ed3aeb52e616460b3040491b0ec00ac11f94368e002b58f8fb986ffd45c5918fadf7734e4e1aad9232276cad7a788cb0ca5c4ed234bc7d9893016
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD51073dc58e020a05a9a2478a50c5926e2
SHA1b202d0ebbc06bded2ee4c0547abf02552e92cd1c
SHA256341066007d4490fd78884e24d4f8e5af1c7ad24b7aea49b907991970c2ce5532
SHA512b6a96686fe65cb87c4b6bb102456ac2ad72b90f05a885c8c819a59032b582b04e3c871122c8be446b232b27a5cae3cf42dee67ecd771dfc1c442ff7c422edf08
-
Filesize
72KB
MD59cbf348a9fb7aa0a7dcf2feacf16236b
SHA13e5f6cab595814cc2e927c9103cd5af4917a3653
SHA2564509cf34b3b8284aa22872062a92e7b95ddf9447735d624c08f8e008a2b7561e
SHA512fc701b3dd3c387db73428bdef727ebdb69d1ef8210d2b3ba153462027ee711f1e86e5369ec76bf59a0e9cbc9930dc49bb3e884d8b327427c68646fc24b3ffe0c
-
Filesize
72KB
MD59cbf348a9fb7aa0a7dcf2feacf16236b
SHA13e5f6cab595814cc2e927c9103cd5af4917a3653
SHA2564509cf34b3b8284aa22872062a92e7b95ddf9447735d624c08f8e008a2b7561e
SHA512fc701b3dd3c387db73428bdef727ebdb69d1ef8210d2b3ba153462027ee711f1e86e5369ec76bf59a0e9cbc9930dc49bb3e884d8b327427c68646fc24b3ffe0c
-
Filesize
72KB
MD55174f3df791f50a46ebeeb8540583026
SHA1dba538087770a9a2e60292f3ecb5fd6953647a49
SHA256344d69aab330a3fbca694d247418dec5df04ef611e6a582110cedb6108cdd88b
SHA5123d9e7e5823a37ef86b011332b90faa9739cc9f8ff668ec57d854763a5e27e13d3e2911a1a6644c9bd8f530ecec7f1213db3c8ba2f4a5681f6978454bf420561c
-
Filesize
72KB
MD55174f3df791f50a46ebeeb8540583026
SHA1dba538087770a9a2e60292f3ecb5fd6953647a49
SHA256344d69aab330a3fbca694d247418dec5df04ef611e6a582110cedb6108cdd88b
SHA5123d9e7e5823a37ef86b011332b90faa9739cc9f8ff668ec57d854763a5e27e13d3e2911a1a6644c9bd8f530ecec7f1213db3c8ba2f4a5681f6978454bf420561c
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b
-
Filesize
72KB
MD555ba151b96010d8dab62ff9c8d843fea
SHA129408aee8a39dd97195889876d9f74d06088ad58
SHA256dee3c6ecd1a867c4557b778dea821b03b99adadd35b7e41aa5837959a714c5c5
SHA5123942d9ab5b42c8b5341839b59e51ce58db1eb47b9f13bed2f8949342279c91bb1a011fed9f8b0c197c6a15f7e5ea10c72882b81f155f22ced354d3e42a80802b