Analysis
-
max time kernel
152s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe
Resource
win10v2004-20221111-en
General
-
Target
8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe
-
Size
72KB
-
MD5
02f43a1a807967963f2050a73ce816b6
-
SHA1
7d00a84adcb2a5ad5434c3744164687041146aa6
-
SHA256
8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7
-
SHA512
a108f23c8249a1a443ff21cf06b071eaea37e8c9d50a0209d380c28603205fa75c5d53acd2322fc772279847b38f3dab65ed15fb818bddb4fbb64f5cef68ab07
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2v:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1256 backup.exe 1920 backup.exe 1368 backup.exe 892 backup.exe 1800 backup.exe 1860 backup.exe 1508 System Restore.exe 1676 backup.exe 528 backup.exe 756 backup.exe 1052 System Restore.exe 1224 backup.exe 1076 data.exe 2020 backup.exe 1624 backup.exe 936 backup.exe 1216 backup.exe 848 backup.exe 1872 backup.exe 1748 backup.exe 880 backup.exe 1304 backup.exe 1992 backup.exe 396 backup.exe 816 backup.exe 1532 backup.exe 1172 backup.exe 1660 backup.exe 1528 backup.exe 852 update.exe 1056 backup.exe 1480 backup.exe 992 backup.exe 1416 backup.exe 1980 backup.exe 1700 backup.exe 560 update.exe 772 backup.exe 364 backup.exe 1716 backup.exe 1440 backup.exe 1388 backup.exe 1952 backup.exe 1920 backup.exe 792 backup.exe 1596 backup.exe 1736 backup.exe 1592 backup.exe 1748 backup.exe 2028 backup.exe 1960 backup.exe 316 backup.exe 1656 backup.exe 1680 backup.exe 1576 backup.exe 1708 backup.exe 1516 backup.exe 536 backup.exe 1192 backup.exe 528 backup.exe 616 backup.exe 596 backup.exe 852 backup.exe 680 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1676 backup.exe 1676 backup.exe 528 backup.exe 528 backup.exe 1676 backup.exe 1676 backup.exe 1052 System Restore.exe 1052 System Restore.exe 1224 backup.exe 1224 backup.exe 1676 backup.exe 1676 backup.exe 1052 System Restore.exe 1052 System Restore.exe 2020 backup.exe 2020 backup.exe 1624 backup.exe 936 backup.exe 1624 backup.exe 936 backup.exe 848 backup.exe 1216 backup.exe 848 backup.exe 1216 backup.exe 848 backup.exe 1216 backup.exe 1216 backup.exe 848 backup.exe 1304 backup.exe 880 backup.exe 880 backup.exe 1304 backup.exe 1304 backup.exe 1304 backup.exe 880 backup.exe 880 backup.exe 1304 backup.exe 1304 backup.exe 880 backup.exe 880 backup.exe 1304 backup.exe 880 backup.exe 880 backup.exe 1528 backup.exe 1528 backup.exe 880 backup.exe 880 backup.exe 880 backup.exe 880 backup.exe 992 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\System Restore.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe update.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 1256 backup.exe 1920 backup.exe 1368 backup.exe 892 backup.exe 1800 backup.exe 1860 backup.exe 1508 System Restore.exe 1676 backup.exe 528 backup.exe 756 backup.exe 1052 System Restore.exe 1224 backup.exe 1076 data.exe 2020 backup.exe 1624 backup.exe 936 backup.exe 1216 backup.exe 848 backup.exe 1872 backup.exe 1748 backup.exe 880 backup.exe 1304 backup.exe 1992 backup.exe 396 backup.exe 816 backup.exe 1532 backup.exe 1172 backup.exe 1660 backup.exe 1528 backup.exe 1056 backup.exe 1480 backup.exe 992 backup.exe 1416 backup.exe 852 update.exe 1980 backup.exe 1700 backup.exe 772 backup.exe 560 update.exe 364 backup.exe 1716 backup.exe 1440 backup.exe 1388 backup.exe 1920 backup.exe 792 backup.exe 1596 backup.exe 1736 backup.exe 1592 backup.exe 1748 backup.exe 2028 backup.exe 1960 backup.exe 316 backup.exe 1656 backup.exe 1680 backup.exe 1576 backup.exe 1708 backup.exe 1516 backup.exe 536 backup.exe 1192 backup.exe 528 backup.exe 616 backup.exe 596 backup.exe 852 backup.exe 680 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1256 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 28 PID 1188 wrote to memory of 1256 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 28 PID 1188 wrote to memory of 1256 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 28 PID 1188 wrote to memory of 1256 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 28 PID 1188 wrote to memory of 1920 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 29 PID 1188 wrote to memory of 1920 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 29 PID 1188 wrote to memory of 1920 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 29 PID 1188 wrote to memory of 1920 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 29 PID 1188 wrote to memory of 1368 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 30 PID 1188 wrote to memory of 1368 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 30 PID 1188 wrote to memory of 1368 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 30 PID 1188 wrote to memory of 1368 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 30 PID 1188 wrote to memory of 892 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 31 PID 1188 wrote to memory of 892 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 31 PID 1188 wrote to memory of 892 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 31 PID 1188 wrote to memory of 892 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 31 PID 1188 wrote to memory of 1800 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 32 PID 1188 wrote to memory of 1800 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 32 PID 1188 wrote to memory of 1800 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 32 PID 1188 wrote to memory of 1800 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 32 PID 1188 wrote to memory of 1860 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 33 PID 1188 wrote to memory of 1860 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 33 PID 1188 wrote to memory of 1860 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 33 PID 1188 wrote to memory of 1860 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 33 PID 1188 wrote to memory of 1508 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 34 PID 1188 wrote to memory of 1508 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 34 PID 1188 wrote to memory of 1508 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 34 PID 1188 wrote to memory of 1508 1188 8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe 34 PID 1256 wrote to memory of 1676 1256 backup.exe 35 PID 1256 wrote to memory of 1676 1256 backup.exe 35 PID 1256 wrote to memory of 1676 1256 backup.exe 35 PID 1256 wrote to memory of 1676 1256 backup.exe 35 PID 1676 wrote to memory of 528 1676 backup.exe 36 PID 1676 wrote to memory of 528 1676 backup.exe 36 PID 1676 wrote to memory of 528 1676 backup.exe 36 PID 1676 wrote to memory of 528 1676 backup.exe 36 PID 528 wrote to memory of 756 528 backup.exe 37 PID 528 wrote to memory of 756 528 backup.exe 37 PID 528 wrote to memory of 756 528 backup.exe 37 PID 528 wrote to memory of 756 528 backup.exe 37 PID 1676 wrote to memory of 1052 1676 backup.exe 38 PID 1676 wrote to memory of 1052 1676 backup.exe 38 PID 1676 wrote to memory of 1052 1676 backup.exe 38 PID 1676 wrote to memory of 1052 1676 backup.exe 38 PID 1052 wrote to memory of 1224 1052 System Restore.exe 39 PID 1052 wrote to memory of 1224 1052 System Restore.exe 39 PID 1052 wrote to memory of 1224 1052 System Restore.exe 39 PID 1052 wrote to memory of 1224 1052 System Restore.exe 39 PID 1224 wrote to memory of 1076 1224 backup.exe 40 PID 1224 wrote to memory of 1076 1224 backup.exe 40 PID 1224 wrote to memory of 1076 1224 backup.exe 40 PID 1224 wrote to memory of 1076 1224 backup.exe 40 PID 1676 wrote to memory of 2020 1676 backup.exe 41 PID 1676 wrote to memory of 2020 1676 backup.exe 41 PID 1676 wrote to memory of 2020 1676 backup.exe 41 PID 1676 wrote to memory of 2020 1676 backup.exe 41 PID 1052 wrote to memory of 1624 1052 System Restore.exe 42 PID 1052 wrote to memory of 1624 1052 System Restore.exe 42 PID 1052 wrote to memory of 1624 1052 System Restore.exe 42 PID 1052 wrote to memory of 1624 1052 System Restore.exe 42 PID 2020 wrote to memory of 936 2020 backup.exe 43 PID 2020 wrote to memory of 936 2020 backup.exe 43 PID 2020 wrote to memory of 936 2020 backup.exe 43 PID 2020 wrote to memory of 936 2020 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe"C:\Users\Admin\AppData\Local\Temp\8ed5a80f48044a9dc8e53ae925986661fa0f1d387b568971dcb23cfdf77d06a7.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\1165509131\backup.exeC:\Users\Admin\AppData\Local\Temp\1165509131\backup.exe C:\Users\Admin\AppData\Local\Temp\1165509131\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1256 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:528 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:756
-
-
-
C:\Program Files\System Restore.exe"C:\Program Files\System Restore.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1052 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1224 -
C:\Program Files\7-Zip\Lang\data.exe"C:\Program Files\7-Zip\Lang\data.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1076
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:396
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:852
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
- System policy modification
PID:1952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Disables RegEdit via registry modification
PID:872
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1632
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1396
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1064
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:672
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:1528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- System policy modification
PID:852
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Disables RegEdit via registry modification
PID:1396
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1816
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵PID:1192
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵PID:1916
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:2008
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1660
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- System policy modification
PID:1428
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1536 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Disables RegEdit via registry modification
PID:1480
-
-
-
C:\Program Files\Common Files\System\update.exe"C:\Program Files\Common Files\System\update.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1788 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1592 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1388
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:976
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1568
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:2028
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1920 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Disables RegEdit via registry modification
PID:396
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
PID:1680
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- System policy modification
PID:1516
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:680
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Disables RegEdit via registry modification
PID:1260
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:396
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:784 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:292
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:304
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1816
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2020 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1216 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:880 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1480
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1980
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:364 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1440
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1388 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1920 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:316
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:852
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1832 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Drops file in Program Files directory
PID:1224 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- System policy modification
PID:972
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:472
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1464 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1960
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\9⤵
- Drops file in Program Files directory
- System policy modification
PID:756 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\10⤵
- System policy modification
PID:880 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\11⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:288
-
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:472
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵
- Drops file in Program Files directory
PID:1332 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1540 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\10⤵PID:1600
-
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1388
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:572
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1596 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Disables RegEdit via registry modification
PID:744 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
PID:548
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1888 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:560 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\update.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\update.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9⤵
- Disables RegEdit via registry modification
PID:1952 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\10⤵
- Modifies visibility of file extensions in Explorer
PID:384
-
-
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵
- System policy modification
PID:1960
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:668
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1532
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1120
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:836
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
PID:1196 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:816 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:668
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:1956
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:1688
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1484
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1988
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1216
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:1416
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:928
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1672
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5191beb2d2d04e082d0d179fdc3b3e764
SHA1b78609f940bed7c84636404a5d8bf9e40294cc20
SHA256ca4f6064e800c1bf2a59fc5733e6536d128d928753d4efd7c641222d659b640b
SHA5121142a65436b15b87f2dbbe7d8e460c067466dd70f706171ea413aba68c7d85516ad1560454b50875ad162b7f177cf0b24d677fb4d4971d6f5ea656ada8c64d4c
-
Filesize
72KB
MD521a5a80731f6bc1f155bdc3dcdc700af
SHA1f21ffce523efe88023cdba2be4e5542d39412306
SHA256375f81b07b5fa692a2660b9fd6c5e6bb1f8c60a5f22fbde4110f1b7ec6942588
SHA512aa9de62a3b3b25bb4f09e95908576b3f3dfb172d6a23c39de5c3542b9d0a20d8b5e9897fd4a2c69668fc2bc5199f19c7351c092c8d77e69f3502095c8623b829
-
Filesize
72KB
MD521a5a80731f6bc1f155bdc3dcdc700af
SHA1f21ffce523efe88023cdba2be4e5542d39412306
SHA256375f81b07b5fa692a2660b9fd6c5e6bb1f8c60a5f22fbde4110f1b7ec6942588
SHA512aa9de62a3b3b25bb4f09e95908576b3f3dfb172d6a23c39de5c3542b9d0a20d8b5e9897fd4a2c69668fc2bc5199f19c7351c092c8d77e69f3502095c8623b829
-
Filesize
72KB
MD55d46fe26ec134e977cf987459b4de7ea
SHA10066b6b2b0a367f2271fe9b7d4f2c0c6bc73b1ae
SHA256624c1cd4181164250722943c4fe0f1ad56db1401f310ff11322e8ebf206d6fc8
SHA512d240adf464ecd8e1fcff16a750f5d5186421580abbe411693e4ec8124e7576fe30d1daa8fdd6a86156dafce24aeb4d1542a33329b11f5509a0d24198efe539ef
-
Filesize
72KB
MD55d46fe26ec134e977cf987459b4de7ea
SHA10066b6b2b0a367f2271fe9b7d4f2c0c6bc73b1ae
SHA256624c1cd4181164250722943c4fe0f1ad56db1401f310ff11322e8ebf206d6fc8
SHA512d240adf464ecd8e1fcff16a750f5d5186421580abbe411693e4ec8124e7576fe30d1daa8fdd6a86156dafce24aeb4d1542a33329b11f5509a0d24198efe539ef
-
Filesize
72KB
MD5ee155d710e2f7b4dda34acb8fb9616c9
SHA1e3c7fb9cace8ee1c2103955c0843fc5bbdda7c62
SHA25649f15a8ffddfd996a53d9cb63a9f5aecd68ff88ac26f03c8e25ad39a4869f0bd
SHA512a44505144a6611b429ad3582602a4fcd1341a5c61f243fda709775d2242afdb5d8b5d4de1479321b3b34a55b73d64f00373280dbcb1efb19d1bba952901e9c12
-
Filesize
72KB
MD5ee155d710e2f7b4dda34acb8fb9616c9
SHA1e3c7fb9cace8ee1c2103955c0843fc5bbdda7c62
SHA25649f15a8ffddfd996a53d9cb63a9f5aecd68ff88ac26f03c8e25ad39a4869f0bd
SHA512a44505144a6611b429ad3582602a4fcd1341a5c61f243fda709775d2242afdb5d8b5d4de1479321b3b34a55b73d64f00373280dbcb1efb19d1bba952901e9c12
-
Filesize
72KB
MD56884078aadffc270f34bf89896bc7f6a
SHA1eb7eb2d4d3b93f8703506f4652a86c590ae582f6
SHA25661435e311d2bfb0eb42a745204f3b592072fa3219c6fa33303e38d6d51f1b344
SHA512a9d713face991991e382f747726c718553fbc55487c717a047658d9dbdcfd43cced7fd55192d58b83ed9c974f0dc3af9e4024d90c626955ac6b000bf67d5660d
-
Filesize
72KB
MD56884078aadffc270f34bf89896bc7f6a
SHA1eb7eb2d4d3b93f8703506f4652a86c590ae582f6
SHA25661435e311d2bfb0eb42a745204f3b592072fa3219c6fa33303e38d6d51f1b344
SHA512a9d713face991991e382f747726c718553fbc55487c717a047658d9dbdcfd43cced7fd55192d58b83ed9c974f0dc3af9e4024d90c626955ac6b000bf67d5660d
-
Filesize
72KB
MD5a2f20c0c19d4ba02e53a5bf9de61b148
SHA15c740ffc5a724cd4b8ae46e96164f950a3f3198c
SHA256b19f2bd787adfa586aba26b904f31c46e42e0189ea99ad7b77d6efddb35f59da
SHA51286362df795a709c7c5982c30005597338aec36f2e176bc0dacb878201aaf411fa6e5ab7f53a0c9e025a031e4427bde4f2ba5206c999275656a6caa642e06bc4d
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD58d2b2acf86d5d24179d0ba70ad92c904
SHA1b1f9017fc14df94f1ef0198e96d92123ce465b88
SHA25646117f4add40a5e9edcedd80a670119599b9d5630d4d1da3c44346581a11e23e
SHA51221820e80d3b7c052a1af9a0c28639ef54fb396bf7d591fa6570423a79d7b25144874fb64ebad50cdd3890ccd3b9bc7717a44aed7dc3461905e29541c6aa87f03
-
Filesize
72KB
MD58d2b2acf86d5d24179d0ba70ad92c904
SHA1b1f9017fc14df94f1ef0198e96d92123ce465b88
SHA25646117f4add40a5e9edcedd80a670119599b9d5630d4d1da3c44346581a11e23e
SHA51221820e80d3b7c052a1af9a0c28639ef54fb396bf7d591fa6570423a79d7b25144874fb64ebad50cdd3890ccd3b9bc7717a44aed7dc3461905e29541c6aa87f03
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD5f0361a8a7467920934694b5b1345c511
SHA186e104aaa756276405ef62bdc34a4c43e7f4941d
SHA256de1a2e92e23cdf442486cfc03fae689088aa6e164c57c3d2bcb127706e772be3
SHA512a4673b91fb15a5cdf44dba659b5d3b2eabe116bc72828aa9a3965cbc446d6d6b4d5b723a007ee4ada151a11dd8a603e991f43a7aa62422d581f64512f1f877d4
-
Filesize
72KB
MD5f0361a8a7467920934694b5b1345c511
SHA186e104aaa756276405ef62bdc34a4c43e7f4941d
SHA256de1a2e92e23cdf442486cfc03fae689088aa6e164c57c3d2bcb127706e772be3
SHA512a4673b91fb15a5cdf44dba659b5d3b2eabe116bc72828aa9a3965cbc446d6d6b4d5b723a007ee4ada151a11dd8a603e991f43a7aa62422d581f64512f1f877d4
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD5a3038c171b15fc8b01aa27eae43dbe0f
SHA131be0f2a6ce35cd433dda488679eef9d92d2f184
SHA256ae1376b2bdf01e9d91ee1ffb8392379ada99623e01624b4ca721fd9335bd9f2e
SHA5126c1b3c5100379e612b29cec2669a384637cdef28b835ffa201e6e8bbc60fc7257b282c437832d7587e7f4bf4ca8648936853be37ba2d43ef19e44d0380898a25
-
Filesize
72KB
MD5a3038c171b15fc8b01aa27eae43dbe0f
SHA131be0f2a6ce35cd433dda488679eef9d92d2f184
SHA256ae1376b2bdf01e9d91ee1ffb8392379ada99623e01624b4ca721fd9335bd9f2e
SHA5126c1b3c5100379e612b29cec2669a384637cdef28b835ffa201e6e8bbc60fc7257b282c437832d7587e7f4bf4ca8648936853be37ba2d43ef19e44d0380898a25
-
Filesize
72KB
MD5191beb2d2d04e082d0d179fdc3b3e764
SHA1b78609f940bed7c84636404a5d8bf9e40294cc20
SHA256ca4f6064e800c1bf2a59fc5733e6536d128d928753d4efd7c641222d659b640b
SHA5121142a65436b15b87f2dbbe7d8e460c067466dd70f706171ea413aba68c7d85516ad1560454b50875ad162b7f177cf0b24d677fb4d4971d6f5ea656ada8c64d4c
-
Filesize
72KB
MD5191beb2d2d04e082d0d179fdc3b3e764
SHA1b78609f940bed7c84636404a5d8bf9e40294cc20
SHA256ca4f6064e800c1bf2a59fc5733e6536d128d928753d4efd7c641222d659b640b
SHA5121142a65436b15b87f2dbbe7d8e460c067466dd70f706171ea413aba68c7d85516ad1560454b50875ad162b7f177cf0b24d677fb4d4971d6f5ea656ada8c64d4c
-
Filesize
72KB
MD521a5a80731f6bc1f155bdc3dcdc700af
SHA1f21ffce523efe88023cdba2be4e5542d39412306
SHA256375f81b07b5fa692a2660b9fd6c5e6bb1f8c60a5f22fbde4110f1b7ec6942588
SHA512aa9de62a3b3b25bb4f09e95908576b3f3dfb172d6a23c39de5c3542b9d0a20d8b5e9897fd4a2c69668fc2bc5199f19c7351c092c8d77e69f3502095c8623b829
-
Filesize
72KB
MD521a5a80731f6bc1f155bdc3dcdc700af
SHA1f21ffce523efe88023cdba2be4e5542d39412306
SHA256375f81b07b5fa692a2660b9fd6c5e6bb1f8c60a5f22fbde4110f1b7ec6942588
SHA512aa9de62a3b3b25bb4f09e95908576b3f3dfb172d6a23c39de5c3542b9d0a20d8b5e9897fd4a2c69668fc2bc5199f19c7351c092c8d77e69f3502095c8623b829
-
Filesize
72KB
MD54b4abad647932f62c1a0c269a5c491c4
SHA1eceb9ef7c3d7adb01961697249eb8b10a142c9cc
SHA2566f0ad7eb40a40733f7a41242c632206e72f5df6145552800e02241e5e92f7f22
SHA51208e879914328009f77fc67b2fb4ff254d8204447b66a6edce05d22394d76305295277ecb9776180e0b40998b6b9fd64f2cb479501b0a7d1f9cb10e809babfbfa
-
Filesize
72KB
MD55d46fe26ec134e977cf987459b4de7ea
SHA10066b6b2b0a367f2271fe9b7d4f2c0c6bc73b1ae
SHA256624c1cd4181164250722943c4fe0f1ad56db1401f310ff11322e8ebf206d6fc8
SHA512d240adf464ecd8e1fcff16a750f5d5186421580abbe411693e4ec8124e7576fe30d1daa8fdd6a86156dafce24aeb4d1542a33329b11f5509a0d24198efe539ef
-
Filesize
72KB
MD55d46fe26ec134e977cf987459b4de7ea
SHA10066b6b2b0a367f2271fe9b7d4f2c0c6bc73b1ae
SHA256624c1cd4181164250722943c4fe0f1ad56db1401f310ff11322e8ebf206d6fc8
SHA512d240adf464ecd8e1fcff16a750f5d5186421580abbe411693e4ec8124e7576fe30d1daa8fdd6a86156dafce24aeb4d1542a33329b11f5509a0d24198efe539ef
-
Filesize
72KB
MD5ee155d710e2f7b4dda34acb8fb9616c9
SHA1e3c7fb9cace8ee1c2103955c0843fc5bbdda7c62
SHA25649f15a8ffddfd996a53d9cb63a9f5aecd68ff88ac26f03c8e25ad39a4869f0bd
SHA512a44505144a6611b429ad3582602a4fcd1341a5c61f243fda709775d2242afdb5d8b5d4de1479321b3b34a55b73d64f00373280dbcb1efb19d1bba952901e9c12
-
Filesize
72KB
MD5ee155d710e2f7b4dda34acb8fb9616c9
SHA1e3c7fb9cace8ee1c2103955c0843fc5bbdda7c62
SHA25649f15a8ffddfd996a53d9cb63a9f5aecd68ff88ac26f03c8e25ad39a4869f0bd
SHA512a44505144a6611b429ad3582602a4fcd1341a5c61f243fda709775d2242afdb5d8b5d4de1479321b3b34a55b73d64f00373280dbcb1efb19d1bba952901e9c12
-
Filesize
72KB
MD56884078aadffc270f34bf89896bc7f6a
SHA1eb7eb2d4d3b93f8703506f4652a86c590ae582f6
SHA25661435e311d2bfb0eb42a745204f3b592072fa3219c6fa33303e38d6d51f1b344
SHA512a9d713face991991e382f747726c718553fbc55487c717a047658d9dbdcfd43cced7fd55192d58b83ed9c974f0dc3af9e4024d90c626955ac6b000bf67d5660d
-
Filesize
72KB
MD56884078aadffc270f34bf89896bc7f6a
SHA1eb7eb2d4d3b93f8703506f4652a86c590ae582f6
SHA25661435e311d2bfb0eb42a745204f3b592072fa3219c6fa33303e38d6d51f1b344
SHA512a9d713face991991e382f747726c718553fbc55487c717a047658d9dbdcfd43cced7fd55192d58b83ed9c974f0dc3af9e4024d90c626955ac6b000bf67d5660d
-
Filesize
72KB
MD5a2f20c0c19d4ba02e53a5bf9de61b148
SHA15c740ffc5a724cd4b8ae46e96164f950a3f3198c
SHA256b19f2bd787adfa586aba26b904f31c46e42e0189ea99ad7b77d6efddb35f59da
SHA51286362df795a709c7c5982c30005597338aec36f2e176bc0dacb878201aaf411fa6e5ab7f53a0c9e025a031e4427bde4f2ba5206c999275656a6caa642e06bc4d
-
Filesize
72KB
MD5a2f20c0c19d4ba02e53a5bf9de61b148
SHA15c740ffc5a724cd4b8ae46e96164f950a3f3198c
SHA256b19f2bd787adfa586aba26b904f31c46e42e0189ea99ad7b77d6efddb35f59da
SHA51286362df795a709c7c5982c30005597338aec36f2e176bc0dacb878201aaf411fa6e5ab7f53a0c9e025a031e4427bde4f2ba5206c999275656a6caa642e06bc4d
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD563477a289ca032ebc8cebece443284bc
SHA1bcf0d5b8601baed626d5e411bdc58ea12146c4a7
SHA256408135222b3ab591df020788504f33c30e76b917f1f1cbc41b142ad96258b59a
SHA5129701e1fbc45f22accd340418866fa2a6d60213dc0f339d179bc727db3112d02839c4737b0bcb31306c3a3b6471db270ca36c0572d7eeb699935ab5f3f00df492
-
Filesize
72KB
MD58d2b2acf86d5d24179d0ba70ad92c904
SHA1b1f9017fc14df94f1ef0198e96d92123ce465b88
SHA25646117f4add40a5e9edcedd80a670119599b9d5630d4d1da3c44346581a11e23e
SHA51221820e80d3b7c052a1af9a0c28639ef54fb396bf7d591fa6570423a79d7b25144874fb64ebad50cdd3890ccd3b9bc7717a44aed7dc3461905e29541c6aa87f03
-
Filesize
72KB
MD58d2b2acf86d5d24179d0ba70ad92c904
SHA1b1f9017fc14df94f1ef0198e96d92123ce465b88
SHA25646117f4add40a5e9edcedd80a670119599b9d5630d4d1da3c44346581a11e23e
SHA51221820e80d3b7c052a1af9a0c28639ef54fb396bf7d591fa6570423a79d7b25144874fb64ebad50cdd3890ccd3b9bc7717a44aed7dc3461905e29541c6aa87f03
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD5c5a1a7ae28fc990150c2877d1df95942
SHA1548531c8721794dae08d66c7ddc38dd009575729
SHA256d3ad941998724d7a53156be6b97c97e49aca5d953eb52fac84424dba7535a5b4
SHA512f82cd038e45b6a86e3bfd9413942305c0c1dd709e1699a5b1784b859febd23a92286428417a0eb972a27abe96ce05597fe89bbd4f015932982b46c22b0c48443
-
Filesize
72KB
MD5f0361a8a7467920934694b5b1345c511
SHA186e104aaa756276405ef62bdc34a4c43e7f4941d
SHA256de1a2e92e23cdf442486cfc03fae689088aa6e164c57c3d2bcb127706e772be3
SHA512a4673b91fb15a5cdf44dba659b5d3b2eabe116bc72828aa9a3965cbc446d6d6b4d5b723a007ee4ada151a11dd8a603e991f43a7aa62422d581f64512f1f877d4
-
Filesize
72KB
MD5f0361a8a7467920934694b5b1345c511
SHA186e104aaa756276405ef62bdc34a4c43e7f4941d
SHA256de1a2e92e23cdf442486cfc03fae689088aa6e164c57c3d2bcb127706e772be3
SHA512a4673b91fb15a5cdf44dba659b5d3b2eabe116bc72828aa9a3965cbc446d6d6b4d5b723a007ee4ada151a11dd8a603e991f43a7aa62422d581f64512f1f877d4
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78
-
Filesize
72KB
MD578106c1ff2996e3bc62c4d8e4ca62407
SHA1d75cdf2c88e009ecf660f55e6f4e29f4b4c9eaa5
SHA25625eaf127a6d754004063fba6880f76e8d1acc409b1d67b94c7b6cef4203fea68
SHA512af4e550fdd85530ceba716c04ce76922cace99fbb9e9c2d803dd3ef34a27ebccd44d6ae252c3f772c416fb353757566b8a5b2684a008271e2b6e408d0d6d0a78