Analysis
-
max time kernel
160s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe
Resource
win10v2004-20221111-en
General
-
Target
425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe
-
Size
72KB
-
MD5
06f27d1180e12302fbd201da76ad7927
-
SHA1
f5acf0d2545606f9324184906221b59fe22cbdb5
-
SHA256
425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29
-
SHA512
3b267912df37c26ba290be9af357085b88e183da0eec8887adefa1987c6748e93466a9bd9d00f3bc8373c9339337911848a030aea180b37b3ae2d95a42e5bdef
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2H:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPz
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 844 backup.exe 828 backup.exe 940 update.exe 944 update.exe 1760 System Restore.exe 1620 backup.exe 380 backup.exe 1676 backup.exe 576 update.exe 956 backup.exe 460 backup.exe 1672 backup.exe 548 backup.exe 1548 backup.exe 1660 System Restore.exe 1708 backup.exe 1604 backup.exe 1232 backup.exe 1208 backup.exe 984 backup.exe 1580 backup.exe 1780 backup.exe 1800 backup.exe 1592 backup.exe 1808 System Restore.exe 1768 data.exe 1792 backup.exe 616 backup.exe 936 backup.exe 1760 System Restore.exe 1628 backup.exe 564 backup.exe 1676 backup.exe 1536 backup.exe 1600 backup.exe 1728 data.exe 1788 backup.exe 676 backup.exe 460 backup.exe 1248 backup.exe 1848 backup.exe 548 backup.exe 1828 backup.exe 1344 backup.exe 1056 backup.exe 1500 backup.exe 1612 backup.exe 1156 data.exe 1940 backup.exe 1088 backup.exe 1928 backup.exe 1580 backup.exe 1324 backup.exe 1784 backup.exe 1448 update.exe 1768 backup.exe 1176 backup.exe 940 backup.exe 1468 backup.exe 1860 backup.exe 1556 backup.exe 1516 backup.exe 1572 backup.exe 1600 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 828 backup.exe 940 update.exe 944 update.exe 940 update.exe 944 update.exe 944 update.exe 940 update.exe 944 update.exe 944 update.exe 1760 System Restore.exe 1760 System Restore.exe 1760 System Restore.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 828 backup.exe 828 backup.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 576 update.exe 576 update.exe 576 update.exe 380 backup.exe 380 backup.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 956 backup.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 956 backup.exe 380 backup.exe 380 backup.exe 1548 backup.exe 1548 backup.exe 1660 System Restore.exe 1660 System Restore.exe 1660 System Restore.exe 1660 System Restore.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 1604 backup.exe 828 backup.exe 828 backup.exe 1792 backup.exe 1792 backup.exe 1604 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe data.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\System Restore.exe data.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\data.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe data.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 844 backup.exe 828 backup.exe 944 update.exe 940 update.exe 1760 System Restore.exe 1620 backup.exe 380 backup.exe 1676 backup.exe 576 update.exe 956 backup.exe 460 backup.exe 1672 backup.exe 548 backup.exe 1548 backup.exe 1660 System Restore.exe 1708 backup.exe 1604 backup.exe 1232 backup.exe 1208 backup.exe 984 backup.exe 1580 backup.exe 1780 backup.exe 1800 backup.exe 1592 backup.exe 1808 System Restore.exe 1768 data.exe 1792 backup.exe 616 backup.exe 936 backup.exe 1760 System Restore.exe 1628 backup.exe 564 backup.exe 1676 backup.exe 1536 backup.exe 1728 data.exe 1600 backup.exe 1788 backup.exe 676 backup.exe 460 backup.exe 1248 backup.exe 1848 backup.exe 548 backup.exe 1828 backup.exe 1344 backup.exe 1056 backup.exe 1500 backup.exe 1612 backup.exe 1156 data.exe 1940 backup.exe 1088 backup.exe 1928 backup.exe 1580 backup.exe 1324 backup.exe 1784 backup.exe 1448 update.exe 1768 backup.exe 1176 backup.exe 940 backup.exe 1468 backup.exe 1556 backup.exe 1860 backup.exe 1572 backup.exe 1516 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 844 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 26 PID 1348 wrote to memory of 844 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 26 PID 1348 wrote to memory of 844 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 26 PID 1348 wrote to memory of 844 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 26 PID 844 wrote to memory of 828 844 backup.exe 28 PID 844 wrote to memory of 828 844 backup.exe 28 PID 844 wrote to memory of 828 844 backup.exe 28 PID 844 wrote to memory of 828 844 backup.exe 28 PID 1348 wrote to memory of 940 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 27 PID 1348 wrote to memory of 940 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 27 PID 1348 wrote to memory of 940 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 27 PID 1348 wrote to memory of 940 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 27 PID 1348 wrote to memory of 940 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 27 PID 1348 wrote to memory of 940 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 27 PID 1348 wrote to memory of 940 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 27 PID 828 wrote to memory of 944 828 backup.exe 29 PID 828 wrote to memory of 944 828 backup.exe 29 PID 828 wrote to memory of 944 828 backup.exe 29 PID 828 wrote to memory of 944 828 backup.exe 29 PID 828 wrote to memory of 944 828 backup.exe 29 PID 828 wrote to memory of 944 828 backup.exe 29 PID 828 wrote to memory of 944 828 backup.exe 29 PID 944 wrote to memory of 1760 944 update.exe 30 PID 944 wrote to memory of 1760 944 update.exe 30 PID 944 wrote to memory of 1760 944 update.exe 30 PID 944 wrote to memory of 1760 944 update.exe 30 PID 944 wrote to memory of 1760 944 update.exe 30 PID 944 wrote to memory of 1760 944 update.exe 30 PID 944 wrote to memory of 1760 944 update.exe 30 PID 1348 wrote to memory of 1620 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 31 PID 1348 wrote to memory of 1620 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 31 PID 1348 wrote to memory of 1620 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 31 PID 1348 wrote to memory of 1620 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 31 PID 828 wrote to memory of 380 828 backup.exe 33 PID 828 wrote to memory of 380 828 backup.exe 33 PID 828 wrote to memory of 380 828 backup.exe 33 PID 828 wrote to memory of 380 828 backup.exe 33 PID 1348 wrote to memory of 1676 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 32 PID 1348 wrote to memory of 1676 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 32 PID 1348 wrote to memory of 1676 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 32 PID 1348 wrote to memory of 1676 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 32 PID 1348 wrote to memory of 576 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 34 PID 1348 wrote to memory of 576 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 34 PID 1348 wrote to memory of 576 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 34 PID 1348 wrote to memory of 576 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 34 PID 1348 wrote to memory of 576 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 34 PID 1348 wrote to memory of 576 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 34 PID 1348 wrote to memory of 576 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 34 PID 380 wrote to memory of 956 380 backup.exe 35 PID 380 wrote to memory of 956 380 backup.exe 35 PID 380 wrote to memory of 956 380 backup.exe 35 PID 380 wrote to memory of 956 380 backup.exe 35 PID 1348 wrote to memory of 460 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 36 PID 1348 wrote to memory of 460 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 36 PID 1348 wrote to memory of 460 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 36 PID 1348 wrote to memory of 460 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 36 PID 1348 wrote to memory of 1672 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 38 PID 1348 wrote to memory of 1672 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 38 PID 1348 wrote to memory of 1672 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 38 PID 1348 wrote to memory of 1672 1348 425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe 38 PID 956 wrote to memory of 548 956 backup.exe 37 PID 956 wrote to memory of 548 956 backup.exe 37 PID 956 wrote to memory of 548 956 backup.exe 37 PID 956 wrote to memory of 548 956 backup.exe 37 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe"C:\Users\Admin\AppData\Local\Temp\425973d0590642fb38c65060e4a969f7a7e7c322c56fd5b7148fa7303c997e29.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\2936179798\backup.exeC:\Users\Admin\AppData\Local\Temp\2936179798\backup.exe C:\Users\Admin\AppData\Local\Temp\2936179798\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:844 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:828 -
C:\PerfLogs\update.exeC:\PerfLogs\update.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:944 -
C:\PerfLogs\Admin\System Restore.exe"C:\PerfLogs\Admin\System Restore.exe" C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:380 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:956 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1548 -
C:\Program Files\Common Files\Microsoft Shared\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1208
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:564 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:460
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1344
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1156
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
PID:948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:1456
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:860
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵PID:1944
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:288
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- System policy modification
PID:1460
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:608
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:936
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1712
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:652
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1584
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:552
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:988
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1784 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:1600
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- System policy modification
PID:460
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1964
-
-
C:\Program Files\Common Files\System\ado\it-IT\data.exe"C:\Program Files\Common Files\System\ado\it-IT\data.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1616
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:796
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1696
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1684
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1560
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:460
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:1324
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1176
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:676
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1788 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1848
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1516
-
-
C:\Program Files\DVD Maker\ja-JP\update.exe"C:\Program Files\DVD Maker\ja-JP\update.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
PID:1636
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Drops file in Program Files directory
PID:1332 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:984 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵PID:1764
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:1868
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:1436
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵PID:764
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵PID:796
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\update.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\update.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\8⤵PID:1760
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\8⤵PID:2024
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
PID:1160
-
-
C:\Program Files\Internet Explorer\data.exe"C:\Program Files\Internet Explorer\data.exe" C:\Program Files\Internet Explorer\5⤵PID:1440
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:880
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1632
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1748
-
-
C:\Program Files\Mozilla Firefox\data.exe"C:\Program Files\Mozilla Firefox\data.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1600
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1792 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1628 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:676
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1056
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1324
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1176 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:2028 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:880
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
PID:1344
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1060 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1476 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1652
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵PID:516
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵PID:1452
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵PID:672
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1336 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵PID:1096
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:948
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:1056
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:564
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:2008
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Disables RegEdit via registry modification
- System policy modification
PID:816
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1860
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:788
-
-
-
C:\Users\update.exeC:\Users\update.exe C:\Users\4⤵PID:1796
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:956
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1088
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\update.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\update.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54d083dfe4e18134088924f5d8beb4ec1
SHA1e9445b51e217f387a70015a1820c9b19dffc1a7e
SHA2564effb6859d481b13c58fc4400ba21e1bdc429e475da3383a8c839f061c05d07c
SHA512fe4e67261e93a3b0ca078a6f3a0fc906e62bd4735e24a616533ca69df0f531ed9934eda9d5d34c19298dc0f9c39607715e990d3a37e90ffb1ba15d1edb7f7a08
-
Filesize
72KB
MD54d083dfe4e18134088924f5d8beb4ec1
SHA1e9445b51e217f387a70015a1820c9b19dffc1a7e
SHA2564effb6859d481b13c58fc4400ba21e1bdc429e475da3383a8c839f061c05d07c
SHA512fe4e67261e93a3b0ca078a6f3a0fc906e62bd4735e24a616533ca69df0f531ed9934eda9d5d34c19298dc0f9c39607715e990d3a37e90ffb1ba15d1edb7f7a08
-
Filesize
72KB
MD5cbbe244564f356f4950db8452335fdc8
SHA11d6145075941a21cb54e896b99a67f50a45e9299
SHA25636843ecaf52184f47e3e2881a5e2eedc7d79236869c776935b0687b05c6e1ae4
SHA51210e7a94c672ae23d959c134a8a267f0211b010c0ed9cdff826a5e7b58d448e27ba97d1df0058742fd6429bd1d77c1506fa99b172e91b2c2cc4daf0f931a29efd
-
Filesize
72KB
MD5cbbe244564f356f4950db8452335fdc8
SHA11d6145075941a21cb54e896b99a67f50a45e9299
SHA25636843ecaf52184f47e3e2881a5e2eedc7d79236869c776935b0687b05c6e1ae4
SHA51210e7a94c672ae23d959c134a8a267f0211b010c0ed9cdff826a5e7b58d448e27ba97d1df0058742fd6429bd1d77c1506fa99b172e91b2c2cc4daf0f931a29efd
-
Filesize
72KB
MD564d75062aae3db162571eb9637a33d2c
SHA192b50a5afd150bf510e46d2e7d823f2e40499c03
SHA256463829f484d50ca96426ea0ffedd61837b928ea699cf2397c4b0a0a885b0a0f2
SHA5120596d3aaf917dab2c43647a0258db30a59aa69b69ff3156a1a6d5962505ca94681fbd47a54f4a5c05edef893c0efb889ab717ed81faa5550c95b5293a0ae22a2
-
Filesize
72KB
MD57863270aa0deda7a65aa703fbb513465
SHA1df5027fd814d4600977e598d76facda086849351
SHA256a707df6eb44891148290744cf91e8546d6a4faebf7c2e2b6863a9f06229bb833
SHA5123c02dea59bb22a6efd95bf30977aa9813c6fdeac75f37141aa4c8f6ca86863653fd347b8bdfc01df27a24f9bb78024f9bab19cf13087bc73f016ba3862c6d096
-
Filesize
72KB
MD57863270aa0deda7a65aa703fbb513465
SHA1df5027fd814d4600977e598d76facda086849351
SHA256a707df6eb44891148290744cf91e8546d6a4faebf7c2e2b6863a9f06229bb833
SHA5123c02dea59bb22a6efd95bf30977aa9813c6fdeac75f37141aa4c8f6ca86863653fd347b8bdfc01df27a24f9bb78024f9bab19cf13087bc73f016ba3862c6d096
-
Filesize
72KB
MD56b842c6befb6e353769bdd1cefdccbe3
SHA16f0f60727c617969d0474a696cad02f86798b84c
SHA2565a451dc10dbadb5ac34f95c7f4c04dafddce3a2fa902b076e647d89be9dae07f
SHA5122e20ea657bf9756d6915b067a758dca0461979b08b2842aca9b99c351e7eea6a3d0e27313ff26bdb23e8511d4a183fcfd34c037f9bd5d2dda4a4e2b325c39a38
-
Filesize
72KB
MD56b842c6befb6e353769bdd1cefdccbe3
SHA16f0f60727c617969d0474a696cad02f86798b84c
SHA2565a451dc10dbadb5ac34f95c7f4c04dafddce3a2fa902b076e647d89be9dae07f
SHA5122e20ea657bf9756d6915b067a758dca0461979b08b2842aca9b99c351e7eea6a3d0e27313ff26bdb23e8511d4a183fcfd34c037f9bd5d2dda4a4e2b325c39a38
-
Filesize
72KB
MD58358ca7dba27d24f079dd906a3734c0b
SHA1f13ebaca5da22d75e72467c2420add685f807517
SHA25655e594d48a20f744d00d040577cf789e74c8c6f032db170cf0d4fb1385cbff1c
SHA512f22353d65466b3e6ae944172303e2c2a1449e0122f010e4873914187d2368eead828782c7b87cba871593a8867d93806afa8205e9b41c3392fd27ce7026ff7db
-
Filesize
72KB
MD58358ca7dba27d24f079dd906a3734c0b
SHA1f13ebaca5da22d75e72467c2420add685f807517
SHA25655e594d48a20f744d00d040577cf789e74c8c6f032db170cf0d4fb1385cbff1c
SHA512f22353d65466b3e6ae944172303e2c2a1449e0122f010e4873914187d2368eead828782c7b87cba871593a8867d93806afa8205e9b41c3392fd27ce7026ff7db
-
Filesize
72KB
MD5b3d38435c43a98e6f9cd85575690414c
SHA1b00b742adbacf725a0632204c817f2e3d31752d6
SHA2565954be11b501921e18c06e0c6e1c409257399a57287b0f64ae4ac24add73d3f2
SHA5127a472a7b834a78e96facd64bea556c56a0773e39cdcc2f77b02156264b02c97681248d698a1e26204d229b339540fe0e74281faee4f094d03bc3c6615ffc75d9
-
Filesize
72KB
MD5b3d38435c43a98e6f9cd85575690414c
SHA1b00b742adbacf725a0632204c817f2e3d31752d6
SHA2565954be11b501921e18c06e0c6e1c409257399a57287b0f64ae4ac24add73d3f2
SHA5127a472a7b834a78e96facd64bea556c56a0773e39cdcc2f77b02156264b02c97681248d698a1e26204d229b339540fe0e74281faee4f094d03bc3c6615ffc75d9
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD5cac4e5d63611c928df9593ed3d5bc642
SHA198aeee8602a4527b1ac333e8c28577325e372a76
SHA256e7062af248505c433b0c87e031e88f6239c411b0f9b11cabceeb2b2b1e41acbe
SHA5124f9c67396f9e0b09b1804a0734f4f51f826a0e82a7bce38b7ab9c054b1baa1d6257e1599d8cc76aab301570b0c2c3316491209c6121a5e3064fed38473bc2a4b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cac4e5d63611c928df9593ed3d5bc642
SHA198aeee8602a4527b1ac333e8c28577325e372a76
SHA256e7062af248505c433b0c87e031e88f6239c411b0f9b11cabceeb2b2b1e41acbe
SHA5124f9c67396f9e0b09b1804a0734f4f51f826a0e82a7bce38b7ab9c054b1baa1d6257e1599d8cc76aab301570b0c2c3316491209c6121a5e3064fed38473bc2a4b
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD51ca421953e0ed9f7d5ab35d51f9acc33
SHA100b3c8d6a73e088aaf5fd03817879d109d6134cf
SHA256e1d850920e744a5e42345a1bd80ddf0bd21e1b9dcbf0edaf1239221ed32b8814
SHA512b3f1cf899976eed801fbc10dd7b2e9510551c188e7117bc2d02e41379702e3b48b01e8f8e840ca59697c6b625c62ce97eba333506653f5d35db9785a801b3bb6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD51ca421953e0ed9f7d5ab35d51f9acc33
SHA100b3c8d6a73e088aaf5fd03817879d109d6134cf
SHA256e1d850920e744a5e42345a1bd80ddf0bd21e1b9dcbf0edaf1239221ed32b8814
SHA512b3f1cf899976eed801fbc10dd7b2e9510551c188e7117bc2d02e41379702e3b48b01e8f8e840ca59697c6b625c62ce97eba333506653f5d35db9785a801b3bb6
-
Filesize
72KB
MD55f0b1c709d1d4ffe05f5eec7d9ab42f5
SHA193a6b68d795a77e81779842637480385a1093633
SHA2567615c9e06071e54fc8a6854ad8b640f70424377e13a0ed8f278cfe8c487b24c5
SHA512ca1f67582cee5f874bda952013a7770238944a5c304b1669cb7399e0a7b334089ae09fe1aa1adba48a08d66a9fc4d981500df3b8ec6647a3eb2ef21a5ed0d67d
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD55f0b1c709d1d4ffe05f5eec7d9ab42f5
SHA193a6b68d795a77e81779842637480385a1093633
SHA2567615c9e06071e54fc8a6854ad8b640f70424377e13a0ed8f278cfe8c487b24c5
SHA512ca1f67582cee5f874bda952013a7770238944a5c304b1669cb7399e0a7b334089ae09fe1aa1adba48a08d66a9fc4d981500df3b8ec6647a3eb2ef21a5ed0d67d
-
Filesize
72KB
MD5134b64fe1e0d6c3205e71edf2f72cd18
SHA11a6ccf9d047d7bbbccafd3662dd0bc9da9275fff
SHA2560deecd7995ac3e0c2733446e348f444e6c6a62a7b48e2164564eeea6a6dd019c
SHA512961a84e1128c6a843f03d372fd22628deb6b45c99740d3c24f36fab65c17c81d13a8ba49466ac67ec3b90d80b5a8a2ec124863044e4106415b19ee80f6faf5ba
-
Filesize
72KB
MD5134b64fe1e0d6c3205e71edf2f72cd18
SHA11a6ccf9d047d7bbbccafd3662dd0bc9da9275fff
SHA2560deecd7995ac3e0c2733446e348f444e6c6a62a7b48e2164564eeea6a6dd019c
SHA512961a84e1128c6a843f03d372fd22628deb6b45c99740d3c24f36fab65c17c81d13a8ba49466ac67ec3b90d80b5a8a2ec124863044e4106415b19ee80f6faf5ba
-
Filesize
72KB
MD54d083dfe4e18134088924f5d8beb4ec1
SHA1e9445b51e217f387a70015a1820c9b19dffc1a7e
SHA2564effb6859d481b13c58fc4400ba21e1bdc429e475da3383a8c839f061c05d07c
SHA512fe4e67261e93a3b0ca078a6f3a0fc906e62bd4735e24a616533ca69df0f531ed9934eda9d5d34c19298dc0f9c39607715e990d3a37e90ffb1ba15d1edb7f7a08
-
Filesize
72KB
MD54d083dfe4e18134088924f5d8beb4ec1
SHA1e9445b51e217f387a70015a1820c9b19dffc1a7e
SHA2564effb6859d481b13c58fc4400ba21e1bdc429e475da3383a8c839f061c05d07c
SHA512fe4e67261e93a3b0ca078a6f3a0fc906e62bd4735e24a616533ca69df0f531ed9934eda9d5d34c19298dc0f9c39607715e990d3a37e90ffb1ba15d1edb7f7a08
-
Filesize
72KB
MD54d083dfe4e18134088924f5d8beb4ec1
SHA1e9445b51e217f387a70015a1820c9b19dffc1a7e
SHA2564effb6859d481b13c58fc4400ba21e1bdc429e475da3383a8c839f061c05d07c
SHA512fe4e67261e93a3b0ca078a6f3a0fc906e62bd4735e24a616533ca69df0f531ed9934eda9d5d34c19298dc0f9c39607715e990d3a37e90ffb1ba15d1edb7f7a08
-
Filesize
72KB
MD54d083dfe4e18134088924f5d8beb4ec1
SHA1e9445b51e217f387a70015a1820c9b19dffc1a7e
SHA2564effb6859d481b13c58fc4400ba21e1bdc429e475da3383a8c839f061c05d07c
SHA512fe4e67261e93a3b0ca078a6f3a0fc906e62bd4735e24a616533ca69df0f531ed9934eda9d5d34c19298dc0f9c39607715e990d3a37e90ffb1ba15d1edb7f7a08
-
Filesize
72KB
MD54d083dfe4e18134088924f5d8beb4ec1
SHA1e9445b51e217f387a70015a1820c9b19dffc1a7e
SHA2564effb6859d481b13c58fc4400ba21e1bdc429e475da3383a8c839f061c05d07c
SHA512fe4e67261e93a3b0ca078a6f3a0fc906e62bd4735e24a616533ca69df0f531ed9934eda9d5d34c19298dc0f9c39607715e990d3a37e90ffb1ba15d1edb7f7a08
-
Filesize
72KB
MD5cbbe244564f356f4950db8452335fdc8
SHA11d6145075941a21cb54e896b99a67f50a45e9299
SHA25636843ecaf52184f47e3e2881a5e2eedc7d79236869c776935b0687b05c6e1ae4
SHA51210e7a94c672ae23d959c134a8a267f0211b010c0ed9cdff826a5e7b58d448e27ba97d1df0058742fd6429bd1d77c1506fa99b172e91b2c2cc4daf0f931a29efd
-
Filesize
72KB
MD5cbbe244564f356f4950db8452335fdc8
SHA11d6145075941a21cb54e896b99a67f50a45e9299
SHA25636843ecaf52184f47e3e2881a5e2eedc7d79236869c776935b0687b05c6e1ae4
SHA51210e7a94c672ae23d959c134a8a267f0211b010c0ed9cdff826a5e7b58d448e27ba97d1df0058742fd6429bd1d77c1506fa99b172e91b2c2cc4daf0f931a29efd
-
Filesize
72KB
MD5cbbe244564f356f4950db8452335fdc8
SHA11d6145075941a21cb54e896b99a67f50a45e9299
SHA25636843ecaf52184f47e3e2881a5e2eedc7d79236869c776935b0687b05c6e1ae4
SHA51210e7a94c672ae23d959c134a8a267f0211b010c0ed9cdff826a5e7b58d448e27ba97d1df0058742fd6429bd1d77c1506fa99b172e91b2c2cc4daf0f931a29efd
-
Filesize
72KB
MD5cbbe244564f356f4950db8452335fdc8
SHA11d6145075941a21cb54e896b99a67f50a45e9299
SHA25636843ecaf52184f47e3e2881a5e2eedc7d79236869c776935b0687b05c6e1ae4
SHA51210e7a94c672ae23d959c134a8a267f0211b010c0ed9cdff826a5e7b58d448e27ba97d1df0058742fd6429bd1d77c1506fa99b172e91b2c2cc4daf0f931a29efd
-
Filesize
72KB
MD564d75062aae3db162571eb9637a33d2c
SHA192b50a5afd150bf510e46d2e7d823f2e40499c03
SHA256463829f484d50ca96426ea0ffedd61837b928ea699cf2397c4b0a0a885b0a0f2
SHA5120596d3aaf917dab2c43647a0258db30a59aa69b69ff3156a1a6d5962505ca94681fbd47a54f4a5c05edef893c0efb889ab717ed81faa5550c95b5293a0ae22a2
-
Filesize
72KB
MD564d75062aae3db162571eb9637a33d2c
SHA192b50a5afd150bf510e46d2e7d823f2e40499c03
SHA256463829f484d50ca96426ea0ffedd61837b928ea699cf2397c4b0a0a885b0a0f2
SHA5120596d3aaf917dab2c43647a0258db30a59aa69b69ff3156a1a6d5962505ca94681fbd47a54f4a5c05edef893c0efb889ab717ed81faa5550c95b5293a0ae22a2
-
Filesize
72KB
MD57863270aa0deda7a65aa703fbb513465
SHA1df5027fd814d4600977e598d76facda086849351
SHA256a707df6eb44891148290744cf91e8546d6a4faebf7c2e2b6863a9f06229bb833
SHA5123c02dea59bb22a6efd95bf30977aa9813c6fdeac75f37141aa4c8f6ca86863653fd347b8bdfc01df27a24f9bb78024f9bab19cf13087bc73f016ba3862c6d096
-
Filesize
72KB
MD57863270aa0deda7a65aa703fbb513465
SHA1df5027fd814d4600977e598d76facda086849351
SHA256a707df6eb44891148290744cf91e8546d6a4faebf7c2e2b6863a9f06229bb833
SHA5123c02dea59bb22a6efd95bf30977aa9813c6fdeac75f37141aa4c8f6ca86863653fd347b8bdfc01df27a24f9bb78024f9bab19cf13087bc73f016ba3862c6d096
-
Filesize
72KB
MD54de28da946a02a3a4396a3a955bdc24f
SHA1d5e44b5e013cad7b1c0db184bac160a35f67bb91
SHA256eb4f681340a95d2feb2ecb9a0c9e451615cade032071d11cc3fc3f5bede9afb3
SHA51247825b05eab5737081efdcd5a7ac7ecc66041468f0c920eb8bbfba46e77ae3b31f159af70fc8e5548e9ccf964c897eb09d46800686ace26a280f761d328244b6
-
Filesize
72KB
MD54de28da946a02a3a4396a3a955bdc24f
SHA1d5e44b5e013cad7b1c0db184bac160a35f67bb91
SHA256eb4f681340a95d2feb2ecb9a0c9e451615cade032071d11cc3fc3f5bede9afb3
SHA51247825b05eab5737081efdcd5a7ac7ecc66041468f0c920eb8bbfba46e77ae3b31f159af70fc8e5548e9ccf964c897eb09d46800686ace26a280f761d328244b6
-
Filesize
72KB
MD56b842c6befb6e353769bdd1cefdccbe3
SHA16f0f60727c617969d0474a696cad02f86798b84c
SHA2565a451dc10dbadb5ac34f95c7f4c04dafddce3a2fa902b076e647d89be9dae07f
SHA5122e20ea657bf9756d6915b067a758dca0461979b08b2842aca9b99c351e7eea6a3d0e27313ff26bdb23e8511d4a183fcfd34c037f9bd5d2dda4a4e2b325c39a38
-
Filesize
72KB
MD56b842c6befb6e353769bdd1cefdccbe3
SHA16f0f60727c617969d0474a696cad02f86798b84c
SHA2565a451dc10dbadb5ac34f95c7f4c04dafddce3a2fa902b076e647d89be9dae07f
SHA5122e20ea657bf9756d6915b067a758dca0461979b08b2842aca9b99c351e7eea6a3d0e27313ff26bdb23e8511d4a183fcfd34c037f9bd5d2dda4a4e2b325c39a38
-
Filesize
72KB
MD58358ca7dba27d24f079dd906a3734c0b
SHA1f13ebaca5da22d75e72467c2420add685f807517
SHA25655e594d48a20f744d00d040577cf789e74c8c6f032db170cf0d4fb1385cbff1c
SHA512f22353d65466b3e6ae944172303e2c2a1449e0122f010e4873914187d2368eead828782c7b87cba871593a8867d93806afa8205e9b41c3392fd27ce7026ff7db
-
Filesize
72KB
MD58358ca7dba27d24f079dd906a3734c0b
SHA1f13ebaca5da22d75e72467c2420add685f807517
SHA25655e594d48a20f744d00d040577cf789e74c8c6f032db170cf0d4fb1385cbff1c
SHA512f22353d65466b3e6ae944172303e2c2a1449e0122f010e4873914187d2368eead828782c7b87cba871593a8867d93806afa8205e9b41c3392fd27ce7026ff7db
-
Filesize
72KB
MD5b3d38435c43a98e6f9cd85575690414c
SHA1b00b742adbacf725a0632204c817f2e3d31752d6
SHA2565954be11b501921e18c06e0c6e1c409257399a57287b0f64ae4ac24add73d3f2
SHA5127a472a7b834a78e96facd64bea556c56a0773e39cdcc2f77b02156264b02c97681248d698a1e26204d229b339540fe0e74281faee4f094d03bc3c6615ffc75d9
-
Filesize
72KB
MD5b3d38435c43a98e6f9cd85575690414c
SHA1b00b742adbacf725a0632204c817f2e3d31752d6
SHA2565954be11b501921e18c06e0c6e1c409257399a57287b0f64ae4ac24add73d3f2
SHA5127a472a7b834a78e96facd64bea556c56a0773e39cdcc2f77b02156264b02c97681248d698a1e26204d229b339540fe0e74281faee4f094d03bc3c6615ffc75d9
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD5cac4e5d63611c928df9593ed3d5bc642
SHA198aeee8602a4527b1ac333e8c28577325e372a76
SHA256e7062af248505c433b0c87e031e88f6239c411b0f9b11cabceeb2b2b1e41acbe
SHA5124f9c67396f9e0b09b1804a0734f4f51f826a0e82a7bce38b7ab9c054b1baa1d6257e1599d8cc76aab301570b0c2c3316491209c6121a5e3064fed38473bc2a4b
-
Filesize
72KB
MD5cac4e5d63611c928df9593ed3d5bc642
SHA198aeee8602a4527b1ac333e8c28577325e372a76
SHA256e7062af248505c433b0c87e031e88f6239c411b0f9b11cabceeb2b2b1e41acbe
SHA5124f9c67396f9e0b09b1804a0734f4f51f826a0e82a7bce38b7ab9c054b1baa1d6257e1599d8cc76aab301570b0c2c3316491209c6121a5e3064fed38473bc2a4b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cac4e5d63611c928df9593ed3d5bc642
SHA198aeee8602a4527b1ac333e8c28577325e372a76
SHA256e7062af248505c433b0c87e031e88f6239c411b0f9b11cabceeb2b2b1e41acbe
SHA5124f9c67396f9e0b09b1804a0734f4f51f826a0e82a7bce38b7ab9c054b1baa1d6257e1599d8cc76aab301570b0c2c3316491209c6121a5e3064fed38473bc2a4b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cac4e5d63611c928df9593ed3d5bc642
SHA198aeee8602a4527b1ac333e8c28577325e372a76
SHA256e7062af248505c433b0c87e031e88f6239c411b0f9b11cabceeb2b2b1e41acbe
SHA5124f9c67396f9e0b09b1804a0734f4f51f826a0e82a7bce38b7ab9c054b1baa1d6257e1599d8cc76aab301570b0c2c3316491209c6121a5e3064fed38473bc2a4b
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD51ca421953e0ed9f7d5ab35d51f9acc33
SHA100b3c8d6a73e088aaf5fd03817879d109d6134cf
SHA256e1d850920e744a5e42345a1bd80ddf0bd21e1b9dcbf0edaf1239221ed32b8814
SHA512b3f1cf899976eed801fbc10dd7b2e9510551c188e7117bc2d02e41379702e3b48b01e8f8e840ca59697c6b625c62ce97eba333506653f5d35db9785a801b3bb6
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD51ca421953e0ed9f7d5ab35d51f9acc33
SHA100b3c8d6a73e088aaf5fd03817879d109d6134cf
SHA256e1d850920e744a5e42345a1bd80ddf0bd21e1b9dcbf0edaf1239221ed32b8814
SHA512b3f1cf899976eed801fbc10dd7b2e9510551c188e7117bc2d02e41379702e3b48b01e8f8e840ca59697c6b625c62ce97eba333506653f5d35db9785a801b3bb6
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD51ca421953e0ed9f7d5ab35d51f9acc33
SHA100b3c8d6a73e088aaf5fd03817879d109d6134cf
SHA256e1d850920e744a5e42345a1bd80ddf0bd21e1b9dcbf0edaf1239221ed32b8814
SHA512b3f1cf899976eed801fbc10dd7b2e9510551c188e7117bc2d02e41379702e3b48b01e8f8e840ca59697c6b625c62ce97eba333506653f5d35db9785a801b3bb6
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD51ca421953e0ed9f7d5ab35d51f9acc33
SHA100b3c8d6a73e088aaf5fd03817879d109d6134cf
SHA256e1d850920e744a5e42345a1bd80ddf0bd21e1b9dcbf0edaf1239221ed32b8814
SHA512b3f1cf899976eed801fbc10dd7b2e9510551c188e7117bc2d02e41379702e3b48b01e8f8e840ca59697c6b625c62ce97eba333506653f5d35db9785a801b3bb6
-
Filesize
72KB
MD55f0b1c709d1d4ffe05f5eec7d9ab42f5
SHA193a6b68d795a77e81779842637480385a1093633
SHA2567615c9e06071e54fc8a6854ad8b640f70424377e13a0ed8f278cfe8c487b24c5
SHA512ca1f67582cee5f874bda952013a7770238944a5c304b1669cb7399e0a7b334089ae09fe1aa1adba48a08d66a9fc4d981500df3b8ec6647a3eb2ef21a5ed0d67d
-
Filesize
72KB
MD55f0b1c709d1d4ffe05f5eec7d9ab42f5
SHA193a6b68d795a77e81779842637480385a1093633
SHA2567615c9e06071e54fc8a6854ad8b640f70424377e13a0ed8f278cfe8c487b24c5
SHA512ca1f67582cee5f874bda952013a7770238944a5c304b1669cb7399e0a7b334089ae09fe1aa1adba48a08d66a9fc4d981500df3b8ec6647a3eb2ef21a5ed0d67d
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD523ddcc40684cb2571d63a4b0a55cc0c6
SHA1101873f1906f231609489886712f67532a48b1cc
SHA2566ff673a38af21ab6074dbb80db28ae9ae59e7973ca3608fc0821e52436ea4a91
SHA5120bd0c16bf1f599dee930f023bcdeb7ad770c46f507e47b82d14eb4fc32c940d4bc10fc17bdb6d175df71af8015b2f9dfbef24087d277b11b10187fe900ab70f2
-
Filesize
72KB
MD55f0b1c709d1d4ffe05f5eec7d9ab42f5
SHA193a6b68d795a77e81779842637480385a1093633
SHA2567615c9e06071e54fc8a6854ad8b640f70424377e13a0ed8f278cfe8c487b24c5
SHA512ca1f67582cee5f874bda952013a7770238944a5c304b1669cb7399e0a7b334089ae09fe1aa1adba48a08d66a9fc4d981500df3b8ec6647a3eb2ef21a5ed0d67d
-
Filesize
72KB
MD55f0b1c709d1d4ffe05f5eec7d9ab42f5
SHA193a6b68d795a77e81779842637480385a1093633
SHA2567615c9e06071e54fc8a6854ad8b640f70424377e13a0ed8f278cfe8c487b24c5
SHA512ca1f67582cee5f874bda952013a7770238944a5c304b1669cb7399e0a7b334089ae09fe1aa1adba48a08d66a9fc4d981500df3b8ec6647a3eb2ef21a5ed0d67d