Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe
Resource
win10v2004-20220812-en
General
-
Target
181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe
-
Size
72KB
-
MD5
0cd4a736b9016f93262eb1be23b6f27b
-
SHA1
b69800d2d0978855a370404dbad320c2f923fb6c
-
SHA256
181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e
-
SHA512
cf4b5e90866415b88a50100629d63c1b15c7bb637f110dba2977f69e288e75d3880831642c0b14ae2a805a28795f04c24f15efeac983e9d86b9364e3d9c5ef97
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf21:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr5
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1988 backup.exe 1536 backup.exe 1540 backup.exe 1364 backup.exe 1184 backup.exe 548 backup.exe 568 backup.exe 1568 backup.exe 1600 backup.exe 1504 backup.exe 1328 backup.exe 2012 backup.exe 1068 backup.exe 1492 backup.exe 1132 backup.exe 1376 backup.exe 668 backup.exe 856 backup.exe 1400 backup.exe 1404 backup.exe 1292 backup.exe 524 backup.exe 1368 backup.exe 1520 backup.exe 1028 backup.exe 276 backup.exe 1648 backup.exe 1040 backup.exe 472 backup.exe 1600 backup.exe 1032 backup.exe 280 update.exe 2024 backup.exe 1120 backup.exe 1920 backup.exe 1928 update.exe 1700 backup.exe 1588 backup.exe 1744 System Restore.exe 1244 backup.exe 1068 backup.exe 968 backup.exe 956 System Restore.exe 1380 backup.exe 852 backup.exe 1592 backup.exe 1612 update.exe 1404 backup.exe 1640 data.exe 576 backup.exe 1692 backup.exe 1568 data.exe 1340 backup.exe 2032 System Restore.exe 276 backup.exe 1372 data.exe 328 backup.exe 1164 backup.exe 1916 backup.exe 316 backup.exe 1484 backup.exe 2020 backup.exe 1644 backup.exe 1332 update.exe -
Loads dropped DLL 64 IoCs
pid Process 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1184 backup.exe 1184 backup.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 568 backup.exe 568 backup.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1184 backup.exe 1184 backup.exe 1328 backup.exe 1328 backup.exe 2012 backup.exe 2012 backup.exe 1184 backup.exe 1184 backup.exe 1328 backup.exe 1328 backup.exe 1132 backup.exe 1132 backup.exe 1492 backup.exe 1492 backup.exe 1376 backup.exe 1376 backup.exe 668 backup.exe 668 backup.exe 856 backup.exe 856 backup.exe 668 backup.exe 668 backup.exe 856 backup.exe 856 backup.exe 1292 backup.exe 1292 backup.exe 524 backup.exe 524 backup.exe 524 backup.exe 524 backup.exe 524 backup.exe 524 backup.exe 1292 backup.exe 1292 backup.exe 524 backup.exe 524 backup.exe 1292 backup.exe 1292 backup.exe 1292 backup.exe 1292 backup.exe 1040 backup.exe 1040 backup.exe 1292 backup.exe 524 backup.exe 524 backup.exe 524 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Update\backup.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe data.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\update.exe backup.exe File opened for modification C:\Program Files (x86)\Google\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Policies\backup.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe data.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 1988 backup.exe 1536 backup.exe 1540 backup.exe 1364 backup.exe 1184 backup.exe 548 backup.exe 568 backup.exe 1568 backup.exe 1504 backup.exe 1600 backup.exe 1328 backup.exe 2012 backup.exe 1068 backup.exe 1492 backup.exe 1132 backup.exe 1376 backup.exe 668 backup.exe 856 backup.exe 1400 backup.exe 1404 backup.exe 1292 backup.exe 524 backup.exe 1520 backup.exe 1028 backup.exe 1368 backup.exe 276 backup.exe 1648 backup.exe 1040 backup.exe 472 backup.exe 1600 backup.exe 1032 backup.exe 2024 backup.exe 1120 backup.exe 1920 backup.exe 280 update.exe 1928 update.exe 1700 backup.exe 1588 backup.exe 1744 System Restore.exe 1244 backup.exe 1068 backup.exe 968 backup.exe 956 System Restore.exe 1380 backup.exe 852 backup.exe 1592 backup.exe 1612 update.exe 1404 backup.exe 1640 data.exe 1568 data.exe 1340 backup.exe 1692 backup.exe 576 backup.exe 1164 backup.exe 1372 data.exe 276 backup.exe 2032 System Restore.exe 328 backup.exe 1916 backup.exe 1176 backup.exe 1484 backup.exe 316 backup.exe 280 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1988 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 28 PID 1460 wrote to memory of 1988 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 28 PID 1460 wrote to memory of 1988 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 28 PID 1460 wrote to memory of 1988 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 28 PID 1460 wrote to memory of 1536 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 29 PID 1460 wrote to memory of 1536 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 29 PID 1460 wrote to memory of 1536 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 29 PID 1460 wrote to memory of 1536 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 29 PID 1460 wrote to memory of 1540 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 30 PID 1460 wrote to memory of 1540 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 30 PID 1460 wrote to memory of 1540 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 30 PID 1460 wrote to memory of 1540 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 30 PID 1460 wrote to memory of 1364 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 31 PID 1460 wrote to memory of 1364 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 31 PID 1460 wrote to memory of 1364 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 31 PID 1460 wrote to memory of 1364 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 31 PID 1988 wrote to memory of 1184 1988 backup.exe 33 PID 1988 wrote to memory of 1184 1988 backup.exe 33 PID 1988 wrote to memory of 1184 1988 backup.exe 33 PID 1988 wrote to memory of 1184 1988 backup.exe 33 PID 1460 wrote to memory of 548 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 32 PID 1460 wrote to memory of 548 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 32 PID 1460 wrote to memory of 548 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 32 PID 1460 wrote to memory of 548 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 32 PID 1184 wrote to memory of 568 1184 backup.exe 34 PID 1184 wrote to memory of 568 1184 backup.exe 34 PID 1184 wrote to memory of 568 1184 backup.exe 34 PID 1184 wrote to memory of 568 1184 backup.exe 34 PID 1460 wrote to memory of 1568 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 35 PID 1460 wrote to memory of 1568 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 35 PID 1460 wrote to memory of 1568 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 35 PID 1460 wrote to memory of 1568 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 35 PID 568 wrote to memory of 1600 568 backup.exe 36 PID 568 wrote to memory of 1600 568 backup.exe 36 PID 568 wrote to memory of 1600 568 backup.exe 36 PID 568 wrote to memory of 1600 568 backup.exe 36 PID 1460 wrote to memory of 1504 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 37 PID 1460 wrote to memory of 1504 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 37 PID 1460 wrote to memory of 1504 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 37 PID 1460 wrote to memory of 1504 1460 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe 37 PID 1184 wrote to memory of 1328 1184 backup.exe 38 PID 1184 wrote to memory of 1328 1184 backup.exe 38 PID 1184 wrote to memory of 1328 1184 backup.exe 38 PID 1184 wrote to memory of 1328 1184 backup.exe 38 PID 1328 wrote to memory of 2012 1328 backup.exe 39 PID 1328 wrote to memory of 2012 1328 backup.exe 39 PID 1328 wrote to memory of 2012 1328 backup.exe 39 PID 1328 wrote to memory of 2012 1328 backup.exe 39 PID 2012 wrote to memory of 1068 2012 backup.exe 40 PID 2012 wrote to memory of 1068 2012 backup.exe 40 PID 2012 wrote to memory of 1068 2012 backup.exe 40 PID 2012 wrote to memory of 1068 2012 backup.exe 40 PID 1184 wrote to memory of 1492 1184 backup.exe 41 PID 1184 wrote to memory of 1492 1184 backup.exe 41 PID 1184 wrote to memory of 1492 1184 backup.exe 41 PID 1184 wrote to memory of 1492 1184 backup.exe 41 PID 1328 wrote to memory of 1132 1328 backup.exe 42 PID 1328 wrote to memory of 1132 1328 backup.exe 42 PID 1328 wrote to memory of 1132 1328 backup.exe 42 PID 1328 wrote to memory of 1132 1328 backup.exe 42 PID 1132 wrote to memory of 668 1132 backup.exe 44 PID 1132 wrote to memory of 668 1132 backup.exe 44 PID 1132 wrote to memory of 668 1132 backup.exe 44 PID 1132 wrote to memory of 668 1132 backup.exe 44 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe"C:\Users\Admin\AppData\Local\Temp\181ace7d619f0f60fc771decba036c1b1542b852fd0b06de769564aa90ec034e.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\1520963717\backup.exeC:\Users\Admin\AppData\Local\Temp\1520963717\backup.exe C:\Users\Admin\AppData\Local\Temp\1520963717\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\backup.exe\backup.exe \3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:568 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1068
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1132 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:472
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:280
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1628
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵PID:548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:980
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1452
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1184
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:1880
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:276 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:956
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1520
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:696
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1520
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:908
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:280 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:656
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:752
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\update.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\update.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:812
-
-
-
C:\Program Files\Common Files\Services\data.exe"C:\Program Files\Common Files\Services\data.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:2020 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1000
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:564
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1616
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵PID:1120
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:956
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1376
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1964
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1680 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:852 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:932
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:632
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:2032
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1068
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1492 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1376 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:856 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1520
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1028
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:276
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1040 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1120 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1920
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1244 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1404
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:596
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵
- Drops file in Program Files directory
- System policy modification
PID:1180 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1980
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1372 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵PID:1700
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:316
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:1504
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Drops file in Program Files directory
- System policy modification
PID:1992 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1772
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:876
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:1984
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:1612
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵PID:1148
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Executes dropped EXE
PID:1644
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1176 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1404
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵PID:1012
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:1932
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:780
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1752
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1972
-
-
-
C:\Program Files (x86)\Google\update.exe"C:\Program Files (x86)\Google\update.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:1332 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
PID:1612
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:532
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1164
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:1912
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:852
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:2012 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:1696
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:1364
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:532
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:2064
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1508
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1916 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1720
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1376
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:484
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:1792
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:1996
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:1536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e7ccb2cb0479b07223b8be7b9910aa94
SHA10324d741a5974138afc9862f7db8f9b5356adb2c
SHA2562889d09bd40d9b910e748fd0ae8753ed086cac056ae2d900a5929c1f183267b1
SHA512690b9b45131d757e193a8bb90b9c6e568ad8e8afe4334f5bef5db8d72ce2d66feaa40e147cf0020c6051174ade8e338c5ced6804754df6c201a85450eba1b4f8
-
Filesize
72KB
MD52884d163043a04f5c6f0c457d05f05b8
SHA1ccf74c6c56027f3bf9495aaef73d029585c5eb26
SHA25669c3c38842a40e94147ff04632caad6d416483866bfb9e39cc67ef61fd29ad55
SHA512a5cbf12bfd0310cc0ce8c412bca4d5777c2685c606afbbc42143204a3c52aef6dfe954a26e2c142679200ba5abc0b2d0048799a28d2b56490b6680bd0da5c4c1
-
Filesize
72KB
MD52884d163043a04f5c6f0c457d05f05b8
SHA1ccf74c6c56027f3bf9495aaef73d029585c5eb26
SHA25669c3c38842a40e94147ff04632caad6d416483866bfb9e39cc67ef61fd29ad55
SHA512a5cbf12bfd0310cc0ce8c412bca4d5777c2685c606afbbc42143204a3c52aef6dfe954a26e2c142679200ba5abc0b2d0048799a28d2b56490b6680bd0da5c4c1
-
Filesize
72KB
MD5edb4a06879d82c0d9ee0f676d8919986
SHA1af0e6cfcafcc3d82fdb63755fdd9d9e7051f9071
SHA25630045965c7706049565fab3904d77fc02b182d57cd9486eb032f4105a5da7b55
SHA51217eb81b7839f5780ce84093181d82b1a68d459132a37e974f4c4feeaca90866ddb82b30958e3be0dbac1c775f03b970355bb38159d62cf7dddbba09e04c2a11b
-
Filesize
72KB
MD55ff88521216f95b613fbe44be9adb75a
SHA17536c6cacce9778cf827069ae3cbc23d9e7f50bf
SHA25606846c888051f82de13b052a411696027339cc4c29421042f5cd4cb92a357d99
SHA512158f4e47a4d145bc66c98e10aad41c881942462552a9c9d8dccececc7dac11dc63f296314ed2518eb4058d1b10241cb7b0b60a111ddd518a904fc9207d0fc91d
-
Filesize
72KB
MD55ff88521216f95b613fbe44be9adb75a
SHA17536c6cacce9778cf827069ae3cbc23d9e7f50bf
SHA25606846c888051f82de13b052a411696027339cc4c29421042f5cd4cb92a357d99
SHA512158f4e47a4d145bc66c98e10aad41c881942462552a9c9d8dccececc7dac11dc63f296314ed2518eb4058d1b10241cb7b0b60a111ddd518a904fc9207d0fc91d
-
Filesize
72KB
MD5dd2d6f8312e23a707fa86618667e1d3b
SHA15f1c48211b140e564076ffa130885e8b4507dfd3
SHA2568cccbd459491a68c64e6f063b98ecc03219dde1564ee8f44406536a11369278d
SHA512e8091ab463b1f3d54c07f309e03f3660665164b8dc7a4e55a3a14ad04285609674397579c3b97324091d6243a6119c2f8cfb5c49f548367f40cd047b4fc5dd7c
-
Filesize
72KB
MD5dd2d6f8312e23a707fa86618667e1d3b
SHA15f1c48211b140e564076ffa130885e8b4507dfd3
SHA2568cccbd459491a68c64e6f063b98ecc03219dde1564ee8f44406536a11369278d
SHA512e8091ab463b1f3d54c07f309e03f3660665164b8dc7a4e55a3a14ad04285609674397579c3b97324091d6243a6119c2f8cfb5c49f548367f40cd047b4fc5dd7c
-
Filesize
72KB
MD526b560947b30748ec18ac294f94009b5
SHA1b9674364db9a1c2633fec23dcbb9a8202430a9bf
SHA25631179ec62e7c9a3ce24c7f9517d41d1e468e7a3b5a97626170b21aa819a39d75
SHA512d4249a8d7db7dd0f853ecf9866461507cf3bd48ffe2c96c55a849500d8bd9eeef0bc7900b6cd388e95a910669f79600d05d261848caba21db95e0300851e55b6
-
Filesize
72KB
MD542303f095c148651202973f70b0a6346
SHA1b0abb114f87ebf0633711ec75e1e69e03252f939
SHA256d38f821ccc36fadb19060ecee27c53f6e356814898eff70094115bcbfa5a84be
SHA5123673696f0aac7c80fe58121fe895619335f5bec05af84b2777667276c59bdf46b8e531f710846a11113236a544e88cc8b3f5f8a9abe7fa5b22a67023ff50a3a9
-
Filesize
72KB
MD542303f095c148651202973f70b0a6346
SHA1b0abb114f87ebf0633711ec75e1e69e03252f939
SHA256d38f821ccc36fadb19060ecee27c53f6e356814898eff70094115bcbfa5a84be
SHA5123673696f0aac7c80fe58121fe895619335f5bec05af84b2777667276c59bdf46b8e531f710846a11113236a544e88cc8b3f5f8a9abe7fa5b22a67023ff50a3a9
-
Filesize
72KB
MD53abdc2defd8243b2fb8f785525937267
SHA1597cf56582a42fb4948f2e28eecf0b9c19e011ae
SHA2565e1c9da240ca7058ee8df7545df00339b9b418e4ac58f8b33bebcc9a4605418a
SHA512e2454d96d8e04dc8c2d0d0aefda506c21695b56c8c4246068455c42d97e62526104c058fde17b837de37c3bba059b5efc7d371d26d762abb11ff8df256d6d602
-
Filesize
72KB
MD523e89aa182df05fac9a3d4a453fad54b
SHA1716c2eeaa1b181a30b13a1c1d493f65e8cedc8bb
SHA256113a3c2b1707dfe2ecc6f9df18fe82c5c8b2e6cc6fdcd096486fe38004c76ec0
SHA5126001e7d537ef13d9c950ef5ec389d319ec386b64f6535cd8557fbde72d751fd5bf55fc1fa7c85fbf07eabf4ce0a763175493bb6960e65195fb8b063e7ae48b33
-
Filesize
72KB
MD523e89aa182df05fac9a3d4a453fad54b
SHA1716c2eeaa1b181a30b13a1c1d493f65e8cedc8bb
SHA256113a3c2b1707dfe2ecc6f9df18fe82c5c8b2e6cc6fdcd096486fe38004c76ec0
SHA5126001e7d537ef13d9c950ef5ec389d319ec386b64f6535cd8557fbde72d751fd5bf55fc1fa7c85fbf07eabf4ce0a763175493bb6960e65195fb8b063e7ae48b33
-
Filesize
72KB
MD54d0bb4e252cc65b3cb3a1ce867b293db
SHA10e4724b27636fe4adbea87894329959f9a9cc75a
SHA256f9017d543068ab6dfa169910eae1edc5b5fbb3fb1dcba6a505089cc182076126
SHA51211b01df3f970d8ea2b05f02a9cc1eddd21e7e5153627c6425a6f7802a48f58f0394b676d2139062669e21c51efc61951f3f58a8e17baa6bc59a329110904f6ed
-
Filesize
72KB
MD54d0bb4e252cc65b3cb3a1ce867b293db
SHA10e4724b27636fe4adbea87894329959f9a9cc75a
SHA256f9017d543068ab6dfa169910eae1edc5b5fbb3fb1dcba6a505089cc182076126
SHA51211b01df3f970d8ea2b05f02a9cc1eddd21e7e5153627c6425a6f7802a48f58f0394b676d2139062669e21c51efc61951f3f58a8e17baa6bc59a329110904f6ed
-
Filesize
72KB
MD5e19e29d97e86f276c369f817195229e7
SHA1a70c97e70f9acd8855ab2e7df03be48dafa6109f
SHA2569c7d3639f0904afe48202ce3e0574efc6cb261ab0048742e1b5d2b3eb1b43aeb
SHA51281fe4fd489b7933e97563131f0b4dbc8f190e4c99a292b79eee72652d498317112709bc96607c5cd87d6af5ef4a444d0ff4c4945a62feafb312f5f81f585b04e
-
Filesize
72KB
MD5e19e29d97e86f276c369f817195229e7
SHA1a70c97e70f9acd8855ab2e7df03be48dafa6109f
SHA2569c7d3639f0904afe48202ce3e0574efc6cb261ab0048742e1b5d2b3eb1b43aeb
SHA51281fe4fd489b7933e97563131f0b4dbc8f190e4c99a292b79eee72652d498317112709bc96607c5cd87d6af5ef4a444d0ff4c4945a62feafb312f5f81f585b04e
-
Filesize
72KB
MD597be6c8cfa52820fcd845bef40cdc7d2
SHA14618b975f69837c15561792083c9f710d684bc0e
SHA256e68d2dc38d83812ab20272b331f4c3d259d7360d02baed120a94728304dfc507
SHA5123f506f2dc5f1df93d7404a87dd5370f7e802263baa69d59f0c25170496bead7d4ec7a1957d35bbfb46a6a01cef52848dc64941938530657aad0c8411cef2724a
-
Filesize
72KB
MD597be6c8cfa52820fcd845bef40cdc7d2
SHA14618b975f69837c15561792083c9f710d684bc0e
SHA256e68d2dc38d83812ab20272b331f4c3d259d7360d02baed120a94728304dfc507
SHA5123f506f2dc5f1df93d7404a87dd5370f7e802263baa69d59f0c25170496bead7d4ec7a1957d35bbfb46a6a01cef52848dc64941938530657aad0c8411cef2724a
-
Filesize
72KB
MD52ac18f4f7c7ba6eb8fb87a45ad17a3af
SHA1652c38cd2c448189cc7ce2952684c30569b4534e
SHA25649d4d3e2a474119d0410a06555b9b95a17a1bfa036807df524877eb78fd302e5
SHA5122fd25bf8853d3d482bc6b0fcb4e514f82f6555387cfbb8b6f359acff40289b14a32e8b2f777444d2f9bfc010b136fa93e3d37db3f6959b92ea2a276cb211d39c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52ac18f4f7c7ba6eb8fb87a45ad17a3af
SHA1652c38cd2c448189cc7ce2952684c30569b4534e
SHA25649d4d3e2a474119d0410a06555b9b95a17a1bfa036807df524877eb78fd302e5
SHA5122fd25bf8853d3d482bc6b0fcb4e514f82f6555387cfbb8b6f359acff40289b14a32e8b2f777444d2f9bfc010b136fa93e3d37db3f6959b92ea2a276cb211d39c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
Filesize
72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
Filesize
72KB
MD597be6c8cfa52820fcd845bef40cdc7d2
SHA14618b975f69837c15561792083c9f710d684bc0e
SHA256e68d2dc38d83812ab20272b331f4c3d259d7360d02baed120a94728304dfc507
SHA5123f506f2dc5f1df93d7404a87dd5370f7e802263baa69d59f0c25170496bead7d4ec7a1957d35bbfb46a6a01cef52848dc64941938530657aad0c8411cef2724a
-
Filesize
72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
Filesize
72KB
MD541354a9b02247c5829f136b83c769d66
SHA11a1c7d873b1b9d02a4339837e93239430ad9ac12
SHA256c620bd114b7a06bdd1e6c2a6f0d6e68975a24d4d7e8bfab418c7217c866fd0a0
SHA5127edc71d3fefa29b5caf4091ee6f7ecec34be9a21303fb966139a1a9eb8e6baa8e3ae15a28a328bb893bbc60e3980868a8411adffbfa2c582da64b6722dab8bcd
-
Filesize
72KB
MD541354a9b02247c5829f136b83c769d66
SHA11a1c7d873b1b9d02a4339837e93239430ad9ac12
SHA256c620bd114b7a06bdd1e6c2a6f0d6e68975a24d4d7e8bfab418c7217c866fd0a0
SHA5127edc71d3fefa29b5caf4091ee6f7ecec34be9a21303fb966139a1a9eb8e6baa8e3ae15a28a328bb893bbc60e3980868a8411adffbfa2c582da64b6722dab8bcd
-
Filesize
72KB
MD5e7ccb2cb0479b07223b8be7b9910aa94
SHA10324d741a5974138afc9862f7db8f9b5356adb2c
SHA2562889d09bd40d9b910e748fd0ae8753ed086cac056ae2d900a5929c1f183267b1
SHA512690b9b45131d757e193a8bb90b9c6e568ad8e8afe4334f5bef5db8d72ce2d66feaa40e147cf0020c6051174ade8e338c5ced6804754df6c201a85450eba1b4f8
-
Filesize
72KB
MD5e7ccb2cb0479b07223b8be7b9910aa94
SHA10324d741a5974138afc9862f7db8f9b5356adb2c
SHA2562889d09bd40d9b910e748fd0ae8753ed086cac056ae2d900a5929c1f183267b1
SHA512690b9b45131d757e193a8bb90b9c6e568ad8e8afe4334f5bef5db8d72ce2d66feaa40e147cf0020c6051174ade8e338c5ced6804754df6c201a85450eba1b4f8
-
Filesize
72KB
MD52884d163043a04f5c6f0c457d05f05b8
SHA1ccf74c6c56027f3bf9495aaef73d029585c5eb26
SHA25669c3c38842a40e94147ff04632caad6d416483866bfb9e39cc67ef61fd29ad55
SHA512a5cbf12bfd0310cc0ce8c412bca4d5777c2685c606afbbc42143204a3c52aef6dfe954a26e2c142679200ba5abc0b2d0048799a28d2b56490b6680bd0da5c4c1
-
Filesize
72KB
MD52884d163043a04f5c6f0c457d05f05b8
SHA1ccf74c6c56027f3bf9495aaef73d029585c5eb26
SHA25669c3c38842a40e94147ff04632caad6d416483866bfb9e39cc67ef61fd29ad55
SHA512a5cbf12bfd0310cc0ce8c412bca4d5777c2685c606afbbc42143204a3c52aef6dfe954a26e2c142679200ba5abc0b2d0048799a28d2b56490b6680bd0da5c4c1
-
Filesize
72KB
MD5edb4a06879d82c0d9ee0f676d8919986
SHA1af0e6cfcafcc3d82fdb63755fdd9d9e7051f9071
SHA25630045965c7706049565fab3904d77fc02b182d57cd9486eb032f4105a5da7b55
SHA51217eb81b7839f5780ce84093181d82b1a68d459132a37e974f4c4feeaca90866ddb82b30958e3be0dbac1c775f03b970355bb38159d62cf7dddbba09e04c2a11b
-
Filesize
72KB
MD5edb4a06879d82c0d9ee0f676d8919986
SHA1af0e6cfcafcc3d82fdb63755fdd9d9e7051f9071
SHA25630045965c7706049565fab3904d77fc02b182d57cd9486eb032f4105a5da7b55
SHA51217eb81b7839f5780ce84093181d82b1a68d459132a37e974f4c4feeaca90866ddb82b30958e3be0dbac1c775f03b970355bb38159d62cf7dddbba09e04c2a11b
-
Filesize
72KB
MD55ff88521216f95b613fbe44be9adb75a
SHA17536c6cacce9778cf827069ae3cbc23d9e7f50bf
SHA25606846c888051f82de13b052a411696027339cc4c29421042f5cd4cb92a357d99
SHA512158f4e47a4d145bc66c98e10aad41c881942462552a9c9d8dccececc7dac11dc63f296314ed2518eb4058d1b10241cb7b0b60a111ddd518a904fc9207d0fc91d
-
Filesize
72KB
MD55ff88521216f95b613fbe44be9adb75a
SHA17536c6cacce9778cf827069ae3cbc23d9e7f50bf
SHA25606846c888051f82de13b052a411696027339cc4c29421042f5cd4cb92a357d99
SHA512158f4e47a4d145bc66c98e10aad41c881942462552a9c9d8dccececc7dac11dc63f296314ed2518eb4058d1b10241cb7b0b60a111ddd518a904fc9207d0fc91d
-
Filesize
72KB
MD5dd2d6f8312e23a707fa86618667e1d3b
SHA15f1c48211b140e564076ffa130885e8b4507dfd3
SHA2568cccbd459491a68c64e6f063b98ecc03219dde1564ee8f44406536a11369278d
SHA512e8091ab463b1f3d54c07f309e03f3660665164b8dc7a4e55a3a14ad04285609674397579c3b97324091d6243a6119c2f8cfb5c49f548367f40cd047b4fc5dd7c
-
Filesize
72KB
MD5dd2d6f8312e23a707fa86618667e1d3b
SHA15f1c48211b140e564076ffa130885e8b4507dfd3
SHA2568cccbd459491a68c64e6f063b98ecc03219dde1564ee8f44406536a11369278d
SHA512e8091ab463b1f3d54c07f309e03f3660665164b8dc7a4e55a3a14ad04285609674397579c3b97324091d6243a6119c2f8cfb5c49f548367f40cd047b4fc5dd7c
-
Filesize
72KB
MD526b560947b30748ec18ac294f94009b5
SHA1b9674364db9a1c2633fec23dcbb9a8202430a9bf
SHA25631179ec62e7c9a3ce24c7f9517d41d1e468e7a3b5a97626170b21aa819a39d75
SHA512d4249a8d7db7dd0f853ecf9866461507cf3bd48ffe2c96c55a849500d8bd9eeef0bc7900b6cd388e95a910669f79600d05d261848caba21db95e0300851e55b6
-
Filesize
72KB
MD526b560947b30748ec18ac294f94009b5
SHA1b9674364db9a1c2633fec23dcbb9a8202430a9bf
SHA25631179ec62e7c9a3ce24c7f9517d41d1e468e7a3b5a97626170b21aa819a39d75
SHA512d4249a8d7db7dd0f853ecf9866461507cf3bd48ffe2c96c55a849500d8bd9eeef0bc7900b6cd388e95a910669f79600d05d261848caba21db95e0300851e55b6
-
Filesize
72KB
MD542303f095c148651202973f70b0a6346
SHA1b0abb114f87ebf0633711ec75e1e69e03252f939
SHA256d38f821ccc36fadb19060ecee27c53f6e356814898eff70094115bcbfa5a84be
SHA5123673696f0aac7c80fe58121fe895619335f5bec05af84b2777667276c59bdf46b8e531f710846a11113236a544e88cc8b3f5f8a9abe7fa5b22a67023ff50a3a9
-
Filesize
72KB
MD542303f095c148651202973f70b0a6346
SHA1b0abb114f87ebf0633711ec75e1e69e03252f939
SHA256d38f821ccc36fadb19060ecee27c53f6e356814898eff70094115bcbfa5a84be
SHA5123673696f0aac7c80fe58121fe895619335f5bec05af84b2777667276c59bdf46b8e531f710846a11113236a544e88cc8b3f5f8a9abe7fa5b22a67023ff50a3a9
-
Filesize
72KB
MD53abdc2defd8243b2fb8f785525937267
SHA1597cf56582a42fb4948f2e28eecf0b9c19e011ae
SHA2565e1c9da240ca7058ee8df7545df00339b9b418e4ac58f8b33bebcc9a4605418a
SHA512e2454d96d8e04dc8c2d0d0aefda506c21695b56c8c4246068455c42d97e62526104c058fde17b837de37c3bba059b5efc7d371d26d762abb11ff8df256d6d602
-
Filesize
72KB
MD53abdc2defd8243b2fb8f785525937267
SHA1597cf56582a42fb4948f2e28eecf0b9c19e011ae
SHA2565e1c9da240ca7058ee8df7545df00339b9b418e4ac58f8b33bebcc9a4605418a
SHA512e2454d96d8e04dc8c2d0d0aefda506c21695b56c8c4246068455c42d97e62526104c058fde17b837de37c3bba059b5efc7d371d26d762abb11ff8df256d6d602
-
Filesize
72KB
MD523e89aa182df05fac9a3d4a453fad54b
SHA1716c2eeaa1b181a30b13a1c1d493f65e8cedc8bb
SHA256113a3c2b1707dfe2ecc6f9df18fe82c5c8b2e6cc6fdcd096486fe38004c76ec0
SHA5126001e7d537ef13d9c950ef5ec389d319ec386b64f6535cd8557fbde72d751fd5bf55fc1fa7c85fbf07eabf4ce0a763175493bb6960e65195fb8b063e7ae48b33
-
Filesize
72KB
MD523e89aa182df05fac9a3d4a453fad54b
SHA1716c2eeaa1b181a30b13a1c1d493f65e8cedc8bb
SHA256113a3c2b1707dfe2ecc6f9df18fe82c5c8b2e6cc6fdcd096486fe38004c76ec0
SHA5126001e7d537ef13d9c950ef5ec389d319ec386b64f6535cd8557fbde72d751fd5bf55fc1fa7c85fbf07eabf4ce0a763175493bb6960e65195fb8b063e7ae48b33
-
Filesize
72KB
MD54d0bb4e252cc65b3cb3a1ce867b293db
SHA10e4724b27636fe4adbea87894329959f9a9cc75a
SHA256f9017d543068ab6dfa169910eae1edc5b5fbb3fb1dcba6a505089cc182076126
SHA51211b01df3f970d8ea2b05f02a9cc1eddd21e7e5153627c6425a6f7802a48f58f0394b676d2139062669e21c51efc61951f3f58a8e17baa6bc59a329110904f6ed
-
Filesize
72KB
MD54d0bb4e252cc65b3cb3a1ce867b293db
SHA10e4724b27636fe4adbea87894329959f9a9cc75a
SHA256f9017d543068ab6dfa169910eae1edc5b5fbb3fb1dcba6a505089cc182076126
SHA51211b01df3f970d8ea2b05f02a9cc1eddd21e7e5153627c6425a6f7802a48f58f0394b676d2139062669e21c51efc61951f3f58a8e17baa6bc59a329110904f6ed
-
Filesize
72KB
MD5e19e29d97e86f276c369f817195229e7
SHA1a70c97e70f9acd8855ab2e7df03be48dafa6109f
SHA2569c7d3639f0904afe48202ce3e0574efc6cb261ab0048742e1b5d2b3eb1b43aeb
SHA51281fe4fd489b7933e97563131f0b4dbc8f190e4c99a292b79eee72652d498317112709bc96607c5cd87d6af5ef4a444d0ff4c4945a62feafb312f5f81f585b04e
-
Filesize
72KB
MD5e19e29d97e86f276c369f817195229e7
SHA1a70c97e70f9acd8855ab2e7df03be48dafa6109f
SHA2569c7d3639f0904afe48202ce3e0574efc6cb261ab0048742e1b5d2b3eb1b43aeb
SHA51281fe4fd489b7933e97563131f0b4dbc8f190e4c99a292b79eee72652d498317112709bc96607c5cd87d6af5ef4a444d0ff4c4945a62feafb312f5f81f585b04e
-
Filesize
72KB
MD597be6c8cfa52820fcd845bef40cdc7d2
SHA14618b975f69837c15561792083c9f710d684bc0e
SHA256e68d2dc38d83812ab20272b331f4c3d259d7360d02baed120a94728304dfc507
SHA5123f506f2dc5f1df93d7404a87dd5370f7e802263baa69d59f0c25170496bead7d4ec7a1957d35bbfb46a6a01cef52848dc64941938530657aad0c8411cef2724a
-
Filesize
72KB
MD597be6c8cfa52820fcd845bef40cdc7d2
SHA14618b975f69837c15561792083c9f710d684bc0e
SHA256e68d2dc38d83812ab20272b331f4c3d259d7360d02baed120a94728304dfc507
SHA5123f506f2dc5f1df93d7404a87dd5370f7e802263baa69d59f0c25170496bead7d4ec7a1957d35bbfb46a6a01cef52848dc64941938530657aad0c8411cef2724a
-
Filesize
72KB
MD52ac18f4f7c7ba6eb8fb87a45ad17a3af
SHA1652c38cd2c448189cc7ce2952684c30569b4534e
SHA25649d4d3e2a474119d0410a06555b9b95a17a1bfa036807df524877eb78fd302e5
SHA5122fd25bf8853d3d482bc6b0fcb4e514f82f6555387cfbb8b6f359acff40289b14a32e8b2f777444d2f9bfc010b136fa93e3d37db3f6959b92ea2a276cb211d39c
-
Filesize
72KB
MD52ac18f4f7c7ba6eb8fb87a45ad17a3af
SHA1652c38cd2c448189cc7ce2952684c30569b4534e
SHA25649d4d3e2a474119d0410a06555b9b95a17a1bfa036807df524877eb78fd302e5
SHA5122fd25bf8853d3d482bc6b0fcb4e514f82f6555387cfbb8b6f359acff40289b14a32e8b2f777444d2f9bfc010b136fa93e3d37db3f6959b92ea2a276cb211d39c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52ac18f4f7c7ba6eb8fb87a45ad17a3af
SHA1652c38cd2c448189cc7ce2952684c30569b4534e
SHA25649d4d3e2a474119d0410a06555b9b95a17a1bfa036807df524877eb78fd302e5
SHA5122fd25bf8853d3d482bc6b0fcb4e514f82f6555387cfbb8b6f359acff40289b14a32e8b2f777444d2f9bfc010b136fa93e3d37db3f6959b92ea2a276cb211d39c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52ac18f4f7c7ba6eb8fb87a45ad17a3af
SHA1652c38cd2c448189cc7ce2952684c30569b4534e
SHA25649d4d3e2a474119d0410a06555b9b95a17a1bfa036807df524877eb78fd302e5
SHA5122fd25bf8853d3d482bc6b0fcb4e514f82f6555387cfbb8b6f359acff40289b14a32e8b2f777444d2f9bfc010b136fa93e3d37db3f6959b92ea2a276cb211d39c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
Filesize
72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
Filesize
72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
Filesize
72KB
MD597be6c8cfa52820fcd845bef40cdc7d2
SHA14618b975f69837c15561792083c9f710d684bc0e
SHA256e68d2dc38d83812ab20272b331f4c3d259d7360d02baed120a94728304dfc507
SHA5123f506f2dc5f1df93d7404a87dd5370f7e802263baa69d59f0c25170496bead7d4ec7a1957d35bbfb46a6a01cef52848dc64941938530657aad0c8411cef2724a
-
Filesize
72KB
MD597be6c8cfa52820fcd845bef40cdc7d2
SHA14618b975f69837c15561792083c9f710d684bc0e
SHA256e68d2dc38d83812ab20272b331f4c3d259d7360d02baed120a94728304dfc507
SHA5123f506f2dc5f1df93d7404a87dd5370f7e802263baa69d59f0c25170496bead7d4ec7a1957d35bbfb46a6a01cef52848dc64941938530657aad0c8411cef2724a
-
Filesize
72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0
-
Filesize
72KB
MD5203f1e9850310ab18ee0c1d8540e3533
SHA181b0ea7c757d9a56b7a62b3313c15633a2e3118b
SHA25656350d012cd8a0df5ba48d41bb98c8170909e46537966de3a248bdfcc8bbbd1f
SHA512bb3a9445079a129b9337c9e071db92561846687d63aeed1435009b59572ec00814d98b3edfdd3ac90425b35dfefaea0110cf24d3c21ac71e11aa114268058ff0