Analysis
-
max time kernel
191s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 19:59
Static task
static1
Behavioral task
behavioral1
Sample
bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe
Resource
win10v2004-20220812-en
General
-
Target
bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe
-
Size
72KB
-
MD5
5a1b0008e46d12e2e3be17ada696a6e0
-
SHA1
5b9ff7f42f4b86bc3599452c2a9dfd06878c2c56
-
SHA256
bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7
-
SHA512
d8beea984c9f127358371d6677cab10a9b3736c701dff38a0bbfede2024e9c5f53f22fd5e11c1e20fd0a40928114aff602ed06f894afaac33add8297ece120d3
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2G:ipQNwC3BEddsEqOt/hyJF+x3BEJwRra
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1352 backup.exe 928 backup.exe 660 backup.exe 1676 backup.exe 1056 backup.exe 776 backup.exe 1592 data.exe 1624 backup.exe 1072 backup.exe 1036 backup.exe 1972 backup.exe 812 backup.exe 572 System Restore.exe 1976 backup.exe 1232 backup.exe 1708 backup.exe 888 backup.exe 332 backup.exe 524 backup.exe 1340 System Restore.exe 652 backup.exe 1676 backup.exe 1348 backup.exe 964 backup.exe 1864 backup.exe 776 backup.exe 1092 backup.exe 988 backup.exe 436 backup.exe 816 backup.exe 548 backup.exe 1640 backup.exe 1728 backup.exe 1968 backup.exe 1324 backup.exe 1648 backup.exe 1696 backup.exe 748 backup.exe 296 backup.exe 564 data.exe 1720 backup.exe 1104 backup.exe 1616 backup.exe 624 backup.exe 644 backup.exe 1664 backup.exe 1348 backup.exe 964 backup.exe 1624 backup.exe 1800 backup.exe 1912 update.exe 1772 backup.exe 1540 backup.exe 1460 backup.exe 1552 data.exe 1660 backup.exe 1216 backup.exe 1692 backup.exe 744 backup.exe 1648 backup.exe 1456 backup.exe 776 backup.exe 772 backup.exe 1664 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1056 backup.exe 1056 backup.exe 1592 data.exe 1592 data.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1056 backup.exe 1056 backup.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1056 backup.exe 1056 backup.exe 1036 backup.exe 1036 backup.exe 1056 backup.exe 1056 backup.exe 1976 backup.exe 572 System Restore.exe 1976 backup.exe 572 System Restore.exe 812 backup.exe 812 backup.exe 1232 backup.exe 1232 backup.exe 1036 backup.exe 1036 backup.exe 888 backup.exe 888 backup.exe 1232 backup.exe 524 backup.exe 524 backup.exe 1232 backup.exe 1340 System Restore.exe 1340 System Restore.exe 652 backup.exe 652 backup.exe 1340 System Restore.exe 1340 System Restore.exe 1232 backup.exe 1232 backup.exe 652 backup.exe 652 backup.exe 1232 backup.exe 1232 backup.exe 1864 backup.exe 1092 backup.exe 1092 backup.exe 1864 backup.exe 1232 backup.exe 1232 backup.exe 1864 backup.exe 1864 backup.exe 1864 backup.exe 1864 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\update.exe data.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\AppPatch64\backup.exe System Restore.exe File opened for modification C:\Windows\AppPatch\Custom\update.exe System Restore.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\System Restore.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 1352 backup.exe 928 backup.exe 660 backup.exe 1676 backup.exe 1056 backup.exe 776 backup.exe 1592 data.exe 1624 backup.exe 1072 backup.exe 1036 backup.exe 1972 backup.exe 812 backup.exe 572 System Restore.exe 1976 backup.exe 1232 backup.exe 888 backup.exe 1708 backup.exe 332 backup.exe 524 backup.exe 1340 System Restore.exe 652 backup.exe 1676 backup.exe 1348 backup.exe 964 backup.exe 1864 backup.exe 776 backup.exe 1092 backup.exe 988 backup.exe 436 backup.exe 816 backup.exe 548 backup.exe 1640 backup.exe 1728 backup.exe 1968 backup.exe 1324 backup.exe 1696 backup.exe 748 backup.exe 296 backup.exe 564 data.exe 1720 backup.exe 1104 backup.exe 1616 backup.exe 624 backup.exe 644 backup.exe 1664 backup.exe 1348 backup.exe 964 backup.exe 1624 backup.exe 1800 backup.exe 1772 backup.exe 1540 backup.exe 1552 data.exe 1460 backup.exe 1660 backup.exe 1216 backup.exe 1692 backup.exe 744 backup.exe 368 backup.exe 1456 backup.exe 776 backup.exe 772 backup.exe 676 backup.exe 1664 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1352 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 28 PID 1688 wrote to memory of 1352 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 28 PID 1688 wrote to memory of 1352 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 28 PID 1688 wrote to memory of 1352 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 28 PID 1688 wrote to memory of 928 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 29 PID 1688 wrote to memory of 928 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 29 PID 1688 wrote to memory of 928 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 29 PID 1688 wrote to memory of 928 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 29 PID 1688 wrote to memory of 660 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 30 PID 1688 wrote to memory of 660 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 30 PID 1688 wrote to memory of 660 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 30 PID 1688 wrote to memory of 660 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 30 PID 1688 wrote to memory of 1676 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 31 PID 1688 wrote to memory of 1676 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 31 PID 1688 wrote to memory of 1676 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 31 PID 1688 wrote to memory of 1676 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 31 PID 1352 wrote to memory of 1056 1352 backup.exe 32 PID 1352 wrote to memory of 1056 1352 backup.exe 32 PID 1352 wrote to memory of 1056 1352 backup.exe 32 PID 1352 wrote to memory of 1056 1352 backup.exe 32 PID 1688 wrote to memory of 776 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 33 PID 1688 wrote to memory of 776 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 33 PID 1688 wrote to memory of 776 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 33 PID 1688 wrote to memory of 776 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 33 PID 1056 wrote to memory of 1592 1056 backup.exe 34 PID 1056 wrote to memory of 1592 1056 backup.exe 34 PID 1056 wrote to memory of 1592 1056 backup.exe 34 PID 1056 wrote to memory of 1592 1056 backup.exe 34 PID 1592 wrote to memory of 1624 1592 data.exe 35 PID 1592 wrote to memory of 1624 1592 data.exe 35 PID 1592 wrote to memory of 1624 1592 data.exe 35 PID 1592 wrote to memory of 1624 1592 data.exe 35 PID 1688 wrote to memory of 1072 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 36 PID 1688 wrote to memory of 1072 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 36 PID 1688 wrote to memory of 1072 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 36 PID 1688 wrote to memory of 1072 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 36 PID 1056 wrote to memory of 1036 1056 backup.exe 37 PID 1056 wrote to memory of 1036 1056 backup.exe 37 PID 1056 wrote to memory of 1036 1056 backup.exe 37 PID 1056 wrote to memory of 1036 1056 backup.exe 37 PID 1688 wrote to memory of 1972 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 38 PID 1688 wrote to memory of 1972 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 38 PID 1688 wrote to memory of 1972 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 38 PID 1688 wrote to memory of 1972 1688 bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe 38 PID 1056 wrote to memory of 812 1056 backup.exe 39 PID 1056 wrote to memory of 812 1056 backup.exe 39 PID 1056 wrote to memory of 812 1056 backup.exe 39 PID 1056 wrote to memory of 812 1056 backup.exe 39 PID 1036 wrote to memory of 572 1036 backup.exe 40 PID 1036 wrote to memory of 572 1036 backup.exe 40 PID 1036 wrote to memory of 572 1036 backup.exe 40 PID 1036 wrote to memory of 572 1036 backup.exe 40 PID 1056 wrote to memory of 1976 1056 backup.exe 41 PID 1056 wrote to memory of 1976 1056 backup.exe 41 PID 1056 wrote to memory of 1976 1056 backup.exe 41 PID 1056 wrote to memory of 1976 1056 backup.exe 41 PID 1976 wrote to memory of 1232 1976 backup.exe 44 PID 1976 wrote to memory of 1232 1976 backup.exe 44 PID 1976 wrote to memory of 1232 1976 backup.exe 44 PID 1976 wrote to memory of 1232 1976 backup.exe 44 PID 572 wrote to memory of 1708 572 System Restore.exe 43 PID 572 wrote to memory of 1708 572 System Restore.exe 43 PID 572 wrote to memory of 1708 572 System Restore.exe 43 PID 572 wrote to memory of 1708 572 System Restore.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe"C:\Users\Admin\AppData\Local\Temp\bbb8c32c8feb7ed672700656f3bc13f6d02455b0737d615b1558eccceefa75b7.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\2455264390\backup.exeC:\Users\Admin\AppData\Local\Temp\2455264390\backup.exe C:\Users\Admin\AppData\Local\Temp\2455264390\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1056 -
C:\PerfLogs\data.exeC:\PerfLogs\data.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\7-Zip\System Restore.exe"C:\Program Files\7-Zip\System Restore.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:652 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:964
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1324
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
PID:1912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
PID:304
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:748 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Disables RegEdit via registry modification
PID:276
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:1300
-
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:676 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:976
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:296
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1624
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1620
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:484 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1300
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:1976
-
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Drops file in Program Files directory
PID:304 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1360
-
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:776 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1484
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
PID:1004
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:436
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1720
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:812 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:888 -
C:\Program Files (x86)\Adobe\Reader 9.0\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1348
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1104
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:644
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1772
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:1648 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:368 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1752
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Disables RegEdit via registry modification
PID:876 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵
- System policy modification
PID:1988
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵
- Drops file in Program Files directory
- System policy modification
PID:1564 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵PID:896
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1080 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵PID:748
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵
- Disables RegEdit via registry modification
PID:1588
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:1236
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1784 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Drops file in Program Files directory
PID:1708 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:1532
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1104
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1988 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1348
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1236 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\10⤵PID:1660
-
-
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1664 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:272 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1304
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1148 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1856 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1828 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\10⤵PID:368
-
-
-
-
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1232 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:332
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:776
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:988
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:1648
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:296
-
-
C:\Users\Admin\Pictures\data.exeC:\Users\Admin\Pictures\data.exe C:\Users\Admin\Pictures\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
C:\Users\Admin\Videos\backup.exeC:\Users\Admin\Videos\backup.exe C:\Users\Admin\Videos\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1460
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:744 -
C:\Users\Public\Music\Sample Music\backup.exe"C:\Users\Public\Music\Sample Music\backup.exe" C:\Users\Public\Music\Sample Music\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456
-
-
-
C:\Users\Public\Pictures\data.exeC:\Users\Public\Pictures\data.exe C:\Users\Public\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1596 -
C:\Users\Public\Pictures\Sample Pictures\backup.exe"C:\Users\Public\Pictures\Sample Pictures\backup.exe" C:\Users\Public\Pictures\Sample Pictures\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:572
-
-
-
C:\Users\Public\Recorded TV\backup.exe"C:\Users\Public\Recorded TV\backup.exe" C:\Users\Public\Recorded TV\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1656 -
C:\Users\Public\Recorded TV\Sample Media\backup.exe"C:\Users\Public\Recorded TV\Sample Media\backup.exe" C:\Users\Public\Recorded TV\Sample Media\7⤵
- System policy modification
PID:1684
-
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1912 -
C:\Users\Public\Videos\Sample Videos\backup.exe"C:\Users\Public\Videos\Sample Videos\backup.exe" C:\Users\Public\Videos\Sample Videos\7⤵PID:1216
-
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Disables RegEdit via registry modification
PID:1324
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- System policy modification
PID:332
-
-
C:\Windows\AppPatch\System Restore.exe"C:\Windows\AppPatch\System Restore.exe" C:\Windows\AppPatch\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:1232 -
C:\Windows\AppPatch\AppPatch64\backup.exeC:\Windows\AppPatch\AppPatch64\backup.exe C:\Windows\AppPatch\AppPatch64\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1752
-
-
C:\Windows\AppPatch\Custom\update.exeC:\Windows\AppPatch\Custom\update.exe C:\Windows\AppPatch\Custom\6⤵PID:1552
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD53fc841852b7582f6638a504e3149d301
SHA11d1ed31aba13c58ce5fe271785fc0657a4892b92
SHA25651ee2266b05cdd6c779c154ee8b81ab25fae517b810a7ffdcdc22e48f7dd6077
SHA51253a5576734de8b232a60ede67bac04d8bc822d244e7729064d62a8ac7580ad29d58e428a2f89efb69aa599db9f19521745cf1e190b7e2253b18eb18f14d8087d
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD5d62abddaaa4993dfca473fdb005f9f34
SHA1ec35cc75a2ad58169590b4bfec0eb1cee914e11b
SHA25607fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db
SHA5127d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8
-
Filesize
72KB
MD5d62abddaaa4993dfca473fdb005f9f34
SHA1ec35cc75a2ad58169590b4bfec0eb1cee914e11b
SHA25607fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db
SHA5127d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8
-
Filesize
72KB
MD552b0bd1c9d387d19175218d8600adbea
SHA1011808a4a91756e8b3c873cbfaded6309d98eaa6
SHA256c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941
SHA512bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598
-
Filesize
72KB
MD552b0bd1c9d387d19175218d8600adbea
SHA1011808a4a91756e8b3c873cbfaded6309d98eaa6
SHA256c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941
SHA512bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598
-
Filesize
72KB
MD5f5ea260c68a3dba9161c44f0bc67c35b
SHA1ba44bd464096cff4da1f213a0634ff5ccaff9ee1
SHA25667fc7f8ee8bc3f7151e579b4d32f0cf48ff7bb1076b83233e30f6bb390b75b82
SHA5127d9dc3379324496f6f18287057bc81077a16498f04d2916198c493da770692782cb3ad68ed63befd038b613f96dfada1bc3294f23179ed6dff663b76f6243c6b
-
Filesize
72KB
MD5ff3d9368259fb14d364ec5d6a5d0683b
SHA118f52b5f9de579bb7858c4187838dee6b242c95b
SHA2568eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7
SHA5121ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1
-
Filesize
72KB
MD5ff3d9368259fb14d364ec5d6a5d0683b
SHA118f52b5f9de579bb7858c4187838dee6b242c95b
SHA2568eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7
SHA5121ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1
-
Filesize
72KB
MD59f4784c1676fc9be983af3d76a9a5b25
SHA1052ae1d936edd6bc84dfd4ec4c37157bf321750b
SHA256d0a898b9f4570a00bf37e296d2acab43393ffedceed16ab77523dd2963cdb33d
SHA5122bbafaffbcfafcc2d99d70b26194b35e6f770375adb702c44e7f970098c3e5e15111311c511402aae95e81db5bb994d48d7aa558bdd4aa8efd732f9341aa2fe3
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD565785c1b8e53821a156918891125f095
SHA1bfea99b5c39a08a6655449627268ac48a9c631ab
SHA256fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e
SHA512772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660
-
Filesize
72KB
MD565785c1b8e53821a156918891125f095
SHA1bfea99b5c39a08a6655449627268ac48a9c631ab
SHA256fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e
SHA512772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660
-
Filesize
72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e1784b31450c9c11f650188fa3e9eb17
SHA1d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a
SHA2564164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa
SHA512190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f
-
Filesize
72KB
MD56bd4fd1b629fd48172ad27495c469e07
SHA1a76da089712ebb2561b2234e003a8b20f09cbd31
SHA2565c17d1d9cfb05293b96719789a699df237ef4b354510b14a7d854cd8b1b5cbd7
SHA512df49c1e23fb1d07f8056afef2ae8f486da774a620def6ea006e1fb27336492056d7c4ad153969bee0b29d052e44bd9020c0a5dbbb4e0b110144569f1d8a909c7
-
Filesize
72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
Filesize
72KB
MD5e1784b31450c9c11f650188fa3e9eb17
SHA1d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a
SHA2564164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa
SHA512190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f
-
Filesize
72KB
MD5e5f5b4d52db5b06d08a9c19e0ad9e653
SHA1a2faaeb0673d7a01186cefe4b9aef3d46b97a326
SHA256d2fb82f0acd0ad5923e010a5aa6537eeaa7588f563dbbb79cd28103ccba8c6c1
SHA512f18f59ca8df11d7c991012f14fe1f5f123e4a777a54605580553e1add79835fb351afbac4207c698836d38f6ba454bb6cdaf166df0947fee7b1ed1512fc7c689
-
Filesize
72KB
MD57364b070a3eccf33b694f1b49d5a7a1b
SHA1334e99f453814cd1c9acbb64c70787b1800c0851
SHA2567f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418
SHA5126b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42
-
Filesize
72KB
MD57364b070a3eccf33b694f1b49d5a7a1b
SHA1334e99f453814cd1c9acbb64c70787b1800c0851
SHA2567f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418
SHA5126b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42
-
Filesize
72KB
MD5788fe7c5661cc76f189420f69d3e39c4
SHA1db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a
SHA2568db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce
SHA512f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135
-
Filesize
72KB
MD5788fe7c5661cc76f189420f69d3e39c4
SHA1db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a
SHA2568db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce
SHA512f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135
-
Filesize
72KB
MD50cfebb05f69250eb03884b2afb6e4d5c
SHA120fa652f8c796c266fc7b1c761bc6a61aba35988
SHA2565afcd3abcdd8752f6d9188f29593b5e5ac322cd820f75de5db9cee66ec77d88b
SHA5125dc68b8630f85477cb03a68432f3dc1ea56d1ace4d38f34969cdb8b9d62a72bb11cbe1ac0e20af24bfb28e2c18a3bd8ede32a983f4069b3ca7544f631d3f0e21
-
Filesize
72KB
MD50cfebb05f69250eb03884b2afb6e4d5c
SHA120fa652f8c796c266fc7b1c761bc6a61aba35988
SHA2565afcd3abcdd8752f6d9188f29593b5e5ac322cd820f75de5db9cee66ec77d88b
SHA5125dc68b8630f85477cb03a68432f3dc1ea56d1ace4d38f34969cdb8b9d62a72bb11cbe1ac0e20af24bfb28e2c18a3bd8ede32a983f4069b3ca7544f631d3f0e21
-
Filesize
72KB
MD53fc841852b7582f6638a504e3149d301
SHA11d1ed31aba13c58ce5fe271785fc0657a4892b92
SHA25651ee2266b05cdd6c779c154ee8b81ab25fae517b810a7ffdcdc22e48f7dd6077
SHA51253a5576734de8b232a60ede67bac04d8bc822d244e7729064d62a8ac7580ad29d58e428a2f89efb69aa599db9f19521745cf1e190b7e2253b18eb18f14d8087d
-
Filesize
72KB
MD53fc841852b7582f6638a504e3149d301
SHA11d1ed31aba13c58ce5fe271785fc0657a4892b92
SHA25651ee2266b05cdd6c779c154ee8b81ab25fae517b810a7ffdcdc22e48f7dd6077
SHA51253a5576734de8b232a60ede67bac04d8bc822d244e7729064d62a8ac7580ad29d58e428a2f89efb69aa599db9f19521745cf1e190b7e2253b18eb18f14d8087d
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD5d62abddaaa4993dfca473fdb005f9f34
SHA1ec35cc75a2ad58169590b4bfec0eb1cee914e11b
SHA25607fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db
SHA5127d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8
-
Filesize
72KB
MD5d62abddaaa4993dfca473fdb005f9f34
SHA1ec35cc75a2ad58169590b4bfec0eb1cee914e11b
SHA25607fccb103ebf8f5b79179bbe6a83298a4d80cc7006c641cc26f9f7795c54c8db
SHA5127d5f751efa3a8d2991072a313d5f89e3065d0b4b677d77062ec37f433c87323c2f76a1943ee2feb5150f0a05d9c6f71ac9d6538de0e01c4b31b39cb3d9b194f8
-
Filesize
72KB
MD552b0bd1c9d387d19175218d8600adbea
SHA1011808a4a91756e8b3c873cbfaded6309d98eaa6
SHA256c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941
SHA512bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598
-
Filesize
72KB
MD552b0bd1c9d387d19175218d8600adbea
SHA1011808a4a91756e8b3c873cbfaded6309d98eaa6
SHA256c8ed2373f291099bc4294fd24d0d9fd036b971396c035e48be1ae9f79d561941
SHA512bd9f200eb8631c51caa1009fa1cafae5bf7e19f29a889cc99690f6083afb3a6610cf57a04e323093100739f94cbad99f947aad7da5142b30b5af12b4a507b598
-
Filesize
72KB
MD5f5ea260c68a3dba9161c44f0bc67c35b
SHA1ba44bd464096cff4da1f213a0634ff5ccaff9ee1
SHA25667fc7f8ee8bc3f7151e579b4d32f0cf48ff7bb1076b83233e30f6bb390b75b82
SHA5127d9dc3379324496f6f18287057bc81077a16498f04d2916198c493da770692782cb3ad68ed63befd038b613f96dfada1bc3294f23179ed6dff663b76f6243c6b
-
Filesize
72KB
MD5f5ea260c68a3dba9161c44f0bc67c35b
SHA1ba44bd464096cff4da1f213a0634ff5ccaff9ee1
SHA25667fc7f8ee8bc3f7151e579b4d32f0cf48ff7bb1076b83233e30f6bb390b75b82
SHA5127d9dc3379324496f6f18287057bc81077a16498f04d2916198c493da770692782cb3ad68ed63befd038b613f96dfada1bc3294f23179ed6dff663b76f6243c6b
-
Filesize
72KB
MD5ff3d9368259fb14d364ec5d6a5d0683b
SHA118f52b5f9de579bb7858c4187838dee6b242c95b
SHA2568eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7
SHA5121ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1
-
Filesize
72KB
MD5ff3d9368259fb14d364ec5d6a5d0683b
SHA118f52b5f9de579bb7858c4187838dee6b242c95b
SHA2568eea36daea5d91237ee5734b8d1e528c8946d0a75d8f596fd65b13750e4802a7
SHA5121ecafc2dd92e69e72068ae50edc296c1b0107e4105049a6bfb836cd2ff042c0dc6b8bbf2d3b32a84aac7aeaf8bb0f4a0c2181347418b46db981ed3da4cd4c4e1
-
Filesize
72KB
MD59f4784c1676fc9be983af3d76a9a5b25
SHA1052ae1d936edd6bc84dfd4ec4c37157bf321750b
SHA256d0a898b9f4570a00bf37e296d2acab43393ffedceed16ab77523dd2963cdb33d
SHA5122bbafaffbcfafcc2d99d70b26194b35e6f770375adb702c44e7f970098c3e5e15111311c511402aae95e81db5bb994d48d7aa558bdd4aa8efd732f9341aa2fe3
-
Filesize
72KB
MD59f4784c1676fc9be983af3d76a9a5b25
SHA1052ae1d936edd6bc84dfd4ec4c37157bf321750b
SHA256d0a898b9f4570a00bf37e296d2acab43393ffedceed16ab77523dd2963cdb33d
SHA5122bbafaffbcfafcc2d99d70b26194b35e6f770375adb702c44e7f970098c3e5e15111311c511402aae95e81db5bb994d48d7aa558bdd4aa8efd732f9341aa2fe3
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD533488ec9882579a9b58f4065ff96fe53
SHA155d13500de884384572faee08102b97e78104c26
SHA2560b9c56ea0e58e040a94d3c08ab4a2c2d3c61e206339def7ee01160735a172b49
SHA51294ce4951103221eec0b27f11da41a0efed9e9868d2a35919654b3fe27aab78de372a99fdcf6199ea0e85f2e99274d8fe4a64ace63253161a9132d176e34dd5da
-
Filesize
72KB
MD565785c1b8e53821a156918891125f095
SHA1bfea99b5c39a08a6655449627268ac48a9c631ab
SHA256fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e
SHA512772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660
-
Filesize
72KB
MD565785c1b8e53821a156918891125f095
SHA1bfea99b5c39a08a6655449627268ac48a9c631ab
SHA256fd72d7475492e04b9eea54eb6d2b5a2d1f42bfede090e2fc2916fd899d52746e
SHA512772fea1dcfbea56177c8913ef62518c964843854c26fd21e8bcf4f1b1081ef55820a021f95a72863446d0a6261406919513beba8edc036a8ff5db2dc82835660
-
Filesize
72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
Filesize
72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e1784b31450c9c11f650188fa3e9eb17
SHA1d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a
SHA2564164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa
SHA512190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e1784b31450c9c11f650188fa3e9eb17
SHA1d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a
SHA2564164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa
SHA512190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f
-
Filesize
72KB
MD56bd4fd1b629fd48172ad27495c469e07
SHA1a76da089712ebb2561b2234e003a8b20f09cbd31
SHA2565c17d1d9cfb05293b96719789a699df237ef4b354510b14a7d854cd8b1b5cbd7
SHA512df49c1e23fb1d07f8056afef2ae8f486da774a620def6ea006e1fb27336492056d7c4ad153969bee0b29d052e44bd9020c0a5dbbb4e0b110144569f1d8a909c7
-
Filesize
72KB
MD56bd4fd1b629fd48172ad27495c469e07
SHA1a76da089712ebb2561b2234e003a8b20f09cbd31
SHA2565c17d1d9cfb05293b96719789a699df237ef4b354510b14a7d854cd8b1b5cbd7
SHA512df49c1e23fb1d07f8056afef2ae8f486da774a620def6ea006e1fb27336492056d7c4ad153969bee0b29d052e44bd9020c0a5dbbb4e0b110144569f1d8a909c7
-
Filesize
72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
Filesize
72KB
MD545083fc7f10baca47f763bb92d103dbd
SHA163f4ea5fecc0889a5b5b38dfb2702ce7a0c540e0
SHA256698d0d11aeb354b6aa1041873b6cb68c133fc21cdb330a626f2214a0c7c10c55
SHA5123586a5b8210d220536ff9ae9d7f9d35eef6504e5825781d3edd98e329bf79e3a02bc5040f968badc3c67940ccf3612bed39295fee9906952ca836a8d14d9cb88
-
Filesize
72KB
MD5e1784b31450c9c11f650188fa3e9eb17
SHA1d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a
SHA2564164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa
SHA512190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f
-
Filesize
72KB
MD5e1784b31450c9c11f650188fa3e9eb17
SHA1d098b34dc39c0f25a1b78c9d2b591c6acd2dc51a
SHA2564164f4b039028bffb38879c5cf62c3be4a65970dec63ea3689b15c3968e6b7fa
SHA512190bf341f9448f04254ef244edb913792fa3f8399200c45b41c0a939db571224cfb6d5f3f5ae30fe9a3852cc1a2542264937e9ac8371afb609411fe5b9cb4d2f
-
Filesize
72KB
MD5e5f5b4d52db5b06d08a9c19e0ad9e653
SHA1a2faaeb0673d7a01186cefe4b9aef3d46b97a326
SHA256d2fb82f0acd0ad5923e010a5aa6537eeaa7588f563dbbb79cd28103ccba8c6c1
SHA512f18f59ca8df11d7c991012f14fe1f5f123e4a777a54605580553e1add79835fb351afbac4207c698836d38f6ba454bb6cdaf166df0947fee7b1ed1512fc7c689
-
Filesize
72KB
MD5e5f5b4d52db5b06d08a9c19e0ad9e653
SHA1a2faaeb0673d7a01186cefe4b9aef3d46b97a326
SHA256d2fb82f0acd0ad5923e010a5aa6537eeaa7588f563dbbb79cd28103ccba8c6c1
SHA512f18f59ca8df11d7c991012f14fe1f5f123e4a777a54605580553e1add79835fb351afbac4207c698836d38f6ba454bb6cdaf166df0947fee7b1ed1512fc7c689
-
Filesize
72KB
MD57364b070a3eccf33b694f1b49d5a7a1b
SHA1334e99f453814cd1c9acbb64c70787b1800c0851
SHA2567f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418
SHA5126b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42
-
Filesize
72KB
MD57364b070a3eccf33b694f1b49d5a7a1b
SHA1334e99f453814cd1c9acbb64c70787b1800c0851
SHA2567f7ab667c0126d07df28c59e89f358d49057efab3389fabe9f38f16d3d659418
SHA5126b476ef54454be990b11daff93e9bd3bfc0a95243f3365b8a5b0b9f7597b4a5fb4a901c62489b2f1a4b9ec9847e0d63617369b1e137728dfc90da01c1d74df42
-
Filesize
72KB
MD5788fe7c5661cc76f189420f69d3e39c4
SHA1db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a
SHA2568db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce
SHA512f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135
-
Filesize
72KB
MD5788fe7c5661cc76f189420f69d3e39c4
SHA1db3fe18ec9a2d3c390df5a301d4fc4892ff47b8a
SHA2568db3edb23963b51d5ac35dd76a78d0d140811621e64dd20201cd4e5536ff94ce
SHA512f8bc3c4255b86b2712e69fe37c03da3ea7ec3a5228cc7954b2641e4d20dc1f5b4b4f630516e58e3f981f2804e53afe24a4969d97ffc12bd75b58d6ae1beda135