Analysis
-
max time kernel
156s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe
Resource
win10v2004-20220901-en
General
-
Target
87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe
-
Size
72KB
-
MD5
0477a15123352cf482db14e5c3b0ca11
-
SHA1
e9867e2d44e874d811b9fdf719c4e1db7c407546
-
SHA256
87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361
-
SHA512
94f03d4cdc0f6a98f6a08e998e8a2b255638d836a6e550495a34899c640d2e67904213435098fbd5dd8639744f3615ca43dfe3bf330ff405ad83044d513dd417
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2Z:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr1
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1136 backup.exe 704 backup.exe 952 backup.exe 1512 backup.exe 1672 backup.exe 1096 backup.exe 1336 backup.exe 1736 backup.exe 872 backup.exe 1564 backup.exe 1900 backup.exe 1908 backup.exe 1436 backup.exe 432 backup.exe 1820 backup.exe 932 backup.exe 1832 backup.exe 1812 backup.exe 1648 backup.exe 1824 backup.exe 628 backup.exe 1124 backup.exe 908 backup.exe 1624 backup.exe 1660 backup.exe 1596 backup.exe 1116 backup.exe 1680 backup.exe 588 backup.exe 1336 backup.exe 636 backup.exe 1012 backup.exe 1576 backup.exe 1276 backup.exe 1008 backup.exe 1984 backup.exe 1980 backup.exe 520 backup.exe 1952 backup.exe 2000 backup.exe 1908 backup.exe 1748 System Restore.exe 1724 backup.exe 1684 backup.exe 592 System Restore.exe 2032 backup.exe 1892 backup.exe 1640 backup.exe 1648 backup.exe 1972 backup.exe 1056 backup.exe 1124 System Restore.exe 1500 backup.exe 1636 backup.exe 1624 backup.exe 828 backup.exe 452 backup.exe 1264 backup.exe 1288 backup.exe 544 backup.exe 1160 update.exe 1752 update.exe 1964 backup.exe 1968 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 952 backup.exe 952 backup.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 1096 backup.exe 1096 backup.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 952 backup.exe 952 backup.exe 1900 backup.exe 1900 backup.exe 1908 backup.exe 1908 backup.exe 1900 backup.exe 1900 backup.exe 432 backup.exe 432 backup.exe 1820 backup.exe 1820 backup.exe 1820 backup.exe 1820 backup.exe 1832 backup.exe 1832 backup.exe 1832 backup.exe 1832 backup.exe 1832 backup.exe 1832 backup.exe 952 backup.exe 952 backup.exe 1832 backup.exe 1832 backup.exe 1900 backup.exe 1900 backup.exe 432 backup.exe 432 backup.exe 1832 backup.exe 1832 backup.exe 628 backup.exe 628 backup.exe 1660 backup.exe 1660 backup.exe 908 backup.exe 908 backup.exe 1832 backup.exe 1832 backup.exe 1116 backup.exe 1116 backup.exe 432 backup.exe 432 backup.exe 908 backup.exe 908 backup.exe 636 backup.exe 636 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre7\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\data.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Update\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\update.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe System Restore.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 1136 backup.exe 704 backup.exe 952 backup.exe 1512 backup.exe 1672 backup.exe 1096 backup.exe 1336 backup.exe 1736 backup.exe 872 backup.exe 1564 backup.exe 1900 backup.exe 1908 backup.exe 1436 backup.exe 432 backup.exe 1820 backup.exe 932 backup.exe 1832 backup.exe 1812 backup.exe 1648 backup.exe 1824 backup.exe 628 backup.exe 1124 backup.exe 908 backup.exe 1624 backup.exe 1596 backup.exe 1660 backup.exe 1116 backup.exe 1680 backup.exe 588 backup.exe 1336 backup.exe 636 backup.exe 1012 backup.exe 1276 backup.exe 1576 backup.exe 1008 backup.exe 1984 backup.exe 1980 backup.exe 520 backup.exe 1952 backup.exe 2000 backup.exe 1908 backup.exe 1748 System Restore.exe 1724 backup.exe 592 System Restore.exe 2032 backup.exe 1640 backup.exe 1892 backup.exe 1648 backup.exe 1972 backup.exe 1056 backup.exe 1124 System Restore.exe 1500 backup.exe 1636 backup.exe 1624 backup.exe 1264 backup.exe 1288 backup.exe 1964 backup.exe 544 backup.exe 1968 backup.exe 1564 backup.exe 828 backup.exe 1600 backup.exe 972 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 288 wrote to memory of 1136 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 26 PID 288 wrote to memory of 1136 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 26 PID 288 wrote to memory of 1136 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 26 PID 288 wrote to memory of 1136 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 26 PID 288 wrote to memory of 704 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 27 PID 288 wrote to memory of 704 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 27 PID 288 wrote to memory of 704 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 27 PID 288 wrote to memory of 704 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 27 PID 1136 wrote to memory of 952 1136 backup.exe 28 PID 1136 wrote to memory of 952 1136 backup.exe 28 PID 1136 wrote to memory of 952 1136 backup.exe 28 PID 1136 wrote to memory of 952 1136 backup.exe 28 PID 288 wrote to memory of 1512 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 29 PID 288 wrote to memory of 1512 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 29 PID 288 wrote to memory of 1512 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 29 PID 288 wrote to memory of 1512 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 29 PID 288 wrote to memory of 1672 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 30 PID 288 wrote to memory of 1672 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 30 PID 288 wrote to memory of 1672 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 30 PID 288 wrote to memory of 1672 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 30 PID 952 wrote to memory of 1096 952 backup.exe 31 PID 952 wrote to memory of 1096 952 backup.exe 31 PID 952 wrote to memory of 1096 952 backup.exe 31 PID 952 wrote to memory of 1096 952 backup.exe 31 PID 288 wrote to memory of 1336 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 32 PID 288 wrote to memory of 1336 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 32 PID 288 wrote to memory of 1336 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 32 PID 288 wrote to memory of 1336 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 32 PID 288 wrote to memory of 1736 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 33 PID 288 wrote to memory of 1736 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 33 PID 288 wrote to memory of 1736 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 33 PID 288 wrote to memory of 1736 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 33 PID 1096 wrote to memory of 872 1096 backup.exe 34 PID 1096 wrote to memory of 872 1096 backup.exe 34 PID 1096 wrote to memory of 872 1096 backup.exe 34 PID 1096 wrote to memory of 872 1096 backup.exe 34 PID 288 wrote to memory of 1564 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 35 PID 288 wrote to memory of 1564 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 35 PID 288 wrote to memory of 1564 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 35 PID 288 wrote to memory of 1564 288 87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe 35 PID 952 wrote to memory of 1900 952 backup.exe 36 PID 952 wrote to memory of 1900 952 backup.exe 36 PID 952 wrote to memory of 1900 952 backup.exe 36 PID 952 wrote to memory of 1900 952 backup.exe 36 PID 1900 wrote to memory of 1908 1900 backup.exe 37 PID 1900 wrote to memory of 1908 1900 backup.exe 37 PID 1900 wrote to memory of 1908 1900 backup.exe 37 PID 1900 wrote to memory of 1908 1900 backup.exe 37 PID 1908 wrote to memory of 1436 1908 backup.exe 38 PID 1908 wrote to memory of 1436 1908 backup.exe 38 PID 1908 wrote to memory of 1436 1908 backup.exe 38 PID 1908 wrote to memory of 1436 1908 backup.exe 38 PID 1900 wrote to memory of 432 1900 backup.exe 39 PID 1900 wrote to memory of 432 1900 backup.exe 39 PID 1900 wrote to memory of 432 1900 backup.exe 39 PID 1900 wrote to memory of 432 1900 backup.exe 39 PID 432 wrote to memory of 1820 432 backup.exe 40 PID 432 wrote to memory of 1820 432 backup.exe 40 PID 432 wrote to memory of 1820 432 backup.exe 40 PID 432 wrote to memory of 1820 432 backup.exe 40 PID 1820 wrote to memory of 932 1820 backup.exe 41 PID 1820 wrote to memory of 932 1820 backup.exe 41 PID 1820 wrote to memory of 932 1820 backup.exe 41 PID 1820 wrote to memory of 932 1820 backup.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe"C:\Users\Admin\AppData\Local\Temp\87b3cf8593b07865ae84d0aa92494e5322b6d3a1539184517713a0f6a3877361.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Local\Temp\3740077861\backup.exeC:\Users\Admin\AppData\Local\Temp\3740077861\backup.exe C:\Users\Admin\AppData\Local\Temp\3740077861\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1136 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1096 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1436
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:432 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1832 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1124
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1276
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Executes dropped EXE
PID:1684
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1964
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:308 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵PID:1680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵PID:1952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵PID:868
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:2092
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:2260
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1476
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1792
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:588
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:2116
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:2308
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1980
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1908
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1260
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:960
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1328
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:2144
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2316
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:636 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1576
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:520 -
C:\Program Files\Common Files\System\ado\System Restore.exe"C:\Program Files\Common Files\System\ado\System Restore.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:592 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Program Files\Common Files\System\ado\en-US\update.exe"C:\Program Files\Common Files\System\ado\en-US\update.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Executes dropped EXE
PID:1752
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1064
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1572
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1892
-
-
C:\Program Files\Common Files\System\ado\ja-JP\System Restore.exe"C:\Program Files\Common Files\System\ado\ja-JP\System Restore.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1116
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1288
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1088
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1356
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:844
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:2076
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:2268
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:908 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1680
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1012
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
PID:452
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1824
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:108
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:560
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1736
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1056 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:912
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1748
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1872 -
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵PID:1712
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:2160
-
-
-
C:\Program Files\Microsoft Games\update.exe"C:\Program Files\Microsoft Games\update.exe" C:\Program Files\Microsoft Games\5⤵PID:1140
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1492
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2100
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2252
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:628 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1116 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Executes dropped EXE
PID:1160
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1340
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:796
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1644
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:776
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:2176
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:2372
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1828
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:1320
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:1968
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵PID:1052
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:540 -
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵PID:1780
-
-
-
-
-
C:\Program Files (x86)\Common Files\System Restore.exe"C:\Program Files (x86)\Common Files\System Restore.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1124 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1244
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe AIR\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:2004
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1264
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:880
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:2084
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:2276
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:972 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:1660
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:1980
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1728
-
-
C:\Program Files (x86)\Google\Update\System Restore.exe"C:\Program Files (x86)\Google\Update\System Restore.exe" C:\Program Files (x86)\Google\Update\6⤵PID:636
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft Analysis Services\System Restore.exe"C:\Program Files (x86)\Microsoft Analysis Services\System Restore.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft Office\update.exe"C:\Program Files (x86)\Microsoft Office\update.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:672
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2300
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1648 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828
-
-
C:\Users\Public\update.exeC:\Users\Public\update.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1620 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:1964
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:872
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:2168
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵PID:2364
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e7357e467a03614a4e093b6b893bb197
SHA16e645788cb5447efd1e5ff5023229de420fd8835
SHA256cc726558576600a2fa2bf499f4d764271ffe6337a1e5ec9ae8bbaf8a0f6b80db
SHA5126a7f45a38f86688c96e9dfdef8038d6ab544e23bb6e231fff715486c0d0e8e5e3645653f3d57daac61025fadf03e5834a19a8db9dad5127118d6019f20357fb1
-
Filesize
72KB
MD50ee33735afc3d8d66af1af0c7cac8dd8
SHA114c127a6afab724dfee411446153086a8da3da5f
SHA2561364da7e4b284d2c1460ae6f62ea5c6de7ff19d6e4312c01f43609ab71f30521
SHA512c1324075b1cc4941dffd854d61e413536b17269bf2ab744e27ee6e392f5eb9ade144b58a87904a43f011685c99e3fec1ef33900011204c0faff2be3e1f8a29d0
-
Filesize
72KB
MD50ee33735afc3d8d66af1af0c7cac8dd8
SHA114c127a6afab724dfee411446153086a8da3da5f
SHA2561364da7e4b284d2c1460ae6f62ea5c6de7ff19d6e4312c01f43609ab71f30521
SHA512c1324075b1cc4941dffd854d61e413536b17269bf2ab744e27ee6e392f5eb9ade144b58a87904a43f011685c99e3fec1ef33900011204c0faff2be3e1f8a29d0
-
Filesize
72KB
MD55653bc35e9026da241b3ed548d064734
SHA1d616cc5319724466009db77c0d69ee40af21f2bc
SHA25647477c3d2772253e434b29835dd98f0d19c3a31fbd1d1b054143712423dfa366
SHA5127ff1dc7185d1fcf93419580b48f9a130cb7b3fd90f03af9525b49053cf062fa7e18ba9d8e98976dac379942b10ca10b5a97dca57eb4198b7817fbebe785b1c11
-
Filesize
72KB
MD57c201d177d094c466a8df18d89c5b7e1
SHA1f8f04eb13e31c26cf0c59630d8a6375ca26a0a27
SHA25695dbe11119400a6a475fc5233885ac7b3df8dc89d0781bd040b3a41150b3da83
SHA51293409d0e6485a93599f26ad8d80b9d7df2807177e9dc85182011dda632520a8414c64ddc42c2cfb34b21a9dc367658ba19ddcf863902d629b8f00214d1784eef
-
Filesize
72KB
MD57c201d177d094c466a8df18d89c5b7e1
SHA1f8f04eb13e31c26cf0c59630d8a6375ca26a0a27
SHA25695dbe11119400a6a475fc5233885ac7b3df8dc89d0781bd040b3a41150b3da83
SHA51293409d0e6485a93599f26ad8d80b9d7df2807177e9dc85182011dda632520a8414c64ddc42c2cfb34b21a9dc367658ba19ddcf863902d629b8f00214d1784eef
-
Filesize
72KB
MD580143f20be2acf9bfc32c29bd9b64a8a
SHA1b28e8f5fdd4010d58f2b20fbc1ff7f5cdcbf0fbd
SHA256bb8c772f27f0a8d4182cbb980220ae8c95b7b7f577ef624fce99387709e7a682
SHA51297cda6a6650f3a10b3b23671d127a11c025d643ac25becabbb02ee4e113fc56f3dd3b1eb49a424242ac6c10aab03dda1d888030847bd8d12b213114a128ba802
-
Filesize
72KB
MD52c065f2d697fe35fec2b95ec97b551cb
SHA13b4c6e8f10a8c7aff03b40ac1a6b5a40eef6061a
SHA256b43641814443a75d9e67d3ee3f3e47eb9274c8b87a0af8633f6a07017fa4fcd7
SHA512f828e996a66808edbf3a06902f89d810f506bede9d26731056bab26cdcc83969646629365643ea142136cdf9e773deff6836037da6ba06bc47e9d02eac17bff8
-
Filesize
72KB
MD52c065f2d697fe35fec2b95ec97b551cb
SHA13b4c6e8f10a8c7aff03b40ac1a6b5a40eef6061a
SHA256b43641814443a75d9e67d3ee3f3e47eb9274c8b87a0af8633f6a07017fa4fcd7
SHA512f828e996a66808edbf3a06902f89d810f506bede9d26731056bab26cdcc83969646629365643ea142136cdf9e773deff6836037da6ba06bc47e9d02eac17bff8
-
Filesize
72KB
MD58dd9094e46c9c0d36f675b82756c73a5
SHA11f1b6c6eda01f23632bbdf1ed1350f223325363c
SHA256ab5a5eb279bd3cea16d8a1c9bf613e5cc36d45d13977ea0c21aa1ce51204927b
SHA5121fc8502bca55555ee6881e64190a7a490e558a2670e37b5d7a2f5db57f80c20cfb2d9643b7343008cf288c2bcb980d7a39447d8b1b03a4cfb7ee6fc2f915d494
-
Filesize
72KB
MD5b2e154e5f35b693a0e864d5e28fcf5ab
SHA1ddf30a800e7310feb54f68f0ac5214be6bd415c9
SHA2563b206bcf54f74bfe0edcf7331733c8e814389996ca01b3444ca15d5293f42aeb
SHA512065d3cede42639e1695cc3a55f7632bf86480b0d7d370223ba865240a700329c0625eff7e27db995cd47f157039fb71249e1ebaae5db58032eb6ccb4ae7819ca
-
Filesize
72KB
MD5b2e154e5f35b693a0e864d5e28fcf5ab
SHA1ddf30a800e7310feb54f68f0ac5214be6bd415c9
SHA2563b206bcf54f74bfe0edcf7331733c8e814389996ca01b3444ca15d5293f42aeb
SHA512065d3cede42639e1695cc3a55f7632bf86480b0d7d370223ba865240a700329c0625eff7e27db995cd47f157039fb71249e1ebaae5db58032eb6ccb4ae7819ca
-
Filesize
72KB
MD58dd9094e46c9c0d36f675b82756c73a5
SHA11f1b6c6eda01f23632bbdf1ed1350f223325363c
SHA256ab5a5eb279bd3cea16d8a1c9bf613e5cc36d45d13977ea0c21aa1ce51204927b
SHA5121fc8502bca55555ee6881e64190a7a490e558a2670e37b5d7a2f5db57f80c20cfb2d9643b7343008cf288c2bcb980d7a39447d8b1b03a4cfb7ee6fc2f915d494
-
Filesize
72KB
MD56d4dadbf04ed7ff70f98f0d35daaee84
SHA1d8873482886918590874e7d16f9646369a4f03ea
SHA2563bf718596e5076a61b90d2e7692aafc32ecbc5d50147b25f1405779ded56a667
SHA512b90b795d49366e0130f614f995e7edd55f2ccd28d5c1592c31e8d32e744e045133df15b01e145449952e385cd7492a0c6541abdb6f9a1c1a0a1fd4bb98810347
-
Filesize
72KB
MD56d4dadbf04ed7ff70f98f0d35daaee84
SHA1d8873482886918590874e7d16f9646369a4f03ea
SHA2563bf718596e5076a61b90d2e7692aafc32ecbc5d50147b25f1405779ded56a667
SHA512b90b795d49366e0130f614f995e7edd55f2ccd28d5c1592c31e8d32e744e045133df15b01e145449952e385cd7492a0c6541abdb6f9a1c1a0a1fd4bb98810347
-
Filesize
72KB
MD5d83438458704c520234632d9ee7c098d
SHA174cd973530bec041323bf787215c7fc2d5be6540
SHA25604482d84a8b4e5f1b9116bb37bed3c055d13214b39275527fb8a46792d6dd117
SHA5122db17c66acf85b81a5d9adb0d0c2741dcd221b9c2728b44b10de8aa8e490c2a1f9489948da924b765571da9530bf412391f85aaaf8c8e3e54c6cf8110f97204c
-
Filesize
72KB
MD5d83438458704c520234632d9ee7c098d
SHA174cd973530bec041323bf787215c7fc2d5be6540
SHA25604482d84a8b4e5f1b9116bb37bed3c055d13214b39275527fb8a46792d6dd117
SHA5122db17c66acf85b81a5d9adb0d0c2741dcd221b9c2728b44b10de8aa8e490c2a1f9489948da924b765571da9530bf412391f85aaaf8c8e3e54c6cf8110f97204c
-
Filesize
72KB
MD5e5561bc29dddfeafc6cf539f30183077
SHA1b35f451e70795fd94c174c5e35e8c25e125cf02b
SHA25685e532d6e02bbf6fc0a90f67f2438c7175d6f421e2f43c7ca0462dc9180eceb4
SHA5124a1cb889f815deb7d53aadfb6113ce11c7e3050dc4874875d41ebca3210be4e09fc04d40e52d60426d97b1b82c4137d27a12515e83e563cbe62dda0b618547ac
-
Filesize
72KB
MD5e5561bc29dddfeafc6cf539f30183077
SHA1b35f451e70795fd94c174c5e35e8c25e125cf02b
SHA25685e532d6e02bbf6fc0a90f67f2438c7175d6f421e2f43c7ca0462dc9180eceb4
SHA5124a1cb889f815deb7d53aadfb6113ce11c7e3050dc4874875d41ebca3210be4e09fc04d40e52d60426d97b1b82c4137d27a12515e83e563cbe62dda0b618547ac
-
Filesize
72KB
MD5edb7b3766d06ceb410cfc259c160352f
SHA18a9ac48a3c65324d459feff48fa669846485b715
SHA2567b9325ae12b542c26d0cd59c8c119c090186bd6a00546e97f36caea467604ed5
SHA512f1ae81ca51ae9ce8fa326b40fecb49f32d219f8c1f1ca6aca194983483a52ab1c62929363cabb30c293d958d79a65f0169b580e77d571d00921bb8e4012cc07e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59a66adb33eafdf03042bc40fc1fcbd2e
SHA16b2db2a61980aef53c84337df408c19168078037
SHA2563363a9b1ac47576799bad40898d700a15816831a1302ec4ddb0a5dc4fc4cd4cd
SHA512083ad93fa16546d7beb46d2947946d06934b2f648343d3c050ae6f247fd702cf7098db467273dfeb662c6db8c2c8c52d65dab3518d79359614c64dc28c4a322c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59a66adb33eafdf03042bc40fc1fcbd2e
SHA16b2db2a61980aef53c84337df408c19168078037
SHA2563363a9b1ac47576799bad40898d700a15816831a1302ec4ddb0a5dc4fc4cd4cd
SHA512083ad93fa16546d7beb46d2947946d06934b2f648343d3c050ae6f247fd702cf7098db467273dfeb662c6db8c2c8c52d65dab3518d79359614c64dc28c4a322c
-
Filesize
72KB
MD52eecd2361b6ff37c1a361b74ba22a22b
SHA1e6d478c03a6d844d634c5073a226228fd74e331c
SHA2565f943cb2d7f1ef903719729884f4e5643100d2c04afbb1873472c05924e2dbfc
SHA51204932098340a0a7f4cfe88fbc96d263d19b52216cf53e742e79dc34a0e3ff60757bcd0380a2c5e34656b0332c18bb1b73e830c05dff80faa270e344946964e99
-
Filesize
72KB
MD5e5561bc29dddfeafc6cf539f30183077
SHA1b35f451e70795fd94c174c5e35e8c25e125cf02b
SHA25685e532d6e02bbf6fc0a90f67f2438c7175d6f421e2f43c7ca0462dc9180eceb4
SHA5124a1cb889f815deb7d53aadfb6113ce11c7e3050dc4874875d41ebca3210be4e09fc04d40e52d60426d97b1b82c4137d27a12515e83e563cbe62dda0b618547ac
-
Filesize
72KB
MD52eecd2361b6ff37c1a361b74ba22a22b
SHA1e6d478c03a6d844d634c5073a226228fd74e331c
SHA2565f943cb2d7f1ef903719729884f4e5643100d2c04afbb1873472c05924e2dbfc
SHA51204932098340a0a7f4cfe88fbc96d263d19b52216cf53e742e79dc34a0e3ff60757bcd0380a2c5e34656b0332c18bb1b73e830c05dff80faa270e344946964e99
-
Filesize
72KB
MD512fa7e7d616abef6bf75daa48a92cdbb
SHA16458f90c118a15fbdf219d52f06190155ec37926
SHA256297c0daa0c51840f23de94d5a50367a28787d945af30bdc0046a8118d57ff830
SHA512e6f290eb3e9808bac8eb87690d6c7397f0e61d67e2bcbccc0aa24426744887a41c60f9bea583944f6e6ebadc986a1e219e2e20b30e62d916d4d6df2528d2c624
-
Filesize
72KB
MD512fa7e7d616abef6bf75daa48a92cdbb
SHA16458f90c118a15fbdf219d52f06190155ec37926
SHA256297c0daa0c51840f23de94d5a50367a28787d945af30bdc0046a8118d57ff830
SHA512e6f290eb3e9808bac8eb87690d6c7397f0e61d67e2bcbccc0aa24426744887a41c60f9bea583944f6e6ebadc986a1e219e2e20b30e62d916d4d6df2528d2c624
-
Filesize
72KB
MD5e7357e467a03614a4e093b6b893bb197
SHA16e645788cb5447efd1e5ff5023229de420fd8835
SHA256cc726558576600a2fa2bf499f4d764271ffe6337a1e5ec9ae8bbaf8a0f6b80db
SHA5126a7f45a38f86688c96e9dfdef8038d6ab544e23bb6e231fff715486c0d0e8e5e3645653f3d57daac61025fadf03e5834a19a8db9dad5127118d6019f20357fb1
-
Filesize
72KB
MD5e7357e467a03614a4e093b6b893bb197
SHA16e645788cb5447efd1e5ff5023229de420fd8835
SHA256cc726558576600a2fa2bf499f4d764271ffe6337a1e5ec9ae8bbaf8a0f6b80db
SHA5126a7f45a38f86688c96e9dfdef8038d6ab544e23bb6e231fff715486c0d0e8e5e3645653f3d57daac61025fadf03e5834a19a8db9dad5127118d6019f20357fb1
-
Filesize
72KB
MD50ee33735afc3d8d66af1af0c7cac8dd8
SHA114c127a6afab724dfee411446153086a8da3da5f
SHA2561364da7e4b284d2c1460ae6f62ea5c6de7ff19d6e4312c01f43609ab71f30521
SHA512c1324075b1cc4941dffd854d61e413536b17269bf2ab744e27ee6e392f5eb9ade144b58a87904a43f011685c99e3fec1ef33900011204c0faff2be3e1f8a29d0
-
Filesize
72KB
MD50ee33735afc3d8d66af1af0c7cac8dd8
SHA114c127a6afab724dfee411446153086a8da3da5f
SHA2561364da7e4b284d2c1460ae6f62ea5c6de7ff19d6e4312c01f43609ab71f30521
SHA512c1324075b1cc4941dffd854d61e413536b17269bf2ab744e27ee6e392f5eb9ade144b58a87904a43f011685c99e3fec1ef33900011204c0faff2be3e1f8a29d0
-
Filesize
72KB
MD55653bc35e9026da241b3ed548d064734
SHA1d616cc5319724466009db77c0d69ee40af21f2bc
SHA25647477c3d2772253e434b29835dd98f0d19c3a31fbd1d1b054143712423dfa366
SHA5127ff1dc7185d1fcf93419580b48f9a130cb7b3fd90f03af9525b49053cf062fa7e18ba9d8e98976dac379942b10ca10b5a97dca57eb4198b7817fbebe785b1c11
-
Filesize
72KB
MD55653bc35e9026da241b3ed548d064734
SHA1d616cc5319724466009db77c0d69ee40af21f2bc
SHA25647477c3d2772253e434b29835dd98f0d19c3a31fbd1d1b054143712423dfa366
SHA5127ff1dc7185d1fcf93419580b48f9a130cb7b3fd90f03af9525b49053cf062fa7e18ba9d8e98976dac379942b10ca10b5a97dca57eb4198b7817fbebe785b1c11
-
Filesize
72KB
MD57c201d177d094c466a8df18d89c5b7e1
SHA1f8f04eb13e31c26cf0c59630d8a6375ca26a0a27
SHA25695dbe11119400a6a475fc5233885ac7b3df8dc89d0781bd040b3a41150b3da83
SHA51293409d0e6485a93599f26ad8d80b9d7df2807177e9dc85182011dda632520a8414c64ddc42c2cfb34b21a9dc367658ba19ddcf863902d629b8f00214d1784eef
-
Filesize
72KB
MD57c201d177d094c466a8df18d89c5b7e1
SHA1f8f04eb13e31c26cf0c59630d8a6375ca26a0a27
SHA25695dbe11119400a6a475fc5233885ac7b3df8dc89d0781bd040b3a41150b3da83
SHA51293409d0e6485a93599f26ad8d80b9d7df2807177e9dc85182011dda632520a8414c64ddc42c2cfb34b21a9dc367658ba19ddcf863902d629b8f00214d1784eef
-
Filesize
72KB
MD580143f20be2acf9bfc32c29bd9b64a8a
SHA1b28e8f5fdd4010d58f2b20fbc1ff7f5cdcbf0fbd
SHA256bb8c772f27f0a8d4182cbb980220ae8c95b7b7f577ef624fce99387709e7a682
SHA51297cda6a6650f3a10b3b23671d127a11c025d643ac25becabbb02ee4e113fc56f3dd3b1eb49a424242ac6c10aab03dda1d888030847bd8d12b213114a128ba802
-
Filesize
72KB
MD580143f20be2acf9bfc32c29bd9b64a8a
SHA1b28e8f5fdd4010d58f2b20fbc1ff7f5cdcbf0fbd
SHA256bb8c772f27f0a8d4182cbb980220ae8c95b7b7f577ef624fce99387709e7a682
SHA51297cda6a6650f3a10b3b23671d127a11c025d643ac25becabbb02ee4e113fc56f3dd3b1eb49a424242ac6c10aab03dda1d888030847bd8d12b213114a128ba802
-
Filesize
72KB
MD52c065f2d697fe35fec2b95ec97b551cb
SHA13b4c6e8f10a8c7aff03b40ac1a6b5a40eef6061a
SHA256b43641814443a75d9e67d3ee3f3e47eb9274c8b87a0af8633f6a07017fa4fcd7
SHA512f828e996a66808edbf3a06902f89d810f506bede9d26731056bab26cdcc83969646629365643ea142136cdf9e773deff6836037da6ba06bc47e9d02eac17bff8
-
Filesize
72KB
MD52c065f2d697fe35fec2b95ec97b551cb
SHA13b4c6e8f10a8c7aff03b40ac1a6b5a40eef6061a
SHA256b43641814443a75d9e67d3ee3f3e47eb9274c8b87a0af8633f6a07017fa4fcd7
SHA512f828e996a66808edbf3a06902f89d810f506bede9d26731056bab26cdcc83969646629365643ea142136cdf9e773deff6836037da6ba06bc47e9d02eac17bff8
-
Filesize
72KB
MD58dd9094e46c9c0d36f675b82756c73a5
SHA11f1b6c6eda01f23632bbdf1ed1350f223325363c
SHA256ab5a5eb279bd3cea16d8a1c9bf613e5cc36d45d13977ea0c21aa1ce51204927b
SHA5121fc8502bca55555ee6881e64190a7a490e558a2670e37b5d7a2f5db57f80c20cfb2d9643b7343008cf288c2bcb980d7a39447d8b1b03a4cfb7ee6fc2f915d494
-
Filesize
72KB
MD58dd9094e46c9c0d36f675b82756c73a5
SHA11f1b6c6eda01f23632bbdf1ed1350f223325363c
SHA256ab5a5eb279bd3cea16d8a1c9bf613e5cc36d45d13977ea0c21aa1ce51204927b
SHA5121fc8502bca55555ee6881e64190a7a490e558a2670e37b5d7a2f5db57f80c20cfb2d9643b7343008cf288c2bcb980d7a39447d8b1b03a4cfb7ee6fc2f915d494
-
Filesize
72KB
MD5b2e154e5f35b693a0e864d5e28fcf5ab
SHA1ddf30a800e7310feb54f68f0ac5214be6bd415c9
SHA2563b206bcf54f74bfe0edcf7331733c8e814389996ca01b3444ca15d5293f42aeb
SHA512065d3cede42639e1695cc3a55f7632bf86480b0d7d370223ba865240a700329c0625eff7e27db995cd47f157039fb71249e1ebaae5db58032eb6ccb4ae7819ca
-
Filesize
72KB
MD5b2e154e5f35b693a0e864d5e28fcf5ab
SHA1ddf30a800e7310feb54f68f0ac5214be6bd415c9
SHA2563b206bcf54f74bfe0edcf7331733c8e814389996ca01b3444ca15d5293f42aeb
SHA512065d3cede42639e1695cc3a55f7632bf86480b0d7d370223ba865240a700329c0625eff7e27db995cd47f157039fb71249e1ebaae5db58032eb6ccb4ae7819ca
-
Filesize
72KB
MD58dd9094e46c9c0d36f675b82756c73a5
SHA11f1b6c6eda01f23632bbdf1ed1350f223325363c
SHA256ab5a5eb279bd3cea16d8a1c9bf613e5cc36d45d13977ea0c21aa1ce51204927b
SHA5121fc8502bca55555ee6881e64190a7a490e558a2670e37b5d7a2f5db57f80c20cfb2d9643b7343008cf288c2bcb980d7a39447d8b1b03a4cfb7ee6fc2f915d494
-
Filesize
72KB
MD58dd9094e46c9c0d36f675b82756c73a5
SHA11f1b6c6eda01f23632bbdf1ed1350f223325363c
SHA256ab5a5eb279bd3cea16d8a1c9bf613e5cc36d45d13977ea0c21aa1ce51204927b
SHA5121fc8502bca55555ee6881e64190a7a490e558a2670e37b5d7a2f5db57f80c20cfb2d9643b7343008cf288c2bcb980d7a39447d8b1b03a4cfb7ee6fc2f915d494
-
Filesize
72KB
MD589e3c22e390871bbed1282e517222a85
SHA18c17cbc9dea0a85e5e93e3f4f6201610c8e6c17c
SHA256d5a006259cabe20061502433e12cc322190ae4560e4eb992f3a9d63b6de512e2
SHA51210ae707933cc7d686feeeef0fd491455a65b0dea4a415e3c0a98af811862d8201c1db0dda882edf2bf856ef4988cfeb3b3c8628550ddcd6b22cd813e9d1e533d
-
Filesize
72KB
MD56d4dadbf04ed7ff70f98f0d35daaee84
SHA1d8873482886918590874e7d16f9646369a4f03ea
SHA2563bf718596e5076a61b90d2e7692aafc32ecbc5d50147b25f1405779ded56a667
SHA512b90b795d49366e0130f614f995e7edd55f2ccd28d5c1592c31e8d32e744e045133df15b01e145449952e385cd7492a0c6541abdb6f9a1c1a0a1fd4bb98810347
-
Filesize
72KB
MD56d4dadbf04ed7ff70f98f0d35daaee84
SHA1d8873482886918590874e7d16f9646369a4f03ea
SHA2563bf718596e5076a61b90d2e7692aafc32ecbc5d50147b25f1405779ded56a667
SHA512b90b795d49366e0130f614f995e7edd55f2ccd28d5c1592c31e8d32e744e045133df15b01e145449952e385cd7492a0c6541abdb6f9a1c1a0a1fd4bb98810347
-
Filesize
72KB
MD5d83438458704c520234632d9ee7c098d
SHA174cd973530bec041323bf787215c7fc2d5be6540
SHA25604482d84a8b4e5f1b9116bb37bed3c055d13214b39275527fb8a46792d6dd117
SHA5122db17c66acf85b81a5d9adb0d0c2741dcd221b9c2728b44b10de8aa8e490c2a1f9489948da924b765571da9530bf412391f85aaaf8c8e3e54c6cf8110f97204c
-
Filesize
72KB
MD5d83438458704c520234632d9ee7c098d
SHA174cd973530bec041323bf787215c7fc2d5be6540
SHA25604482d84a8b4e5f1b9116bb37bed3c055d13214b39275527fb8a46792d6dd117
SHA5122db17c66acf85b81a5d9adb0d0c2741dcd221b9c2728b44b10de8aa8e490c2a1f9489948da924b765571da9530bf412391f85aaaf8c8e3e54c6cf8110f97204c
-
Filesize
72KB
MD5e5561bc29dddfeafc6cf539f30183077
SHA1b35f451e70795fd94c174c5e35e8c25e125cf02b
SHA25685e532d6e02bbf6fc0a90f67f2438c7175d6f421e2f43c7ca0462dc9180eceb4
SHA5124a1cb889f815deb7d53aadfb6113ce11c7e3050dc4874875d41ebca3210be4e09fc04d40e52d60426d97b1b82c4137d27a12515e83e563cbe62dda0b618547ac
-
Filesize
72KB
MD5e5561bc29dddfeafc6cf539f30183077
SHA1b35f451e70795fd94c174c5e35e8c25e125cf02b
SHA25685e532d6e02bbf6fc0a90f67f2438c7175d6f421e2f43c7ca0462dc9180eceb4
SHA5124a1cb889f815deb7d53aadfb6113ce11c7e3050dc4874875d41ebca3210be4e09fc04d40e52d60426d97b1b82c4137d27a12515e83e563cbe62dda0b618547ac
-
Filesize
72KB
MD5edb7b3766d06ceb410cfc259c160352f
SHA18a9ac48a3c65324d459feff48fa669846485b715
SHA2567b9325ae12b542c26d0cd59c8c119c090186bd6a00546e97f36caea467604ed5
SHA512f1ae81ca51ae9ce8fa326b40fecb49f32d219f8c1f1ca6aca194983483a52ab1c62929363cabb30c293d958d79a65f0169b580e77d571d00921bb8e4012cc07e
-
Filesize
72KB
MD5edb7b3766d06ceb410cfc259c160352f
SHA18a9ac48a3c65324d459feff48fa669846485b715
SHA2567b9325ae12b542c26d0cd59c8c119c090186bd6a00546e97f36caea467604ed5
SHA512f1ae81ca51ae9ce8fa326b40fecb49f32d219f8c1f1ca6aca194983483a52ab1c62929363cabb30c293d958d79a65f0169b580e77d571d00921bb8e4012cc07e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59a66adb33eafdf03042bc40fc1fcbd2e
SHA16b2db2a61980aef53c84337df408c19168078037
SHA2563363a9b1ac47576799bad40898d700a15816831a1302ec4ddb0a5dc4fc4cd4cd
SHA512083ad93fa16546d7beb46d2947946d06934b2f648343d3c050ae6f247fd702cf7098db467273dfeb662c6db8c2c8c52d65dab3518d79359614c64dc28c4a322c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59a66adb33eafdf03042bc40fc1fcbd2e
SHA16b2db2a61980aef53c84337df408c19168078037
SHA2563363a9b1ac47576799bad40898d700a15816831a1302ec4ddb0a5dc4fc4cd4cd
SHA512083ad93fa16546d7beb46d2947946d06934b2f648343d3c050ae6f247fd702cf7098db467273dfeb662c6db8c2c8c52d65dab3518d79359614c64dc28c4a322c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59a66adb33eafdf03042bc40fc1fcbd2e
SHA16b2db2a61980aef53c84337df408c19168078037
SHA2563363a9b1ac47576799bad40898d700a15816831a1302ec4ddb0a5dc4fc4cd4cd
SHA512083ad93fa16546d7beb46d2947946d06934b2f648343d3c050ae6f247fd702cf7098db467273dfeb662c6db8c2c8c52d65dab3518d79359614c64dc28c4a322c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59a66adb33eafdf03042bc40fc1fcbd2e
SHA16b2db2a61980aef53c84337df408c19168078037
SHA2563363a9b1ac47576799bad40898d700a15816831a1302ec4ddb0a5dc4fc4cd4cd
SHA512083ad93fa16546d7beb46d2947946d06934b2f648343d3c050ae6f247fd702cf7098db467273dfeb662c6db8c2c8c52d65dab3518d79359614c64dc28c4a322c
-
Filesize
72KB
MD52eecd2361b6ff37c1a361b74ba22a22b
SHA1e6d478c03a6d844d634c5073a226228fd74e331c
SHA2565f943cb2d7f1ef903719729884f4e5643100d2c04afbb1873472c05924e2dbfc
SHA51204932098340a0a7f4cfe88fbc96d263d19b52216cf53e742e79dc34a0e3ff60757bcd0380a2c5e34656b0332c18bb1b73e830c05dff80faa270e344946964e99
-
Filesize
72KB
MD52eecd2361b6ff37c1a361b74ba22a22b
SHA1e6d478c03a6d844d634c5073a226228fd74e331c
SHA2565f943cb2d7f1ef903719729884f4e5643100d2c04afbb1873472c05924e2dbfc
SHA51204932098340a0a7f4cfe88fbc96d263d19b52216cf53e742e79dc34a0e3ff60757bcd0380a2c5e34656b0332c18bb1b73e830c05dff80faa270e344946964e99
-
Filesize
72KB
MD5e5561bc29dddfeafc6cf539f30183077
SHA1b35f451e70795fd94c174c5e35e8c25e125cf02b
SHA25685e532d6e02bbf6fc0a90f67f2438c7175d6f421e2f43c7ca0462dc9180eceb4
SHA5124a1cb889f815deb7d53aadfb6113ce11c7e3050dc4874875d41ebca3210be4e09fc04d40e52d60426d97b1b82c4137d27a12515e83e563cbe62dda0b618547ac
-
Filesize
72KB
MD5e5561bc29dddfeafc6cf539f30183077
SHA1b35f451e70795fd94c174c5e35e8c25e125cf02b
SHA25685e532d6e02bbf6fc0a90f67f2438c7175d6f421e2f43c7ca0462dc9180eceb4
SHA5124a1cb889f815deb7d53aadfb6113ce11c7e3050dc4874875d41ebca3210be4e09fc04d40e52d60426d97b1b82c4137d27a12515e83e563cbe62dda0b618547ac
-
Filesize
72KB
MD52eecd2361b6ff37c1a361b74ba22a22b
SHA1e6d478c03a6d844d634c5073a226228fd74e331c
SHA2565f943cb2d7f1ef903719729884f4e5643100d2c04afbb1873472c05924e2dbfc
SHA51204932098340a0a7f4cfe88fbc96d263d19b52216cf53e742e79dc34a0e3ff60757bcd0380a2c5e34656b0332c18bb1b73e830c05dff80faa270e344946964e99
-
Filesize
72KB
MD52eecd2361b6ff37c1a361b74ba22a22b
SHA1e6d478c03a6d844d634c5073a226228fd74e331c
SHA2565f943cb2d7f1ef903719729884f4e5643100d2c04afbb1873472c05924e2dbfc
SHA51204932098340a0a7f4cfe88fbc96d263d19b52216cf53e742e79dc34a0e3ff60757bcd0380a2c5e34656b0332c18bb1b73e830c05dff80faa270e344946964e99