Analysis
-
max time kernel
187s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe
Resource
win10v2004-20221111-en
General
-
Target
bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe
-
Size
72KB
-
MD5
013e78ef00f4c3a66adce6a73909c31b
-
SHA1
e403d323db3525ac8280fe13b2aae8e54d4a4105
-
SHA256
bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d
-
SHA512
386ad3abf7a48475ba87e47ffa8693daa88aaa1197fb40df18f6c7538152419e7a89ccbb1a27629301313fa1e4867184d91961ce33fab734dd6dfda6a7244762
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf24:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1452 backup.exe 688 backup.exe 1148 backup.exe 1480 backup.exe 1988 System Restore.exe 596 backup.exe 1624 backup.exe 964 backup.exe 1040 update.exe 1748 backup.exe 1788 backup.exe 1728 backup.exe 1004 backup.exe 1948 backup.exe 1524 backup.exe 1208 backup.exe 996 backup.exe 688 backup.exe 1576 backup.exe 1496 backup.exe 1792 backup.exe 2032 backup.exe 1796 backup.exe 628 backup.exe 1744 data.exe 1532 backup.exe 1860 backup.exe 1540 update.exe 1044 backup.exe 852 backup.exe 1688 backup.exe 1968 backup.exe 316 backup.exe 1984 backup.exe 828 backup.exe 932 backup.exe 964 backup.exe 544 backup.exe 940 backup.exe 864 backup.exe 832 backup.exe 2036 backup.exe 1488 backup.exe 1908 backup.exe 472 backup.exe 1600 backup.exe 1604 backup.exe 1740 backup.exe 856 backup.exe 576 backup.exe 916 backup.exe 1796 backup.exe 820 backup.exe 972 backup.exe 436 backup.exe 1136 backup.exe 1540 backup.exe 1352 backup.exe 1784 backup.exe 456 backup.exe 1968 backup.exe 2040 backup.exe 1728 backup.exe 1940 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1748 backup.exe 1748 backup.exe 964 backup.exe 964 backup.exe 1040 update.exe 1040 update.exe 1040 update.exe 1728 backup.exe 1728 backup.exe 1748 backup.exe 1748 backup.exe 1948 backup.exe 1948 backup.exe 1524 backup.exe 1524 backup.exe 1524 backup.exe 1524 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 996 backup.exe 1540 update.exe 1540 update.exe 1540 update.exe 996 backup.exe 996 backup.exe 1044 backup.exe 1044 backup.exe 1044 backup.exe 1044 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 1452 backup.exe 688 backup.exe 1148 backup.exe 1480 backup.exe 1988 System Restore.exe 596 backup.exe 1624 backup.exe 964 backup.exe 1748 backup.exe 1788 backup.exe 1728 backup.exe 1040 update.exe 1004 backup.exe 1948 backup.exe 1524 backup.exe 1208 backup.exe 996 backup.exe 688 backup.exe 1576 backup.exe 1496 backup.exe 1792 backup.exe 2032 backup.exe 1796 backup.exe 628 backup.exe 1744 data.exe 1532 backup.exe 1860 backup.exe 1540 update.exe 1044 backup.exe 852 backup.exe 1688 backup.exe 1968 backup.exe 316 backup.exe 964 backup.exe 932 backup.exe 544 backup.exe 828 backup.exe 1984 backup.exe 940 backup.exe 864 backup.exe 832 backup.exe 2036 backup.exe 1488 backup.exe 1908 backup.exe 472 backup.exe 1600 backup.exe 1604 backup.exe 1740 backup.exe 856 backup.exe 916 backup.exe 576 backup.exe 1796 backup.exe 820 backup.exe 972 backup.exe 436 backup.exe 1136 backup.exe 1540 backup.exe 1352 backup.exe 1784 backup.exe 456 backup.exe 1968 backup.exe 2040 backup.exe 1728 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1452 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 28 PID 1224 wrote to memory of 1452 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 28 PID 1224 wrote to memory of 1452 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 28 PID 1224 wrote to memory of 1452 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 28 PID 1224 wrote to memory of 688 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 29 PID 1224 wrote to memory of 688 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 29 PID 1224 wrote to memory of 688 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 29 PID 1224 wrote to memory of 688 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 29 PID 1224 wrote to memory of 1148 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 30 PID 1224 wrote to memory of 1148 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 30 PID 1224 wrote to memory of 1148 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 30 PID 1224 wrote to memory of 1148 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 30 PID 1224 wrote to memory of 1480 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 31 PID 1224 wrote to memory of 1480 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 31 PID 1224 wrote to memory of 1480 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 31 PID 1224 wrote to memory of 1480 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 31 PID 1224 wrote to memory of 1988 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 32 PID 1224 wrote to memory of 1988 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 32 PID 1224 wrote to memory of 1988 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 32 PID 1224 wrote to memory of 1988 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 32 PID 1224 wrote to memory of 596 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 33 PID 1224 wrote to memory of 596 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 33 PID 1224 wrote to memory of 596 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 33 PID 1224 wrote to memory of 596 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 33 PID 1452 wrote to memory of 1624 1452 backup.exe 34 PID 1452 wrote to memory of 1624 1452 backup.exe 34 PID 1452 wrote to memory of 1624 1452 backup.exe 34 PID 1452 wrote to memory of 1624 1452 backup.exe 34 PID 1624 wrote to memory of 964 1624 backup.exe 36 PID 1624 wrote to memory of 964 1624 backup.exe 36 PID 1624 wrote to memory of 964 1624 backup.exe 36 PID 1624 wrote to memory of 964 1624 backup.exe 36 PID 1224 wrote to memory of 1040 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 35 PID 1224 wrote to memory of 1040 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 35 PID 1224 wrote to memory of 1040 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 35 PID 1224 wrote to memory of 1040 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 35 PID 1224 wrote to memory of 1040 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 35 PID 1224 wrote to memory of 1040 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 35 PID 1224 wrote to memory of 1040 1224 bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe 35 PID 1624 wrote to memory of 1748 1624 backup.exe 37 PID 1624 wrote to memory of 1748 1624 backup.exe 37 PID 1624 wrote to memory of 1748 1624 backup.exe 37 PID 1624 wrote to memory of 1748 1624 backup.exe 37 PID 1748 wrote to memory of 1728 1748 backup.exe 38 PID 1748 wrote to memory of 1728 1748 backup.exe 38 PID 1748 wrote to memory of 1728 1748 backup.exe 38 PID 1748 wrote to memory of 1728 1748 backup.exe 38 PID 964 wrote to memory of 1788 964 backup.exe 39 PID 964 wrote to memory of 1788 964 backup.exe 39 PID 964 wrote to memory of 1788 964 backup.exe 39 PID 964 wrote to memory of 1788 964 backup.exe 39 PID 1728 wrote to memory of 1004 1728 backup.exe 40 PID 1728 wrote to memory of 1004 1728 backup.exe 40 PID 1728 wrote to memory of 1004 1728 backup.exe 40 PID 1728 wrote to memory of 1004 1728 backup.exe 40 PID 1748 wrote to memory of 1948 1748 backup.exe 41 PID 1748 wrote to memory of 1948 1748 backup.exe 41 PID 1748 wrote to memory of 1948 1748 backup.exe 41 PID 1748 wrote to memory of 1948 1748 backup.exe 41 PID 1948 wrote to memory of 1524 1948 backup.exe 42 PID 1948 wrote to memory of 1524 1948 backup.exe 42 PID 1948 wrote to memory of 1524 1948 backup.exe 42 PID 1948 wrote to memory of 1524 1948 backup.exe 42 PID 1524 wrote to memory of 1208 1524 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe"C:\Users\Admin\AppData\Local\Temp\bfe8f18d4d62839476259000d7ca5439a4b422baa63d8ed99a1d091c239a7c1d.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\771951091\backup.exeC:\Users\Admin\AppData\Local\Temp\771951091\backup.exe C:\Users\Admin\AppData\Local\Temp\771951091\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1452 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:964 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1748 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1728 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1004
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1208
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:996 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:628
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1044 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:864
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1784
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1704
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1844
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:820
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵PID:1948
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:456
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1768
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:796
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1328 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
PID:1860
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
PID:316
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1704
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1300
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1488
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:544
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:972 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Disables RegEdit via registry modification
PID:544
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1760
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1852
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:768
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:576
-
-
C:\Program Files\Common Files\System\ado\ja-JP\System Restore.exe"C:\Program Files\Common Files\System\ado\ja-JP\System Restore.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1480
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1944
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1312
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1880
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:320
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:832
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:472
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:820
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1136
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:992
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1608
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1488 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1740 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\System Restore.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\System Restore.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵PID:1924
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:1712
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:968
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵PID:1908
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Drops file in Program Files directory
- System policy modification
PID:1736 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:792
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:768
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1688
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:884
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1908 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:436
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1060
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Disables RegEdit via registry modification
PID:932
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1056
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1300 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
PID:1880
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1540
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1932 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵PID:1448
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1860
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1360 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Drops file in Program Files directory
PID:2020 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵PID:2004
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:576
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:316
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:940
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:864
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1844
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:240
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1776
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:932 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:1988
-
-
C:\Users\Public\System Restore.exe"C:\Users\Public\System Restore.exe" C:\Users\Public\5⤵PID:1536
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:596
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f844a53a1023d8485160cc3e498a805b
SHA1457b951621acbd205e537a393a7cebf4fbe51403
SHA256929d9a7df09514e6740c17e91aa1ddedccfa60a00e7329d8d95c8f02d6f6394d
SHA512cc79af7d85b42316a984889978e9e867563ed8f4820c524d064ed4d69631aec57515f12a98377fb48d0f90deca952eb43398d783fd796ca16b03d22b39a1f8bb
-
Filesize
72KB
MD5d1145c80841ef5bfd7ccbfd2d422d128
SHA10e83baa15e8e9979638cae98659a74c6a775b387
SHA256e0338444e3426384bfc2b7d03382931b7c0f187a67e689c0aacd53e1761aa826
SHA512825f7de0adcc96ec18f9ad8e59d0cca451f7d8bc7b3a1155c92e073fc9f2e83603d69c8c6cd2b4945cd670a5666fee20e83244dfc6a1d20c551e713ef7d9c549
-
Filesize
72KB
MD5d1145c80841ef5bfd7ccbfd2d422d128
SHA10e83baa15e8e9979638cae98659a74c6a775b387
SHA256e0338444e3426384bfc2b7d03382931b7c0f187a67e689c0aacd53e1761aa826
SHA512825f7de0adcc96ec18f9ad8e59d0cca451f7d8bc7b3a1155c92e073fc9f2e83603d69c8c6cd2b4945cd670a5666fee20e83244dfc6a1d20c551e713ef7d9c549
-
Filesize
72KB
MD50be5c30cb2a60277fdea3c096e182b8e
SHA10669c99c7139247f82687f994e72330e0a360ecb
SHA256c57d533649accebb4aff3636b427ad923c23948c4cb093a2688bb8d67eedbe0f
SHA51295e9d1daf0ca16a2f612b24108a86f43a80502c69d1d271d2297b78a07a4fe210ac4fa25da42525e4b06a3d0132b1ef63075c968681ffb1e2afe54774f8a392d
-
Filesize
72KB
MD5e8c7a600ea463de3ad904e41303386d1
SHA12c9ecbce9b9d86483a2f71c8f387c6bf85f2aeac
SHA256c81211bc2cf36175fcaa50f660d84e5f77a543866172253115f75feef913363d
SHA512549f95f2fa4f870a0d6185d4bd7752493175120eb7ee3be42b4283cb6ec556232396343be70e2701e37d2da805482ee3e3020f2e117bc73754c6e765640d37a2
-
Filesize
72KB
MD5e8c7a600ea463de3ad904e41303386d1
SHA12c9ecbce9b9d86483a2f71c8f387c6bf85f2aeac
SHA256c81211bc2cf36175fcaa50f660d84e5f77a543866172253115f75feef913363d
SHA512549f95f2fa4f870a0d6185d4bd7752493175120eb7ee3be42b4283cb6ec556232396343be70e2701e37d2da805482ee3e3020f2e117bc73754c6e765640d37a2
-
Filesize
72KB
MD585bdbf268376a5093ff2b646285635f0
SHA1428991402d2a2b6fad5e97f14d92c12275c46c97
SHA2561c6aa0079c0708ae9b7b9757324e983fef66d1c0f422d27379d8b6274abb56f9
SHA512db1252f7ffd7e9ec625469a6455ff351f991946727e495074445dae3458cb4d9d71ebeddc665cc38aa6c21d6cb595f82c28073c095cd3273d32ccef5aecec098
-
Filesize
72KB
MD5f40778e430d1da9398862f5c429b9200
SHA184fc188574e1cdb764fd056accb6de2ba111b1f1
SHA256c01c2803acad5d5f78993ad09ee712a10eb0cfd124b912fe46d5c1625c66b179
SHA512fc65c60a32439c390e3f57ac5b6287c63659f24ea88310701eb6db37de07d864a77c7ad05f3726d5ad4b7e7df0d7c42561493ed8c3d7dd28f728fe3263693617
-
Filesize
72KB
MD5f40778e430d1da9398862f5c429b9200
SHA184fc188574e1cdb764fd056accb6de2ba111b1f1
SHA256c01c2803acad5d5f78993ad09ee712a10eb0cfd124b912fe46d5c1625c66b179
SHA512fc65c60a32439c390e3f57ac5b6287c63659f24ea88310701eb6db37de07d864a77c7ad05f3726d5ad4b7e7df0d7c42561493ed8c3d7dd28f728fe3263693617
-
Filesize
72KB
MD5aee774f927790dd488ef5e7968646e40
SHA145ccb5e4b707f56a88d6c3052fecda2303deb38e
SHA25609c3a4ec8b4f1d1be58cf640adf16c1ddeca3848a212d1144928114fa4814815
SHA5127a606b5ec42c316a26b1a1065229ac9833956a661971dd6b5d5b3b16f536c345145dbd1bbfa611b29f671cec2728fcd92e64ad755fdc04063e122eff5e995d2e
-
Filesize
72KB
MD585bdbf268376a5093ff2b646285635f0
SHA1428991402d2a2b6fad5e97f14d92c12275c46c97
SHA2561c6aa0079c0708ae9b7b9757324e983fef66d1c0f422d27379d8b6274abb56f9
SHA512db1252f7ffd7e9ec625469a6455ff351f991946727e495074445dae3458cb4d9d71ebeddc665cc38aa6c21d6cb595f82c28073c095cd3273d32ccef5aecec098
-
Filesize
72KB
MD585bdbf268376a5093ff2b646285635f0
SHA1428991402d2a2b6fad5e97f14d92c12275c46c97
SHA2561c6aa0079c0708ae9b7b9757324e983fef66d1c0f422d27379d8b6274abb56f9
SHA512db1252f7ffd7e9ec625469a6455ff351f991946727e495074445dae3458cb4d9d71ebeddc665cc38aa6c21d6cb595f82c28073c095cd3273d32ccef5aecec098
-
Filesize
72KB
MD5984d4ed1ccde77e38518957e217d7de8
SHA1cdb69fe978e77dad5fa3d67b1d266aa5426da06e
SHA2565e047b2902325d4581cc558fe78e90056eb6ecf130d24abc7699b1636a4de617
SHA5126a42c3b5c6d0b4762566e3164b6cd3ed5310cdcb6942741f576a35bec8a54665364c1e814dbda7ba870f62ec8db973bc9f866a8bb87813fbe9d1cbc23f0ecda9
-
Filesize
72KB
MD5984d4ed1ccde77e38518957e217d7de8
SHA1cdb69fe978e77dad5fa3d67b1d266aa5426da06e
SHA2565e047b2902325d4581cc558fe78e90056eb6ecf130d24abc7699b1636a4de617
SHA5126a42c3b5c6d0b4762566e3164b6cd3ed5310cdcb6942741f576a35bec8a54665364c1e814dbda7ba870f62ec8db973bc9f866a8bb87813fbe9d1cbc23f0ecda9
-
Filesize
72KB
MD5d0916934ec97d9448abaa54518578421
SHA1a4e39337fee2b4667acedf36d6ebff01f04c3b7b
SHA256aa6071436885bcc5e8c0bf72b0b8bb4e0588128444e9d2cf5acda5910102a3c7
SHA5128a29845879e64066d937fffdbe9dd3b7ffab803da5cb4d4995ab42727113cbbd5ce56a6f1a5aea1bae68b68ee1dee98d999f51ad2e9ca0d300a764a9bbdf6278
-
Filesize
72KB
MD5d0916934ec97d9448abaa54518578421
SHA1a4e39337fee2b4667acedf36d6ebff01f04c3b7b
SHA256aa6071436885bcc5e8c0bf72b0b8bb4e0588128444e9d2cf5acda5910102a3c7
SHA5128a29845879e64066d937fffdbe9dd3b7ffab803da5cb4d4995ab42727113cbbd5ce56a6f1a5aea1bae68b68ee1dee98d999f51ad2e9ca0d300a764a9bbdf6278
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
Filesize
72KB
MD5e6c14b4b5a5401a079f74104b3e3b139
SHA13018a7977a968523fe1de36fc643c334304628b0
SHA2565e46785bf9950f88f7100ee6418c1fcab91bf4c488828ce86b893e3e6d3ea121
SHA512407c14cf997cb24b9400ef06360acae358735218c3cb63df089c452fd0031e04e2cec5a5f38885508cd42d6c98749095b2423d38266f3e8bd3e1fad2179c4bf8
-
Filesize
72KB
MD5e6c14b4b5a5401a079f74104b3e3b139
SHA13018a7977a968523fe1de36fc643c334304628b0
SHA2565e46785bf9950f88f7100ee6418c1fcab91bf4c488828ce86b893e3e6d3ea121
SHA512407c14cf997cb24b9400ef06360acae358735218c3cb63df089c452fd0031e04e2cec5a5f38885508cd42d6c98749095b2423d38266f3e8bd3e1fad2179c4bf8
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
Filesize
72KB
MD5fea2f70ea5dd543126a849ecb87b389b
SHA1063422cca097178ad7c4a096aa6e8f77c7be9409
SHA25698ba16fc7e117ec4fe512e171de177b5b5b5c138ab3897643851b5a7d3d75e46
SHA5129c692c7756d5baf669b1d6f24e1de77845dcc93c263867b61cdd1117ff2c3a381bbd71aff79af41b9340fa5838ebd309150e919675bb0505c8164ae07b479dd1
-
Filesize
72KB
MD5fea2f70ea5dd543126a849ecb87b389b
SHA1063422cca097178ad7c4a096aa6e8f77c7be9409
SHA25698ba16fc7e117ec4fe512e171de177b5b5b5c138ab3897643851b5a7d3d75e46
SHA5129c692c7756d5baf669b1d6f24e1de77845dcc93c263867b61cdd1117ff2c3a381bbd71aff79af41b9340fa5838ebd309150e919675bb0505c8164ae07b479dd1
-
Filesize
72KB
MD5f844a53a1023d8485160cc3e498a805b
SHA1457b951621acbd205e537a393a7cebf4fbe51403
SHA256929d9a7df09514e6740c17e91aa1ddedccfa60a00e7329d8d95c8f02d6f6394d
SHA512cc79af7d85b42316a984889978e9e867563ed8f4820c524d064ed4d69631aec57515f12a98377fb48d0f90deca952eb43398d783fd796ca16b03d22b39a1f8bb
-
Filesize
72KB
MD5f844a53a1023d8485160cc3e498a805b
SHA1457b951621acbd205e537a393a7cebf4fbe51403
SHA256929d9a7df09514e6740c17e91aa1ddedccfa60a00e7329d8d95c8f02d6f6394d
SHA512cc79af7d85b42316a984889978e9e867563ed8f4820c524d064ed4d69631aec57515f12a98377fb48d0f90deca952eb43398d783fd796ca16b03d22b39a1f8bb
-
Filesize
72KB
MD5d1145c80841ef5bfd7ccbfd2d422d128
SHA10e83baa15e8e9979638cae98659a74c6a775b387
SHA256e0338444e3426384bfc2b7d03382931b7c0f187a67e689c0aacd53e1761aa826
SHA512825f7de0adcc96ec18f9ad8e59d0cca451f7d8bc7b3a1155c92e073fc9f2e83603d69c8c6cd2b4945cd670a5666fee20e83244dfc6a1d20c551e713ef7d9c549
-
Filesize
72KB
MD5d1145c80841ef5bfd7ccbfd2d422d128
SHA10e83baa15e8e9979638cae98659a74c6a775b387
SHA256e0338444e3426384bfc2b7d03382931b7c0f187a67e689c0aacd53e1761aa826
SHA512825f7de0adcc96ec18f9ad8e59d0cca451f7d8bc7b3a1155c92e073fc9f2e83603d69c8c6cd2b4945cd670a5666fee20e83244dfc6a1d20c551e713ef7d9c549
-
Filesize
72KB
MD50be5c30cb2a60277fdea3c096e182b8e
SHA10669c99c7139247f82687f994e72330e0a360ecb
SHA256c57d533649accebb4aff3636b427ad923c23948c4cb093a2688bb8d67eedbe0f
SHA51295e9d1daf0ca16a2f612b24108a86f43a80502c69d1d271d2297b78a07a4fe210ac4fa25da42525e4b06a3d0132b1ef63075c968681ffb1e2afe54774f8a392d
-
Filesize
72KB
MD50be5c30cb2a60277fdea3c096e182b8e
SHA10669c99c7139247f82687f994e72330e0a360ecb
SHA256c57d533649accebb4aff3636b427ad923c23948c4cb093a2688bb8d67eedbe0f
SHA51295e9d1daf0ca16a2f612b24108a86f43a80502c69d1d271d2297b78a07a4fe210ac4fa25da42525e4b06a3d0132b1ef63075c968681ffb1e2afe54774f8a392d
-
Filesize
72KB
MD5e8c7a600ea463de3ad904e41303386d1
SHA12c9ecbce9b9d86483a2f71c8f387c6bf85f2aeac
SHA256c81211bc2cf36175fcaa50f660d84e5f77a543866172253115f75feef913363d
SHA512549f95f2fa4f870a0d6185d4bd7752493175120eb7ee3be42b4283cb6ec556232396343be70e2701e37d2da805482ee3e3020f2e117bc73754c6e765640d37a2
-
Filesize
72KB
MD5e8c7a600ea463de3ad904e41303386d1
SHA12c9ecbce9b9d86483a2f71c8f387c6bf85f2aeac
SHA256c81211bc2cf36175fcaa50f660d84e5f77a543866172253115f75feef913363d
SHA512549f95f2fa4f870a0d6185d4bd7752493175120eb7ee3be42b4283cb6ec556232396343be70e2701e37d2da805482ee3e3020f2e117bc73754c6e765640d37a2
-
Filesize
72KB
MD585bdbf268376a5093ff2b646285635f0
SHA1428991402d2a2b6fad5e97f14d92c12275c46c97
SHA2561c6aa0079c0708ae9b7b9757324e983fef66d1c0f422d27379d8b6274abb56f9
SHA512db1252f7ffd7e9ec625469a6455ff351f991946727e495074445dae3458cb4d9d71ebeddc665cc38aa6c21d6cb595f82c28073c095cd3273d32ccef5aecec098
-
Filesize
72KB
MD585bdbf268376a5093ff2b646285635f0
SHA1428991402d2a2b6fad5e97f14d92c12275c46c97
SHA2561c6aa0079c0708ae9b7b9757324e983fef66d1c0f422d27379d8b6274abb56f9
SHA512db1252f7ffd7e9ec625469a6455ff351f991946727e495074445dae3458cb4d9d71ebeddc665cc38aa6c21d6cb595f82c28073c095cd3273d32ccef5aecec098
-
Filesize
72KB
MD5f40778e430d1da9398862f5c429b9200
SHA184fc188574e1cdb764fd056accb6de2ba111b1f1
SHA256c01c2803acad5d5f78993ad09ee712a10eb0cfd124b912fe46d5c1625c66b179
SHA512fc65c60a32439c390e3f57ac5b6287c63659f24ea88310701eb6db37de07d864a77c7ad05f3726d5ad4b7e7df0d7c42561493ed8c3d7dd28f728fe3263693617
-
Filesize
72KB
MD5f40778e430d1da9398862f5c429b9200
SHA184fc188574e1cdb764fd056accb6de2ba111b1f1
SHA256c01c2803acad5d5f78993ad09ee712a10eb0cfd124b912fe46d5c1625c66b179
SHA512fc65c60a32439c390e3f57ac5b6287c63659f24ea88310701eb6db37de07d864a77c7ad05f3726d5ad4b7e7df0d7c42561493ed8c3d7dd28f728fe3263693617
-
Filesize
72KB
MD5aee774f927790dd488ef5e7968646e40
SHA145ccb5e4b707f56a88d6c3052fecda2303deb38e
SHA25609c3a4ec8b4f1d1be58cf640adf16c1ddeca3848a212d1144928114fa4814815
SHA5127a606b5ec42c316a26b1a1065229ac9833956a661971dd6b5d5b3b16f536c345145dbd1bbfa611b29f671cec2728fcd92e64ad755fdc04063e122eff5e995d2e
-
Filesize
72KB
MD5aee774f927790dd488ef5e7968646e40
SHA145ccb5e4b707f56a88d6c3052fecda2303deb38e
SHA25609c3a4ec8b4f1d1be58cf640adf16c1ddeca3848a212d1144928114fa4814815
SHA5127a606b5ec42c316a26b1a1065229ac9833956a661971dd6b5d5b3b16f536c345145dbd1bbfa611b29f671cec2728fcd92e64ad755fdc04063e122eff5e995d2e
-
Filesize
72KB
MD585bdbf268376a5093ff2b646285635f0
SHA1428991402d2a2b6fad5e97f14d92c12275c46c97
SHA2561c6aa0079c0708ae9b7b9757324e983fef66d1c0f422d27379d8b6274abb56f9
SHA512db1252f7ffd7e9ec625469a6455ff351f991946727e495074445dae3458cb4d9d71ebeddc665cc38aa6c21d6cb595f82c28073c095cd3273d32ccef5aecec098
-
Filesize
72KB
MD585bdbf268376a5093ff2b646285635f0
SHA1428991402d2a2b6fad5e97f14d92c12275c46c97
SHA2561c6aa0079c0708ae9b7b9757324e983fef66d1c0f422d27379d8b6274abb56f9
SHA512db1252f7ffd7e9ec625469a6455ff351f991946727e495074445dae3458cb4d9d71ebeddc665cc38aa6c21d6cb595f82c28073c095cd3273d32ccef5aecec098
-
Filesize
72KB
MD5aee774f927790dd488ef5e7968646e40
SHA145ccb5e4b707f56a88d6c3052fecda2303deb38e
SHA25609c3a4ec8b4f1d1be58cf640adf16c1ddeca3848a212d1144928114fa4814815
SHA5127a606b5ec42c316a26b1a1065229ac9833956a661971dd6b5d5b3b16f536c345145dbd1bbfa611b29f671cec2728fcd92e64ad755fdc04063e122eff5e995d2e
-
Filesize
72KB
MD5984d4ed1ccde77e38518957e217d7de8
SHA1cdb69fe978e77dad5fa3d67b1d266aa5426da06e
SHA2565e047b2902325d4581cc558fe78e90056eb6ecf130d24abc7699b1636a4de617
SHA5126a42c3b5c6d0b4762566e3164b6cd3ed5310cdcb6942741f576a35bec8a54665364c1e814dbda7ba870f62ec8db973bc9f866a8bb87813fbe9d1cbc23f0ecda9
-
Filesize
72KB
MD5984d4ed1ccde77e38518957e217d7de8
SHA1cdb69fe978e77dad5fa3d67b1d266aa5426da06e
SHA2565e047b2902325d4581cc558fe78e90056eb6ecf130d24abc7699b1636a4de617
SHA5126a42c3b5c6d0b4762566e3164b6cd3ed5310cdcb6942741f576a35bec8a54665364c1e814dbda7ba870f62ec8db973bc9f866a8bb87813fbe9d1cbc23f0ecda9
-
Filesize
72KB
MD5d0916934ec97d9448abaa54518578421
SHA1a4e39337fee2b4667acedf36d6ebff01f04c3b7b
SHA256aa6071436885bcc5e8c0bf72b0b8bb4e0588128444e9d2cf5acda5910102a3c7
SHA5128a29845879e64066d937fffdbe9dd3b7ffab803da5cb4d4995ab42727113cbbd5ce56a6f1a5aea1bae68b68ee1dee98d999f51ad2e9ca0d300a764a9bbdf6278
-
Filesize
72KB
MD5d0916934ec97d9448abaa54518578421
SHA1a4e39337fee2b4667acedf36d6ebff01f04c3b7b
SHA256aa6071436885bcc5e8c0bf72b0b8bb4e0588128444e9d2cf5acda5910102a3c7
SHA5128a29845879e64066d937fffdbe9dd3b7ffab803da5cb4d4995ab42727113cbbd5ce56a6f1a5aea1bae68b68ee1dee98d999f51ad2e9ca0d300a764a9bbdf6278
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
Filesize
72KB
MD5e6c14b4b5a5401a079f74104b3e3b139
SHA13018a7977a968523fe1de36fc643c334304628b0
SHA2565e46785bf9950f88f7100ee6418c1fcab91bf4c488828ce86b893e3e6d3ea121
SHA512407c14cf997cb24b9400ef06360acae358735218c3cb63df089c452fd0031e04e2cec5a5f38885508cd42d6c98749095b2423d38266f3e8bd3e1fad2179c4bf8
-
Filesize
72KB
MD5e6c14b4b5a5401a079f74104b3e3b139
SHA13018a7977a968523fe1de36fc643c334304628b0
SHA2565e46785bf9950f88f7100ee6418c1fcab91bf4c488828ce86b893e3e6d3ea121
SHA512407c14cf997cb24b9400ef06360acae358735218c3cb63df089c452fd0031e04e2cec5a5f38885508cd42d6c98749095b2423d38266f3e8bd3e1fad2179c4bf8
-
Filesize
72KB
MD5e6c14b4b5a5401a079f74104b3e3b139
SHA13018a7977a968523fe1de36fc643c334304628b0
SHA2565e46785bf9950f88f7100ee6418c1fcab91bf4c488828ce86b893e3e6d3ea121
SHA512407c14cf997cb24b9400ef06360acae358735218c3cb63df089c452fd0031e04e2cec5a5f38885508cd42d6c98749095b2423d38266f3e8bd3e1fad2179c4bf8
-
Filesize
72KB
MD5e6c14b4b5a5401a079f74104b3e3b139
SHA13018a7977a968523fe1de36fc643c334304628b0
SHA2565e46785bf9950f88f7100ee6418c1fcab91bf4c488828ce86b893e3e6d3ea121
SHA512407c14cf997cb24b9400ef06360acae358735218c3cb63df089c452fd0031e04e2cec5a5f38885508cd42d6c98749095b2423d38266f3e8bd3e1fad2179c4bf8
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD5f56542873b18f347fa54abd2580949bc
SHA150607fe329091fdc1e076fc9526bff10887d7394
SHA256e3ae39570c95853bc30a008c063c3a79c467eb5ed0d4f86aa05138ee76c86053
SHA5127978bca1a29828739295ab08b6df18bbdf9935187e71033d2d4a3e13090c39878ab923336401e58321420d39b01199cc0a674717fd6f8481a823f91c796237f6
-
Filesize
72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671
-
Filesize
72KB
MD59492bfd9be0c82515ed767b9773d49a2
SHA12462c0797924a1d6e1d023b9c784cc81f26e218a
SHA2568e64e6a8a85c726554c5f06c6ab8a61ce9ef4c2f37b2209f942c75a95c17fabb
SHA51264fa6818a0d19a7feb45c28d34a953801a787e9de56e2bc2d855451a5b3a40ea92e507931f5238e1246e5501cc660e3999e76eb46bef503c26c6e62817cf7671