Analysis
-
max time kernel
70s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe
Resource
win10v2004-20220812-en
General
-
Target
8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe
-
Size
72KB
-
MD5
82133a3c0a1106d89f5f463c216caf2d
-
SHA1
bbd22b9ffeb6318d396d6596544549d8ef2e5868
-
SHA256
8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf
-
SHA512
24de571cd18f040c830e446e5c51248d89a4f056e8cbf6bc67c14a5428d1b6b5acceb77ded1b232dc1258d0a68668db6257828e0a7a298fe5045454c9215df3e
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2M:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrQ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 964 backup.exe 980 backup.exe 1360 backup.exe 1232 backup.exe 2044 backup.exe 888 backup.exe 2016 backup.exe 1504 backup.exe 1560 backup.exe 808 backup.exe 1892 backup.exe 1752 backup.exe 1800 backup.exe 1464 backup.exe 1940 backup.exe 1720 backup.exe 876 backup.exe 1724 backup.exe 980 backup.exe 1344 data.exe 1232 backup.exe 1912 backup.exe 708 backup.exe 1172 backup.exe 1020 backup.exe 2016 backup.exe 1584 backup.exe 1904 backup.exe 1460 backup.exe 296 backup.exe 1168 backup.exe 1700 backup.exe 828 update.exe 1260 backup.exe 1628 backup.exe 1640 backup.exe 432 backup.exe 1480 backup.exe 1664 backup.exe 1108 backup.exe 968 backup.exe 944 backup.exe 1884 backup.exe 1992 backup.exe 1988 backup.exe 1224 backup.exe 1912 backup.exe 2028 backup.exe 1232 backup.exe 1372 backup.exe 268 backup.exe 1712 backup.exe 1584 backup.exe 1608 backup.exe 2004 backup.exe 1436 backup.exe 1864 backup.exe 856 backup.exe 1636 backup.exe 1228 backup.exe 1260 backup.exe 2012 backup.exe 1800 backup.exe 1640 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 1504 backup.exe 1504 backup.exe 1560 backup.exe 1560 backup.exe 1504 backup.exe 1504 backup.exe 1892 backup.exe 1892 backup.exe 1752 backup.exe 1752 backup.exe 1892 backup.exe 1892 backup.exe 1464 backup.exe 1464 backup.exe 1940 backup.exe 1940 backup.exe 1940 backup.exe 1940 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 876 backup.exe 1460 backup.exe 1460 backup.exe 1460 backup.exe 1460 backup.exe 1460 backup.exe 1460 backup.exe 1460 backup.exe 828 update.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\update.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 964 backup.exe 980 backup.exe 1360 backup.exe 1232 backup.exe 2044 backup.exe 888 backup.exe 2016 backup.exe 1504 backup.exe 1560 backup.exe 808 backup.exe 1892 backup.exe 1752 backup.exe 1800 backup.exe 1464 backup.exe 1940 backup.exe 1720 backup.exe 876 backup.exe 1724 backup.exe 980 backup.exe 1344 data.exe 1232 backup.exe 1912 backup.exe 708 backup.exe 1172 backup.exe 1020 backup.exe 2016 backup.exe 1584 backup.exe 1904 backup.exe 1460 backup.exe 296 backup.exe 1168 backup.exe 1700 backup.exe 828 update.exe 1260 backup.exe 1628 backup.exe 1640 backup.exe 432 backup.exe 1480 backup.exe 1664 backup.exe 1108 backup.exe 968 backup.exe 944 backup.exe 1988 backup.exe 1884 backup.exe 1992 backup.exe 1224 backup.exe 1912 backup.exe 1232 backup.exe 2028 backup.exe 1372 backup.exe 268 backup.exe 1712 backup.exe 1584 backup.exe 2004 backup.exe 856 backup.exe 1436 backup.exe 1864 backup.exe 1636 backup.exe 1260 backup.exe 1228 backup.exe 1800 backup.exe 432 backup.exe 1640 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 964 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 28 PID 1960 wrote to memory of 964 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 28 PID 1960 wrote to memory of 964 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 28 PID 1960 wrote to memory of 964 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 28 PID 1960 wrote to memory of 980 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 29 PID 1960 wrote to memory of 980 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 29 PID 1960 wrote to memory of 980 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 29 PID 1960 wrote to memory of 980 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 29 PID 1960 wrote to memory of 1360 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 30 PID 1960 wrote to memory of 1360 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 30 PID 1960 wrote to memory of 1360 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 30 PID 1960 wrote to memory of 1360 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 30 PID 1960 wrote to memory of 1232 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 31 PID 1960 wrote to memory of 1232 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 31 PID 1960 wrote to memory of 1232 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 31 PID 1960 wrote to memory of 1232 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 31 PID 1960 wrote to memory of 2044 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 32 PID 1960 wrote to memory of 2044 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 32 PID 1960 wrote to memory of 2044 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 32 PID 1960 wrote to memory of 2044 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 32 PID 1960 wrote to memory of 888 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 33 PID 1960 wrote to memory of 888 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 33 PID 1960 wrote to memory of 888 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 33 PID 1960 wrote to memory of 888 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 33 PID 1960 wrote to memory of 2016 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 34 PID 1960 wrote to memory of 2016 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 34 PID 1960 wrote to memory of 2016 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 34 PID 1960 wrote to memory of 2016 1960 8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe 34 PID 964 wrote to memory of 1504 964 backup.exe 35 PID 964 wrote to memory of 1504 964 backup.exe 35 PID 964 wrote to memory of 1504 964 backup.exe 35 PID 964 wrote to memory of 1504 964 backup.exe 35 PID 1504 wrote to memory of 1560 1504 backup.exe 36 PID 1504 wrote to memory of 1560 1504 backup.exe 36 PID 1504 wrote to memory of 1560 1504 backup.exe 36 PID 1504 wrote to memory of 1560 1504 backup.exe 36 PID 1560 wrote to memory of 808 1560 backup.exe 37 PID 1560 wrote to memory of 808 1560 backup.exe 37 PID 1560 wrote to memory of 808 1560 backup.exe 37 PID 1560 wrote to memory of 808 1560 backup.exe 37 PID 1504 wrote to memory of 1892 1504 backup.exe 38 PID 1504 wrote to memory of 1892 1504 backup.exe 38 PID 1504 wrote to memory of 1892 1504 backup.exe 38 PID 1504 wrote to memory of 1892 1504 backup.exe 38 PID 1892 wrote to memory of 1752 1892 backup.exe 39 PID 1892 wrote to memory of 1752 1892 backup.exe 39 PID 1892 wrote to memory of 1752 1892 backup.exe 39 PID 1892 wrote to memory of 1752 1892 backup.exe 39 PID 1752 wrote to memory of 1800 1752 backup.exe 40 PID 1752 wrote to memory of 1800 1752 backup.exe 40 PID 1752 wrote to memory of 1800 1752 backup.exe 40 PID 1752 wrote to memory of 1800 1752 backup.exe 40 PID 1892 wrote to memory of 1464 1892 backup.exe 41 PID 1892 wrote to memory of 1464 1892 backup.exe 41 PID 1892 wrote to memory of 1464 1892 backup.exe 41 PID 1892 wrote to memory of 1464 1892 backup.exe 41 PID 1464 wrote to memory of 1940 1464 backup.exe 42 PID 1464 wrote to memory of 1940 1464 backup.exe 42 PID 1464 wrote to memory of 1940 1464 backup.exe 42 PID 1464 wrote to memory of 1940 1464 backup.exe 42 PID 1940 wrote to memory of 1720 1940 backup.exe 43 PID 1940 wrote to memory of 1720 1940 backup.exe 43 PID 1940 wrote to memory of 1720 1940 backup.exe 43 PID 1940 wrote to memory of 1720 1940 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe"C:\Users\Admin\AppData\Local\Temp\8edc32079d42813bea7febc16d09103ab43d43ea8e806ca4ac8134966fafb3bf.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\1428108397\backup.exeC:\Users\Admin\AppData\Local\Temp\1428108397\backup.exe C:\Users\Admin\AppData\Local\Temp\1428108397\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:964 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1504 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1560 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1892 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1464 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1940 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:876 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:980
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1344
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1232
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1172
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1904
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1460 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:296
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1168
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:828
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1260
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:432
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1480
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1664
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1884
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1232
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:2016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵PID:1876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵PID:2116
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵PID:2340
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:1012
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:1752
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:2148
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:2412
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
PID:2012 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:2028
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:240
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1992
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:384
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:2124
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2324
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2508
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2004
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1864 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1384
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:296
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:592
-
-
C:\Program Files\Common Files\System\es-ES\System Restore.exe"C:\Program Files\Common Files\System\es-ES\System Restore.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1120
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:2140
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:2316
-
-
C:\Program Files\Common Files\System\ja-JP\System Restore.exe"C:\Program Files\Common Files\System\ja-JP\System Restore.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:2500
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1372
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
PID:1608
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1356
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1344
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1232
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:812
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:520
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:2004
-
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:1636
-
-
-
-
C:\Program Files\Internet Explorer\data.exe"C:\Program Files\Internet Explorer\data.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
PID:1728 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:616
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:1564
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:652
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:2184
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:2300
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:2468
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1372
-
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵PID:1680
-
C:\Program Files\Java\jdk1.7.0_80\bin\update.exe"C:\Program Files\Java\jdk1.7.0_80\bin\update.exe" C:\Program Files\Java\jdk1.7.0_80\bin\7⤵PID:1912
-
-
C:\Program Files\Java\jdk1.7.0_80\db\data.exe"C:\Program Files\Java\jdk1.7.0_80\db\data.exe" C:\Program Files\Java\jdk1.7.0_80\db\7⤵PID:884
-
-
C:\Program Files\Java\jdk1.7.0_80\include\backup.exe"C:\Program Files\Java\jdk1.7.0_80\include\backup.exe" C:\Program Files\Java\jdk1.7.0_80\include\7⤵PID:2292
-
-
C:\Program Files\Java\jdk1.7.0_80\jre\backup.exe"C:\Program Files\Java\jdk1.7.0_80\jre\backup.exe" C:\Program Files\Java\jdk1.7.0_80\jre\7⤵PID:2492
-
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:2000
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1716
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1316
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2156
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2332
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:2484
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1224 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1912 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1584 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:856
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1636
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1228
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1696
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1412
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1512
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵PID:564
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:108
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:2108
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:2348
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:2476
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:432 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:1152
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵PID:568
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1476
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:1172
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:2196
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵PID:2356
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:980
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵PID:1956
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1724
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1612
-
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵PID:832
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:1224
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe"C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵PID:2204
-
-
C:\Program Files (x86)\Internet Explorer\fr-FR\System Restore.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\System Restore.exe" C:\Program Files (x86)\Internet Explorer\fr-FR\6⤵PID:2364
-
-
C:\Program Files (x86)\Internet Explorer\it-IT\backup.exe"C:\Program Files (x86)\Internet Explorer\it-IT\backup.exe" C:\Program Files (x86)\Internet Explorer\it-IT\6⤵PID:2516
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\update.exe"C:\Program Files (x86)\Microsoft Analysis Services\update.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:2524
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:1920
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:540
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
PID:608 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:824
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1480
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1468
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:2100
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:2256
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD523d4edf057550c4a7cf7bf93941d04b7
SHA19533786671aa3bdcfba1a34b2394fc0d40354898
SHA2560ae42cf5dcab42accfc406f05f7df304df6fad0c11c4d1aea1221c934520c464
SHA51246372a891d5521f67a66666928bf10fd7298f6c44a33ef8ea29538f98e05f105a194e4e54aa826e2f63343c07627bb89d585d81b6d8e1002bed0d3b82de6711e
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD592c55a4926f0ba59cb192da8a32a5359
SHA1f6e20e58ae9bb2af742fc4ab0752b5a53758dacc
SHA256e339329353f9557b1b7a6737b81ad81d65249ca4985de5ef8bbc0219b83b30a0
SHA51223755309e1585007e83c636f83cca30013df9b2441d419b2359cfef3c314383544a5b6d192cc2e7f50b3370f9ab7afef35d881df4cc8173a35b6a930e0e79d61
-
Filesize
72KB
MD523d4edf057550c4a7cf7bf93941d04b7
SHA19533786671aa3bdcfba1a34b2394fc0d40354898
SHA2560ae42cf5dcab42accfc406f05f7df304df6fad0c11c4d1aea1221c934520c464
SHA51246372a891d5521f67a66666928bf10fd7298f6c44a33ef8ea29538f98e05f105a194e4e54aa826e2f63343c07627bb89d585d81b6d8e1002bed0d3b82de6711e
-
Filesize
72KB
MD523d4edf057550c4a7cf7bf93941d04b7
SHA19533786671aa3bdcfba1a34b2394fc0d40354898
SHA2560ae42cf5dcab42accfc406f05f7df304df6fad0c11c4d1aea1221c934520c464
SHA51246372a891d5521f67a66666928bf10fd7298f6c44a33ef8ea29538f98e05f105a194e4e54aa826e2f63343c07627bb89d585d81b6d8e1002bed0d3b82de6711e
-
Filesize
72KB
MD5c42835f0552c4e9769d93af3e56f1b91
SHA1b4a3077b1b9c2cd5fc2ce19af05b7e70a0d39b61
SHA256c51409b4ae0605a1b68b963829004f36253de46811fc6650df2e0b6988b42bf0
SHA5128bd486b325248b31d5be8be3b1eb90caddbaaac3ea0349b11f623e5afdb7b3ab2f015b9a216aedbf71199d66f5b67569a8dac42b9b264dbb0a864e527406e011
-
Filesize
72KB
MD52601f255c36444906ed559fd4c89f738
SHA1ed4e5b1f6de309f4c96f44115a5e815d68057101
SHA256adc61182ddf9532bc0ad953f4a132910bd56bb5120cd9e1f266780d335574f87
SHA512cac673abe81804eda4678127fd991a0ea238f9e3a82c18447c9b46243e29bf8ed0b7cab0acf3e8f67a31ec650f58ddf27aa6bfa6eb77f0fa2353fb644f4c6e69
-
Filesize
72KB
MD52601f255c36444906ed559fd4c89f738
SHA1ed4e5b1f6de309f4c96f44115a5e815d68057101
SHA256adc61182ddf9532bc0ad953f4a132910bd56bb5120cd9e1f266780d335574f87
SHA512cac673abe81804eda4678127fd991a0ea238f9e3a82c18447c9b46243e29bf8ed0b7cab0acf3e8f67a31ec650f58ddf27aa6bfa6eb77f0fa2353fb644f4c6e69
-
Filesize
72KB
MD5d9e8820e67347629f7c6507e22e34099
SHA1daeff25abd4682ac328744adaa390de3d3ad7494
SHA256d8116bf7032f51013ffa4209533d9805fea385c3abf705e84c4c119c363c5c30
SHA512a37bc7e14d87c551764f78f9c172a49598a2a36b19ea072066279aedc6e966f389d4edfbf92ee030fc4a7e1d4075f713679965cc23e164eee56593f2626860d1
-
Filesize
72KB
MD5c42835f0552c4e9769d93af3e56f1b91
SHA1b4a3077b1b9c2cd5fc2ce19af05b7e70a0d39b61
SHA256c51409b4ae0605a1b68b963829004f36253de46811fc6650df2e0b6988b42bf0
SHA5128bd486b325248b31d5be8be3b1eb90caddbaaac3ea0349b11f623e5afdb7b3ab2f015b9a216aedbf71199d66f5b67569a8dac42b9b264dbb0a864e527406e011
-
Filesize
72KB
MD5c42835f0552c4e9769d93af3e56f1b91
SHA1b4a3077b1b9c2cd5fc2ce19af05b7e70a0d39b61
SHA256c51409b4ae0605a1b68b963829004f36253de46811fc6650df2e0b6988b42bf0
SHA5128bd486b325248b31d5be8be3b1eb90caddbaaac3ea0349b11f623e5afdb7b3ab2f015b9a216aedbf71199d66f5b67569a8dac42b9b264dbb0a864e527406e011
-
Filesize
72KB
MD5d9e8820e67347629f7c6507e22e34099
SHA1daeff25abd4682ac328744adaa390de3d3ad7494
SHA256d8116bf7032f51013ffa4209533d9805fea385c3abf705e84c4c119c363c5c30
SHA512a37bc7e14d87c551764f78f9c172a49598a2a36b19ea072066279aedc6e966f389d4edfbf92ee030fc4a7e1d4075f713679965cc23e164eee56593f2626860d1
-
Filesize
72KB
MD554a28645aa04191686af0a58e7311b8e
SHA123b2936514d64e76dfe195a9a76161ba33ee760f
SHA2561755bc43887be3a2b2311aa2470d1e5f1eeb5cfa2083698b5677d35638f9cf3d
SHA5129d7758cfceaf3a040586416ca6d677604edd766a8ddcaf402da3f38e6f175f4a558a42c4eda1a88329b2ab0924cf5f3ea33f0b17502e9c6191d0a34bdf75c8b1
-
Filesize
72KB
MD554a28645aa04191686af0a58e7311b8e
SHA123b2936514d64e76dfe195a9a76161ba33ee760f
SHA2561755bc43887be3a2b2311aa2470d1e5f1eeb5cfa2083698b5677d35638f9cf3d
SHA5129d7758cfceaf3a040586416ca6d677604edd766a8ddcaf402da3f38e6f175f4a558a42c4eda1a88329b2ab0924cf5f3ea33f0b17502e9c6191d0a34bdf75c8b1
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD53e19c74eb594c4cdf3e65232a058ba9b
SHA1d2f426137f43682e19510703512781d534d137ab
SHA256170c31a48cdfe44c487d2456ec4bb1b09560f8310d567ff50ade0fb2ab7f9e84
SHA512b4206dfa0c8264cfe024731ee284ddc00f6359b7734492fad370b08c741768ee393aca3a7e267f8611f9e8655cf2f590b582e8eec6e04573ebf0ee57bafe576a
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD53e19c74eb594c4cdf3e65232a058ba9b
SHA1d2f426137f43682e19510703512781d534d137ab
SHA256170c31a48cdfe44c487d2456ec4bb1b09560f8310d567ff50ade0fb2ab7f9e84
SHA512b4206dfa0c8264cfe024731ee284ddc00f6359b7734492fad370b08c741768ee393aca3a7e267f8611f9e8655cf2f590b582e8eec6e04573ebf0ee57bafe576a
-
Filesize
72KB
MD5f2db8a78fda9536d25c1b4574542b87e
SHA100b83a6c2658ea78e26ae03d53f885ad52ada60e
SHA2567c1c5a9354947f4f49bfc6f30d2083d31e1c8f2ae473b1c81768b3df96aa4be2
SHA51269d0b1ca115aa0a9890fd3aafb67d7caaa423f34e4cc582e8831c0e44e4d79932ddf07b2833f5fdb22e1c3d622d7f19e64a7564b90a3798435e3910478de24d7
-
Filesize
72KB
MD5f2db8a78fda9536d25c1b4574542b87e
SHA100b83a6c2658ea78e26ae03d53f885ad52ada60e
SHA2567c1c5a9354947f4f49bfc6f30d2083d31e1c8f2ae473b1c81768b3df96aa4be2
SHA51269d0b1ca115aa0a9890fd3aafb67d7caaa423f34e4cc582e8831c0e44e4d79932ddf07b2833f5fdb22e1c3d622d7f19e64a7564b90a3798435e3910478de24d7
-
Filesize
72KB
MD523d4edf057550c4a7cf7bf93941d04b7
SHA19533786671aa3bdcfba1a34b2394fc0d40354898
SHA2560ae42cf5dcab42accfc406f05f7df304df6fad0c11c4d1aea1221c934520c464
SHA51246372a891d5521f67a66666928bf10fd7298f6c44a33ef8ea29538f98e05f105a194e4e54aa826e2f63343c07627bb89d585d81b6d8e1002bed0d3b82de6711e
-
Filesize
72KB
MD523d4edf057550c4a7cf7bf93941d04b7
SHA19533786671aa3bdcfba1a34b2394fc0d40354898
SHA2560ae42cf5dcab42accfc406f05f7df304df6fad0c11c4d1aea1221c934520c464
SHA51246372a891d5521f67a66666928bf10fd7298f6c44a33ef8ea29538f98e05f105a194e4e54aa826e2f63343c07627bb89d585d81b6d8e1002bed0d3b82de6711e
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD592c55a4926f0ba59cb192da8a32a5359
SHA1f6e20e58ae9bb2af742fc4ab0752b5a53758dacc
SHA256e339329353f9557b1b7a6737b81ad81d65249ca4985de5ef8bbc0219b83b30a0
SHA51223755309e1585007e83c636f83cca30013df9b2441d419b2359cfef3c314383544a5b6d192cc2e7f50b3370f9ab7afef35d881df4cc8173a35b6a930e0e79d61
-
Filesize
72KB
MD592c55a4926f0ba59cb192da8a32a5359
SHA1f6e20e58ae9bb2af742fc4ab0752b5a53758dacc
SHA256e339329353f9557b1b7a6737b81ad81d65249ca4985de5ef8bbc0219b83b30a0
SHA51223755309e1585007e83c636f83cca30013df9b2441d419b2359cfef3c314383544a5b6d192cc2e7f50b3370f9ab7afef35d881df4cc8173a35b6a930e0e79d61
-
Filesize
72KB
MD523d4edf057550c4a7cf7bf93941d04b7
SHA19533786671aa3bdcfba1a34b2394fc0d40354898
SHA2560ae42cf5dcab42accfc406f05f7df304df6fad0c11c4d1aea1221c934520c464
SHA51246372a891d5521f67a66666928bf10fd7298f6c44a33ef8ea29538f98e05f105a194e4e54aa826e2f63343c07627bb89d585d81b6d8e1002bed0d3b82de6711e
-
Filesize
72KB
MD523d4edf057550c4a7cf7bf93941d04b7
SHA19533786671aa3bdcfba1a34b2394fc0d40354898
SHA2560ae42cf5dcab42accfc406f05f7df304df6fad0c11c4d1aea1221c934520c464
SHA51246372a891d5521f67a66666928bf10fd7298f6c44a33ef8ea29538f98e05f105a194e4e54aa826e2f63343c07627bb89d585d81b6d8e1002bed0d3b82de6711e
-
Filesize
72KB
MD5c42835f0552c4e9769d93af3e56f1b91
SHA1b4a3077b1b9c2cd5fc2ce19af05b7e70a0d39b61
SHA256c51409b4ae0605a1b68b963829004f36253de46811fc6650df2e0b6988b42bf0
SHA5128bd486b325248b31d5be8be3b1eb90caddbaaac3ea0349b11f623e5afdb7b3ab2f015b9a216aedbf71199d66f5b67569a8dac42b9b264dbb0a864e527406e011
-
Filesize
72KB
MD5c42835f0552c4e9769d93af3e56f1b91
SHA1b4a3077b1b9c2cd5fc2ce19af05b7e70a0d39b61
SHA256c51409b4ae0605a1b68b963829004f36253de46811fc6650df2e0b6988b42bf0
SHA5128bd486b325248b31d5be8be3b1eb90caddbaaac3ea0349b11f623e5afdb7b3ab2f015b9a216aedbf71199d66f5b67569a8dac42b9b264dbb0a864e527406e011
-
Filesize
72KB
MD52601f255c36444906ed559fd4c89f738
SHA1ed4e5b1f6de309f4c96f44115a5e815d68057101
SHA256adc61182ddf9532bc0ad953f4a132910bd56bb5120cd9e1f266780d335574f87
SHA512cac673abe81804eda4678127fd991a0ea238f9e3a82c18447c9b46243e29bf8ed0b7cab0acf3e8f67a31ec650f58ddf27aa6bfa6eb77f0fa2353fb644f4c6e69
-
Filesize
72KB
MD52601f255c36444906ed559fd4c89f738
SHA1ed4e5b1f6de309f4c96f44115a5e815d68057101
SHA256adc61182ddf9532bc0ad953f4a132910bd56bb5120cd9e1f266780d335574f87
SHA512cac673abe81804eda4678127fd991a0ea238f9e3a82c18447c9b46243e29bf8ed0b7cab0acf3e8f67a31ec650f58ddf27aa6bfa6eb77f0fa2353fb644f4c6e69
-
Filesize
72KB
MD5d9e8820e67347629f7c6507e22e34099
SHA1daeff25abd4682ac328744adaa390de3d3ad7494
SHA256d8116bf7032f51013ffa4209533d9805fea385c3abf705e84c4c119c363c5c30
SHA512a37bc7e14d87c551764f78f9c172a49598a2a36b19ea072066279aedc6e966f389d4edfbf92ee030fc4a7e1d4075f713679965cc23e164eee56593f2626860d1
-
Filesize
72KB
MD5d9e8820e67347629f7c6507e22e34099
SHA1daeff25abd4682ac328744adaa390de3d3ad7494
SHA256d8116bf7032f51013ffa4209533d9805fea385c3abf705e84c4c119c363c5c30
SHA512a37bc7e14d87c551764f78f9c172a49598a2a36b19ea072066279aedc6e966f389d4edfbf92ee030fc4a7e1d4075f713679965cc23e164eee56593f2626860d1
-
Filesize
72KB
MD5c42835f0552c4e9769d93af3e56f1b91
SHA1b4a3077b1b9c2cd5fc2ce19af05b7e70a0d39b61
SHA256c51409b4ae0605a1b68b963829004f36253de46811fc6650df2e0b6988b42bf0
SHA5128bd486b325248b31d5be8be3b1eb90caddbaaac3ea0349b11f623e5afdb7b3ab2f015b9a216aedbf71199d66f5b67569a8dac42b9b264dbb0a864e527406e011
-
Filesize
72KB
MD5c42835f0552c4e9769d93af3e56f1b91
SHA1b4a3077b1b9c2cd5fc2ce19af05b7e70a0d39b61
SHA256c51409b4ae0605a1b68b963829004f36253de46811fc6650df2e0b6988b42bf0
SHA5128bd486b325248b31d5be8be3b1eb90caddbaaac3ea0349b11f623e5afdb7b3ab2f015b9a216aedbf71199d66f5b67569a8dac42b9b264dbb0a864e527406e011
-
Filesize
72KB
MD5d9e8820e67347629f7c6507e22e34099
SHA1daeff25abd4682ac328744adaa390de3d3ad7494
SHA256d8116bf7032f51013ffa4209533d9805fea385c3abf705e84c4c119c363c5c30
SHA512a37bc7e14d87c551764f78f9c172a49598a2a36b19ea072066279aedc6e966f389d4edfbf92ee030fc4a7e1d4075f713679965cc23e164eee56593f2626860d1
-
Filesize
72KB
MD5d9e8820e67347629f7c6507e22e34099
SHA1daeff25abd4682ac328744adaa390de3d3ad7494
SHA256d8116bf7032f51013ffa4209533d9805fea385c3abf705e84c4c119c363c5c30
SHA512a37bc7e14d87c551764f78f9c172a49598a2a36b19ea072066279aedc6e966f389d4edfbf92ee030fc4a7e1d4075f713679965cc23e164eee56593f2626860d1
-
Filesize
72KB
MD55742de6c1e2755f7bd593732ad88660c
SHA12c0511c3dcbe384a99e156ed38278956d9a65241
SHA256fe461c5493737996f9dcbb314d9538bd348d51a0e01b98bbf4bda91830faa6f2
SHA51254d40e280d80ad886e206c8a5cef147066f74232b414d370b663d56e1f5b7934fa42a1fc0c4ff512d30b4adc1c4318398069d1569c2d182849f7f18429e084f2
-
Filesize
72KB
MD554a28645aa04191686af0a58e7311b8e
SHA123b2936514d64e76dfe195a9a76161ba33ee760f
SHA2561755bc43887be3a2b2311aa2470d1e5f1eeb5cfa2083698b5677d35638f9cf3d
SHA5129d7758cfceaf3a040586416ca6d677604edd766a8ddcaf402da3f38e6f175f4a558a42c4eda1a88329b2ab0924cf5f3ea33f0b17502e9c6191d0a34bdf75c8b1
-
Filesize
72KB
MD554a28645aa04191686af0a58e7311b8e
SHA123b2936514d64e76dfe195a9a76161ba33ee760f
SHA2561755bc43887be3a2b2311aa2470d1e5f1eeb5cfa2083698b5677d35638f9cf3d
SHA5129d7758cfceaf3a040586416ca6d677604edd766a8ddcaf402da3f38e6f175f4a558a42c4eda1a88329b2ab0924cf5f3ea33f0b17502e9c6191d0a34bdf75c8b1
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD504169d139fc4feff45120c351cc43548
SHA186652f8305e72ff9128f8f4781c21d56922617a4
SHA256b94c340219feeb47478232ab5b5d2a4fbee283ea28a01675f3affee994b6cc6a
SHA5122dcadf268656caa8245ed98ab91d734fa9ee6e5d14041806ab8f5639007d8907dec643c2bbeae58ce3db76c6cacfdb4d1f9f3bfd50cca1610ba51fa12a254326
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD53e19c74eb594c4cdf3e65232a058ba9b
SHA1d2f426137f43682e19510703512781d534d137ab
SHA256170c31a48cdfe44c487d2456ec4bb1b09560f8310d567ff50ade0fb2ab7f9e84
SHA512b4206dfa0c8264cfe024731ee284ddc00f6359b7734492fad370b08c741768ee393aca3a7e267f8611f9e8655cf2f590b582e8eec6e04573ebf0ee57bafe576a
-
Filesize
72KB
MD53e19c74eb594c4cdf3e65232a058ba9b
SHA1d2f426137f43682e19510703512781d534d137ab
SHA256170c31a48cdfe44c487d2456ec4bb1b09560f8310d567ff50ade0fb2ab7f9e84
SHA512b4206dfa0c8264cfe024731ee284ddc00f6359b7734492fad370b08c741768ee393aca3a7e267f8611f9e8655cf2f590b582e8eec6e04573ebf0ee57bafe576a
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD50c22e4d65ea3286a056b1d84dadb1af0
SHA139283afec3cd5b7898c25c1899d98b6ad1b73e35
SHA2560b788f74ee5b19dcc2785aa67903223f97c36e88425b1814dff72be793a70c01
SHA512a7b44e6ebe3e19a43e9217756384829eb69bf1db5bd86438d4ae394af6f0291a27cc54dd89f962a1925d4b154d8c8560424162a19d4a6bc1c8700450685e058c
-
Filesize
72KB
MD53e19c74eb594c4cdf3e65232a058ba9b
SHA1d2f426137f43682e19510703512781d534d137ab
SHA256170c31a48cdfe44c487d2456ec4bb1b09560f8310d567ff50ade0fb2ab7f9e84
SHA512b4206dfa0c8264cfe024731ee284ddc00f6359b7734492fad370b08c741768ee393aca3a7e267f8611f9e8655cf2f590b582e8eec6e04573ebf0ee57bafe576a
-
Filesize
72KB
MD53e19c74eb594c4cdf3e65232a058ba9b
SHA1d2f426137f43682e19510703512781d534d137ab
SHA256170c31a48cdfe44c487d2456ec4bb1b09560f8310d567ff50ade0fb2ab7f9e84
SHA512b4206dfa0c8264cfe024731ee284ddc00f6359b7734492fad370b08c741768ee393aca3a7e267f8611f9e8655cf2f590b582e8eec6e04573ebf0ee57bafe576a