Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe
Resource
win10v2004-20220812-en
General
-
Target
4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe
-
Size
72KB
-
MD5
0c93b95213b43a4f2021e7d65ffb678f
-
SHA1
5fd64b23f5bf71c64aad363722ea35342eee2531
-
SHA256
4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08
-
SHA512
7014cb8ce1ee7904894e15cdba32c5534686f6488b5334fd44740303df950f5262cbc45434fd8f7b0d6f8f3f88fac8182b66b9bb858d0b0e3792365fd68327b8
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2G:ipQNwC3BEddsEqOt/hyJF+x3BEJwRra
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 948 backup.exe 2004 data.exe 468 backup.exe 1648 backup.exe 1144 backup.exe 1436 backup.exe 1500 backup.exe 1476 backup.exe 860 data.exe 1304 backup.exe 1868 backup.exe 572 backup.exe 1712 backup.exe 1468 backup.exe 1580 backup.exe 1948 backup.exe 1168 backup.exe 992 backup.exe 1428 backup.exe 1380 System Restore.exe 1084 backup.exe 1268 backup.exe 316 backup.exe 1036 backup.exe 1540 update.exe 1544 update.exe 1800 update.exe 1152 update.exe 820 backup.exe 1772 backup.exe 928 data.exe 660 backup.exe 760 backup.exe 580 update.exe 1728 backup.exe 1480 backup.exe 1468 update.exe 1848 backup.exe 1552 backup.exe 1676 backup.exe 2004 backup.exe 2036 backup.exe 2032 backup.exe 1936 backup.exe 980 backup.exe 1380 backup.exe 280 backup.exe 1016 backup.exe 2016 backup.exe 1284 System Restore.exe 1312 backup.exe 1540 backup.exe 1636 backup.exe 860 backup.exe 1544 backup.exe 1512 backup.exe 1756 backup.exe 1628 backup.exe 804 backup.exe 756 backup.exe 1684 backup.exe 1340 backup.exe 304 backup.exe 108 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 1476 backup.exe 1476 backup.exe 860 data.exe 860 data.exe 1476 backup.exe 1476 backup.exe 1868 backup.exe 1868 backup.exe 1476 backup.exe 572 backup.exe 572 backup.exe 1476 backup.exe 1712 backup.exe 1712 backup.exe 1868 backup.exe 1868 backup.exe 1580 backup.exe 1948 backup.exe 1580 backup.exe 1948 backup.exe 992 backup.exe 1168 backup.exe 992 backup.exe 1168 backup.exe 1168 backup.exe 1168 backup.exe 992 backup.exe 992 backup.exe 1084 backup.exe 1084 backup.exe 1268 backup.exe 1268 backup.exe 1084 backup.exe 1268 backup.exe 1544 update.exe 1540 update.exe 1544 update.exe 1540 update.exe 1544 update.exe 1540 update.exe 1268 backup.exe 1084 backup.exe 1152 update.exe 1152 update.exe 1152 update.exe 1800 update.exe 1800 update.exe 1800 update.exe 1084 backup.exe 1268 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\update.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe data.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 948 backup.exe 2004 data.exe 468 backup.exe 1648 backup.exe 1144 backup.exe 1436 backup.exe 1500 backup.exe 1476 backup.exe 860 data.exe 1304 backup.exe 1868 backup.exe 572 backup.exe 1712 backup.exe 1468 backup.exe 1580 backup.exe 1948 backup.exe 1168 backup.exe 992 backup.exe 1428 backup.exe 1380 System Restore.exe 1084 backup.exe 1268 backup.exe 316 backup.exe 1036 backup.exe 1544 update.exe 1540 update.exe 1152 update.exe 1800 update.exe 820 backup.exe 1772 backup.exe 660 backup.exe 928 data.exe 760 backup.exe 580 update.exe 1728 backup.exe 1480 backup.exe 1848 backup.exe 1468 update.exe 1552 backup.exe 1676 backup.exe 2004 backup.exe 2036 backup.exe 2032 backup.exe 1936 backup.exe 980 backup.exe 1380 backup.exe 280 backup.exe 1016 backup.exe 2016 backup.exe 1284 System Restore.exe 1312 backup.exe 1540 backup.exe 860 backup.exe 1512 backup.exe 1636 backup.exe 1756 backup.exe 1544 backup.exe 1628 backup.exe 1148 backup.exe 804 backup.exe 1340 backup.exe 1708 backup.exe 304 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 948 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 28 PID 1204 wrote to memory of 948 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 28 PID 1204 wrote to memory of 948 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 28 PID 1204 wrote to memory of 948 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 28 PID 1204 wrote to memory of 2004 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 29 PID 1204 wrote to memory of 2004 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 29 PID 1204 wrote to memory of 2004 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 29 PID 1204 wrote to memory of 2004 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 29 PID 1204 wrote to memory of 468 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 30 PID 1204 wrote to memory of 468 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 30 PID 1204 wrote to memory of 468 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 30 PID 1204 wrote to memory of 468 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 30 PID 1204 wrote to memory of 1648 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 31 PID 1204 wrote to memory of 1648 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 31 PID 1204 wrote to memory of 1648 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 31 PID 1204 wrote to memory of 1648 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 31 PID 1204 wrote to memory of 1144 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 32 PID 1204 wrote to memory of 1144 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 32 PID 1204 wrote to memory of 1144 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 32 PID 1204 wrote to memory of 1144 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 32 PID 1204 wrote to memory of 1436 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 33 PID 1204 wrote to memory of 1436 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 33 PID 1204 wrote to memory of 1436 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 33 PID 1204 wrote to memory of 1436 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 33 PID 1204 wrote to memory of 1500 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 34 PID 1204 wrote to memory of 1500 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 34 PID 1204 wrote to memory of 1500 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 34 PID 1204 wrote to memory of 1500 1204 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe 34 PID 948 wrote to memory of 1476 948 backup.exe 35 PID 948 wrote to memory of 1476 948 backup.exe 35 PID 948 wrote to memory of 1476 948 backup.exe 35 PID 948 wrote to memory of 1476 948 backup.exe 35 PID 1476 wrote to memory of 860 1476 backup.exe 36 PID 1476 wrote to memory of 860 1476 backup.exe 36 PID 1476 wrote to memory of 860 1476 backup.exe 36 PID 1476 wrote to memory of 860 1476 backup.exe 36 PID 860 wrote to memory of 1304 860 data.exe 37 PID 860 wrote to memory of 1304 860 data.exe 37 PID 860 wrote to memory of 1304 860 data.exe 37 PID 860 wrote to memory of 1304 860 data.exe 37 PID 1476 wrote to memory of 1868 1476 backup.exe 38 PID 1476 wrote to memory of 1868 1476 backup.exe 38 PID 1476 wrote to memory of 1868 1476 backup.exe 38 PID 1476 wrote to memory of 1868 1476 backup.exe 38 PID 1868 wrote to memory of 572 1868 backup.exe 39 PID 1868 wrote to memory of 572 1868 backup.exe 39 PID 1868 wrote to memory of 572 1868 backup.exe 39 PID 1868 wrote to memory of 572 1868 backup.exe 39 PID 572 wrote to memory of 1468 572 backup.exe 41 PID 572 wrote to memory of 1468 572 backup.exe 41 PID 572 wrote to memory of 1468 572 backup.exe 41 PID 572 wrote to memory of 1468 572 backup.exe 41 PID 1476 wrote to memory of 1712 1476 backup.exe 40 PID 1476 wrote to memory of 1712 1476 backup.exe 40 PID 1476 wrote to memory of 1712 1476 backup.exe 40 PID 1476 wrote to memory of 1712 1476 backup.exe 40 PID 1712 wrote to memory of 1580 1712 backup.exe 42 PID 1712 wrote to memory of 1580 1712 backup.exe 42 PID 1712 wrote to memory of 1580 1712 backup.exe 42 PID 1712 wrote to memory of 1580 1712 backup.exe 42 PID 1868 wrote to memory of 1948 1868 backup.exe 43 PID 1868 wrote to memory of 1948 1868 backup.exe 43 PID 1868 wrote to memory of 1948 1868 backup.exe 43 PID 1868 wrote to memory of 1948 1868 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe"C:\Users\Admin\AppData\Local\Temp\4db65da5e39abee36789efebe32dd21ac14bae1f56417991d2184a62c7cf6d08.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\1455436911\backup.exeC:\Users\Admin\AppData\Local\Temp\1455436911\backup.exe C:\Users\Admin\AppData\Local\Temp\1455436911\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:948 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\PerfLogs\data.exeC:\PerfLogs\data.exe C:\PerfLogs\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1304
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:572 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1168 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1428
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1152
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:660
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1848
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1552
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:280
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1312
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1340
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1144
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵PID:316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:1848
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:944
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:888
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1268
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1844 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- System policy modification
PID:1976
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:1208
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:2008
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:2040
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:956
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1512
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
PID:756 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
PID:1876
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1700 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:564 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:1512
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:908
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1900
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1524
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1940
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵PID:1124
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1992
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1960 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
PID:1748 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\System Restore.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\System Restore.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1128
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1064 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1284
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:996
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1304
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1924
-
-
C:\Program Files\Microsoft Games\System Restore.exe"C:\Program Files\Microsoft Games\System Restore.exe" C:\Program Files\Microsoft Games\5⤵PID:1916
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:820 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:928
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:980 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1756
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:304 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:520
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:432 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1632
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
PID:1684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:360
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵
- Modifies visibility of file extensions in Explorer
PID:1988
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:856
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- Disables RegEdit via registry modification
- System policy modification
PID:308
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:2020
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Modifies visibility of file extensions in Explorer
PID:1176 -
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵
- Disables RegEdit via registry modification
- System policy modification
PID:660
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1312 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:1016
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1948
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1456
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1476
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1148 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:524
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:1984
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1536
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1048 -
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:2016
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:432
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1580
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:860 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1772 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:1852
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:1420
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1720
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
PID:108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\data.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\data.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5741a0e464f7428441197dd25ba028a83
SHA17581dbd10c030e1c725da70124a23b913a07cfc5
SHA256282675bf160e330f9c76876afda67dbc0bf2a98efec5bdd1879bd067eda56973
SHA5128fbae052f00b00b9e72d7d7cbe1a71028697c1a004bd831b77ab519e6c51072841be3994672fb482099ea907c26182af58b31fd2c0f643727d61bc0e74a57af8
-
Filesize
72KB
MD53a56f18c05c382640c8d4aefc25bd0b9
SHA1ca499e670ec438b7b2388b595dd2ee60f05fe4c5
SHA256899b5566688c1b8537b5c559e1d3291d760e375aa985159e8d65db4b6312556b
SHA5128607c67afb5b366f6ddfeb80b3146f558c1852ddaf3b3e6a49d3b945a82b36eabc0fb901761ba3f0c05b4e7f414da8cbb27566bb56e97681b42915d016c9727f
-
Filesize
72KB
MD53a56f18c05c382640c8d4aefc25bd0b9
SHA1ca499e670ec438b7b2388b595dd2ee60f05fe4c5
SHA256899b5566688c1b8537b5c559e1d3291d760e375aa985159e8d65db4b6312556b
SHA5128607c67afb5b366f6ddfeb80b3146f558c1852ddaf3b3e6a49d3b945a82b36eabc0fb901761ba3f0c05b4e7f414da8cbb27566bb56e97681b42915d016c9727f
-
Filesize
72KB
MD58cca9fd1dfdb692af606cbb51cfff6b1
SHA17098b212c845adfd68f6e2c70fb93e92baf88847
SHA256b126d358fe31daacc8d0b8397a4553d72f24b0bd3712cce9e7662685ba1edb1d
SHA512a377e086f766889af7993dcb29d46729d6d8f6f08ea1a5124f7d6d9bcd4b20a9d4ddf352dd4aab011903d3dbde76e84fb97863bcc9e1fd5f381809dda06f5776
-
Filesize
72KB
MD58cca9fd1dfdb692af606cbb51cfff6b1
SHA17098b212c845adfd68f6e2c70fb93e92baf88847
SHA256b126d358fe31daacc8d0b8397a4553d72f24b0bd3712cce9e7662685ba1edb1d
SHA512a377e086f766889af7993dcb29d46729d6d8f6f08ea1a5124f7d6d9bcd4b20a9d4ddf352dd4aab011903d3dbde76e84fb97863bcc9e1fd5f381809dda06f5776
-
Filesize
72KB
MD57e31c0ba207c78bdf638b76fe3762a58
SHA116714716d9bed215dc2693a656859900710f8576
SHA2566e1ea8e4578efd13f6fefaeeaba335d5f99739bef9a0e45bdeebb474c98f98ad
SHA512e028454230b3ab4cdbbd524973cd0e3fa129c7a5c615baaf5295dceb53f0766e481b7fe09b59d4a89cad9c903bdaf631486b1ec41fd0ac3766ee5663d74c5bc7
-
Filesize
72KB
MD57e31c0ba207c78bdf638b76fe3762a58
SHA116714716d9bed215dc2693a656859900710f8576
SHA2566e1ea8e4578efd13f6fefaeeaba335d5f99739bef9a0e45bdeebb474c98f98ad
SHA512e028454230b3ab4cdbbd524973cd0e3fa129c7a5c615baaf5295dceb53f0766e481b7fe09b59d4a89cad9c903bdaf631486b1ec41fd0ac3766ee5663d74c5bc7
-
Filesize
72KB
MD510f96f74401c0d53f4a4a3026ebfd19c
SHA1ac95e49eb7cdd8f98cea83549a74de8465d3f6ea
SHA256eaeb660baae0593028202223756501687092a4c5fb9d9f50773f344224fe483c
SHA512dc8008c1c50327eefbd885718bb0e458e8917bba8c89d1e4d0e00853295341bbb8c584613ab42a55435e3d6dbc1805f229a0d52c4331d7c0a1b8599efa970e33
-
Filesize
72KB
MD510f96f74401c0d53f4a4a3026ebfd19c
SHA1ac95e49eb7cdd8f98cea83549a74de8465d3f6ea
SHA256eaeb660baae0593028202223756501687092a4c5fb9d9f50773f344224fe483c
SHA512dc8008c1c50327eefbd885718bb0e458e8917bba8c89d1e4d0e00853295341bbb8c584613ab42a55435e3d6dbc1805f229a0d52c4331d7c0a1b8599efa970e33
-
Filesize
72KB
MD5434e06aa91d29a6435c0cd503a40f27d
SHA1344aa3b84ee076a90632884b1f7863439f2325c9
SHA256c6d5dda9ca74ea7fcfa3c3aa63300fcc40e6608575d05627e0b1e027e3d0a557
SHA512a2b7bfefee3e235db23952c4167d68164096a532512cfe9f241f92c63b384c41a9d06c802d3fbc17a764dc57c31c8213eaf10a8e340f7c050868fd381df523d2
-
Filesize
72KB
MD5092927688ec1e872c3c1cb3950b878e1
SHA1e46a30be34a6a82ecc17de7a84257d5d7f494199
SHA256b8a8b3e8e97d5aa188179184647811d1a7192d20cd0cf6837c572a4ad0267abc
SHA5129b50034bbd8b57bca72b4420905495b2ddcb9034c1c250ef4c80859323f09bcd39d1db61f99ad9de6ac0b4f09f0aad58866a456d27f16016c6ce789a421b31b5
-
Filesize
72KB
MD5092927688ec1e872c3c1cb3950b878e1
SHA1e46a30be34a6a82ecc17de7a84257d5d7f494199
SHA256b8a8b3e8e97d5aa188179184647811d1a7192d20cd0cf6837c572a4ad0267abc
SHA5129b50034bbd8b57bca72b4420905495b2ddcb9034c1c250ef4c80859323f09bcd39d1db61f99ad9de6ac0b4f09f0aad58866a456d27f16016c6ce789a421b31b5
-
Filesize
72KB
MD5feb32320ea855a8773213dca5c2819a4
SHA1131905312470ba8cf435ff7b36d5714314b16fde
SHA25664cb04d69add6bba8ec57f9b6f1ad32e6e248ab7161899c79c6712518e01a0d9
SHA512a5835c68d2c1341c54d570e559fc0148602ad899c3a20feaa4459eb6cbe45b33a351d7f3beb6906dccd1190dd1e17dcdf6d465220acb8ba004438d10d4e9bae2
-
Filesize
72KB
MD5feb32320ea855a8773213dca5c2819a4
SHA1131905312470ba8cf435ff7b36d5714314b16fde
SHA25664cb04d69add6bba8ec57f9b6f1ad32e6e248ab7161899c79c6712518e01a0d9
SHA512a5835c68d2c1341c54d570e559fc0148602ad899c3a20feaa4459eb6cbe45b33a351d7f3beb6906dccd1190dd1e17dcdf6d465220acb8ba004438d10d4e9bae2
-
Filesize
72KB
MD5b7d70618d55279f5ad9c9a259eed6ab1
SHA1b653844c1b27631e0e2a57da0966ff9eab9ca853
SHA256fa37df174b27bb7d1e0d4c9d7149f5a81f54df3c3089c5708c62f5eb49c2dfde
SHA512f7d7282c0fe1166d50d721b17894bb0dc83fbfd255713020b7d6b62094317501f714f469328152a62e04746e22bcff33cee0befa586f83fed862e2cff015bc63
-
Filesize
72KB
MD5b7d70618d55279f5ad9c9a259eed6ab1
SHA1b653844c1b27631e0e2a57da0966ff9eab9ca853
SHA256fa37df174b27bb7d1e0d4c9d7149f5a81f54df3c3089c5708c62f5eb49c2dfde
SHA512f7d7282c0fe1166d50d721b17894bb0dc83fbfd255713020b7d6b62094317501f714f469328152a62e04746e22bcff33cee0befa586f83fed862e2cff015bc63
-
Filesize
72KB
MD5cd7ef48dd5dd5bc360c10ca567022729
SHA1aeb2651a0f8a866bd11b143929cfa1d3f2a2d840
SHA256289ed6ca2257b71bb9fcb257cfd7a0ae7f959344c7586ee87ac08c675b9fad8e
SHA5123d792b1c0c7c8e01a9f63ff38c3a9de22bffb81a558c75220cb51edb46f1cf02bb67897b1a08c17f78d631e372d7195d9d661184cae91959e7c6df7363082bef
-
Filesize
72KB
MD5cd7ef48dd5dd5bc360c10ca567022729
SHA1aeb2651a0f8a866bd11b143929cfa1d3f2a2d840
SHA256289ed6ca2257b71bb9fcb257cfd7a0ae7f959344c7586ee87ac08c675b9fad8e
SHA5123d792b1c0c7c8e01a9f63ff38c3a9de22bffb81a558c75220cb51edb46f1cf02bb67897b1a08c17f78d631e372d7195d9d661184cae91959e7c6df7363082bef
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD537238f36dab40d874de3c3274b6f05d2
SHA10d3b3e071f84fbf7513958bf558b647c57cb4051
SHA2565899c083522c0a2f17794294bdac28b48bd09ee18db3324e6b4fdf2855d8976e
SHA512192c59053c145be4f5fe651bf21eaebaeec5a2c1f6b1aab1b1bfd5d6e1b6554040aa7ac64583b85d3caf97b100cea94521dcac49bf169636ffba7107d08fb516
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD537238f36dab40d874de3c3274b6f05d2
SHA10d3b3e071f84fbf7513958bf558b647c57cb4051
SHA2565899c083522c0a2f17794294bdac28b48bd09ee18db3324e6b4fdf2855d8976e
SHA512192c59053c145be4f5fe651bf21eaebaeec5a2c1f6b1aab1b1bfd5d6e1b6554040aa7ac64583b85d3caf97b100cea94521dcac49bf169636ffba7107d08fb516
-
Filesize
72KB
MD52c3573607d596eb6f09717a5900676d6
SHA1c16d5f0788294f6ec1f864c4c98a15516be575e2
SHA25636d57cbab60499b922ef3fba3c7190b03f1b50a906eb7134dbfb3404437737f1
SHA5122debe0461d655b9af278ef1d83ca2e72a7e2131cdab1a7d79c912fed5faa7c39c906af774d8d8ab5c748141746a0e70c74e494c6f9db11901fda47c537d7791c
-
Filesize
72KB
MD52c3573607d596eb6f09717a5900676d6
SHA1c16d5f0788294f6ec1f864c4c98a15516be575e2
SHA25636d57cbab60499b922ef3fba3c7190b03f1b50a906eb7134dbfb3404437737f1
SHA5122debe0461d655b9af278ef1d83ca2e72a7e2131cdab1a7d79c912fed5faa7c39c906af774d8d8ab5c748141746a0e70c74e494c6f9db11901fda47c537d7791c
-
Filesize
72KB
MD5741a0e464f7428441197dd25ba028a83
SHA17581dbd10c030e1c725da70124a23b913a07cfc5
SHA256282675bf160e330f9c76876afda67dbc0bf2a98efec5bdd1879bd067eda56973
SHA5128fbae052f00b00b9e72d7d7cbe1a71028697c1a004bd831b77ab519e6c51072841be3994672fb482099ea907c26182af58b31fd2c0f643727d61bc0e74a57af8
-
Filesize
72KB
MD5741a0e464f7428441197dd25ba028a83
SHA17581dbd10c030e1c725da70124a23b913a07cfc5
SHA256282675bf160e330f9c76876afda67dbc0bf2a98efec5bdd1879bd067eda56973
SHA5128fbae052f00b00b9e72d7d7cbe1a71028697c1a004bd831b77ab519e6c51072841be3994672fb482099ea907c26182af58b31fd2c0f643727d61bc0e74a57af8
-
Filesize
72KB
MD53a56f18c05c382640c8d4aefc25bd0b9
SHA1ca499e670ec438b7b2388b595dd2ee60f05fe4c5
SHA256899b5566688c1b8537b5c559e1d3291d760e375aa985159e8d65db4b6312556b
SHA5128607c67afb5b366f6ddfeb80b3146f558c1852ddaf3b3e6a49d3b945a82b36eabc0fb901761ba3f0c05b4e7f414da8cbb27566bb56e97681b42915d016c9727f
-
Filesize
72KB
MD53a56f18c05c382640c8d4aefc25bd0b9
SHA1ca499e670ec438b7b2388b595dd2ee60f05fe4c5
SHA256899b5566688c1b8537b5c559e1d3291d760e375aa985159e8d65db4b6312556b
SHA5128607c67afb5b366f6ddfeb80b3146f558c1852ddaf3b3e6a49d3b945a82b36eabc0fb901761ba3f0c05b4e7f414da8cbb27566bb56e97681b42915d016c9727f
-
Filesize
72KB
MD5b28e337079491075463dec84b33e373a
SHA1dc89a51a294a0a206427237cd9b3157623e026e9
SHA2562708f27249d25b1bad87cfc19360462422ef1c4a0d1c30d9a387ea0d5121b75a
SHA512504397198b23c4ae0f7fcfaea44461053861a4fc979674882b51326b20430ba40800bfe6b1fdb84625ea3795646d029045de4e2991f64dd31fe12e6ad966ca8a
-
Filesize
72KB
MD58cca9fd1dfdb692af606cbb51cfff6b1
SHA17098b212c845adfd68f6e2c70fb93e92baf88847
SHA256b126d358fe31daacc8d0b8397a4553d72f24b0bd3712cce9e7662685ba1edb1d
SHA512a377e086f766889af7993dcb29d46729d6d8f6f08ea1a5124f7d6d9bcd4b20a9d4ddf352dd4aab011903d3dbde76e84fb97863bcc9e1fd5f381809dda06f5776
-
Filesize
72KB
MD58cca9fd1dfdb692af606cbb51cfff6b1
SHA17098b212c845adfd68f6e2c70fb93e92baf88847
SHA256b126d358fe31daacc8d0b8397a4553d72f24b0bd3712cce9e7662685ba1edb1d
SHA512a377e086f766889af7993dcb29d46729d6d8f6f08ea1a5124f7d6d9bcd4b20a9d4ddf352dd4aab011903d3dbde76e84fb97863bcc9e1fd5f381809dda06f5776
-
Filesize
72KB
MD57e31c0ba207c78bdf638b76fe3762a58
SHA116714716d9bed215dc2693a656859900710f8576
SHA2566e1ea8e4578efd13f6fefaeeaba335d5f99739bef9a0e45bdeebb474c98f98ad
SHA512e028454230b3ab4cdbbd524973cd0e3fa129c7a5c615baaf5295dceb53f0766e481b7fe09b59d4a89cad9c903bdaf631486b1ec41fd0ac3766ee5663d74c5bc7
-
Filesize
72KB
MD57e31c0ba207c78bdf638b76fe3762a58
SHA116714716d9bed215dc2693a656859900710f8576
SHA2566e1ea8e4578efd13f6fefaeeaba335d5f99739bef9a0e45bdeebb474c98f98ad
SHA512e028454230b3ab4cdbbd524973cd0e3fa129c7a5c615baaf5295dceb53f0766e481b7fe09b59d4a89cad9c903bdaf631486b1ec41fd0ac3766ee5663d74c5bc7
-
Filesize
72KB
MD510f96f74401c0d53f4a4a3026ebfd19c
SHA1ac95e49eb7cdd8f98cea83549a74de8465d3f6ea
SHA256eaeb660baae0593028202223756501687092a4c5fb9d9f50773f344224fe483c
SHA512dc8008c1c50327eefbd885718bb0e458e8917bba8c89d1e4d0e00853295341bbb8c584613ab42a55435e3d6dbc1805f229a0d52c4331d7c0a1b8599efa970e33
-
Filesize
72KB
MD510f96f74401c0d53f4a4a3026ebfd19c
SHA1ac95e49eb7cdd8f98cea83549a74de8465d3f6ea
SHA256eaeb660baae0593028202223756501687092a4c5fb9d9f50773f344224fe483c
SHA512dc8008c1c50327eefbd885718bb0e458e8917bba8c89d1e4d0e00853295341bbb8c584613ab42a55435e3d6dbc1805f229a0d52c4331d7c0a1b8599efa970e33
-
Filesize
72KB
MD5434e06aa91d29a6435c0cd503a40f27d
SHA1344aa3b84ee076a90632884b1f7863439f2325c9
SHA256c6d5dda9ca74ea7fcfa3c3aa63300fcc40e6608575d05627e0b1e027e3d0a557
SHA512a2b7bfefee3e235db23952c4167d68164096a532512cfe9f241f92c63b384c41a9d06c802d3fbc17a764dc57c31c8213eaf10a8e340f7c050868fd381df523d2
-
Filesize
72KB
MD5434e06aa91d29a6435c0cd503a40f27d
SHA1344aa3b84ee076a90632884b1f7863439f2325c9
SHA256c6d5dda9ca74ea7fcfa3c3aa63300fcc40e6608575d05627e0b1e027e3d0a557
SHA512a2b7bfefee3e235db23952c4167d68164096a532512cfe9f241f92c63b384c41a9d06c802d3fbc17a764dc57c31c8213eaf10a8e340f7c050868fd381df523d2
-
Filesize
72KB
MD5092927688ec1e872c3c1cb3950b878e1
SHA1e46a30be34a6a82ecc17de7a84257d5d7f494199
SHA256b8a8b3e8e97d5aa188179184647811d1a7192d20cd0cf6837c572a4ad0267abc
SHA5129b50034bbd8b57bca72b4420905495b2ddcb9034c1c250ef4c80859323f09bcd39d1db61f99ad9de6ac0b4f09f0aad58866a456d27f16016c6ce789a421b31b5
-
Filesize
72KB
MD5092927688ec1e872c3c1cb3950b878e1
SHA1e46a30be34a6a82ecc17de7a84257d5d7f494199
SHA256b8a8b3e8e97d5aa188179184647811d1a7192d20cd0cf6837c572a4ad0267abc
SHA5129b50034bbd8b57bca72b4420905495b2ddcb9034c1c250ef4c80859323f09bcd39d1db61f99ad9de6ac0b4f09f0aad58866a456d27f16016c6ce789a421b31b5
-
Filesize
72KB
MD57485c30f1e2e8fb9da57e83c12600735
SHA1ce3236b0b36945178010bb97ee5cc574eef0d683
SHA256944d05ad66de1d10d8df193b5f7d330deb4c038df7eedb47c045274f2f618edf
SHA5122192214653b263d782d505b86ab692d7c91f9f9e238b79e7833bc12fd78b04b2308aa15da20b6ce7d6f2052ef4e63324048635673ed03dc7e6b94dd9a917ff6b
-
Filesize
72KB
MD5feb32320ea855a8773213dca5c2819a4
SHA1131905312470ba8cf435ff7b36d5714314b16fde
SHA25664cb04d69add6bba8ec57f9b6f1ad32e6e248ab7161899c79c6712518e01a0d9
SHA512a5835c68d2c1341c54d570e559fc0148602ad899c3a20feaa4459eb6cbe45b33a351d7f3beb6906dccd1190dd1e17dcdf6d465220acb8ba004438d10d4e9bae2
-
Filesize
72KB
MD5feb32320ea855a8773213dca5c2819a4
SHA1131905312470ba8cf435ff7b36d5714314b16fde
SHA25664cb04d69add6bba8ec57f9b6f1ad32e6e248ab7161899c79c6712518e01a0d9
SHA512a5835c68d2c1341c54d570e559fc0148602ad899c3a20feaa4459eb6cbe45b33a351d7f3beb6906dccd1190dd1e17dcdf6d465220acb8ba004438d10d4e9bae2
-
Filesize
72KB
MD5b7d70618d55279f5ad9c9a259eed6ab1
SHA1b653844c1b27631e0e2a57da0966ff9eab9ca853
SHA256fa37df174b27bb7d1e0d4c9d7149f5a81f54df3c3089c5708c62f5eb49c2dfde
SHA512f7d7282c0fe1166d50d721b17894bb0dc83fbfd255713020b7d6b62094317501f714f469328152a62e04746e22bcff33cee0befa586f83fed862e2cff015bc63
-
Filesize
72KB
MD5b7d70618d55279f5ad9c9a259eed6ab1
SHA1b653844c1b27631e0e2a57da0966ff9eab9ca853
SHA256fa37df174b27bb7d1e0d4c9d7149f5a81f54df3c3089c5708c62f5eb49c2dfde
SHA512f7d7282c0fe1166d50d721b17894bb0dc83fbfd255713020b7d6b62094317501f714f469328152a62e04746e22bcff33cee0befa586f83fed862e2cff015bc63
-
Filesize
72KB
MD5cd7ef48dd5dd5bc360c10ca567022729
SHA1aeb2651a0f8a866bd11b143929cfa1d3f2a2d840
SHA256289ed6ca2257b71bb9fcb257cfd7a0ae7f959344c7586ee87ac08c675b9fad8e
SHA5123d792b1c0c7c8e01a9f63ff38c3a9de22bffb81a558c75220cb51edb46f1cf02bb67897b1a08c17f78d631e372d7195d9d661184cae91959e7c6df7363082bef
-
Filesize
72KB
MD5cd7ef48dd5dd5bc360c10ca567022729
SHA1aeb2651a0f8a866bd11b143929cfa1d3f2a2d840
SHA256289ed6ca2257b71bb9fcb257cfd7a0ae7f959344c7586ee87ac08c675b9fad8e
SHA5123d792b1c0c7c8e01a9f63ff38c3a9de22bffb81a558c75220cb51edb46f1cf02bb67897b1a08c17f78d631e372d7195d9d661184cae91959e7c6df7363082bef
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD537238f36dab40d874de3c3274b6f05d2
SHA10d3b3e071f84fbf7513958bf558b647c57cb4051
SHA2565899c083522c0a2f17794294bdac28b48bd09ee18db3324e6b4fdf2855d8976e
SHA512192c59053c145be4f5fe651bf21eaebaeec5a2c1f6b1aab1b1bfd5d6e1b6554040aa7ac64583b85d3caf97b100cea94521dcac49bf169636ffba7107d08fb516
-
Filesize
72KB
MD537238f36dab40d874de3c3274b6f05d2
SHA10d3b3e071f84fbf7513958bf558b647c57cb4051
SHA2565899c083522c0a2f17794294bdac28b48bd09ee18db3324e6b4fdf2855d8976e
SHA512192c59053c145be4f5fe651bf21eaebaeec5a2c1f6b1aab1b1bfd5d6e1b6554040aa7ac64583b85d3caf97b100cea94521dcac49bf169636ffba7107d08fb516
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD59d67e606cb0f1715558f434fc0eed5d0
SHA16f4ae9adfff3dbe61d34910556dea6337f813ced
SHA2562961a366fb1078d668ed8533a58cd716b8560b6e44aee7d4d588bc369920f1eb
SHA51246c0f3f7eb7a061fe8d4b6e22497adc37ceac6b12b25e4be4cc00024ba9557c152ac05b79cd43637bb87a96e5d4717c6d12f71a31f21edbd27442bf70c3a3fed
-
Filesize
72KB
MD537238f36dab40d874de3c3274b6f05d2
SHA10d3b3e071f84fbf7513958bf558b647c57cb4051
SHA2565899c083522c0a2f17794294bdac28b48bd09ee18db3324e6b4fdf2855d8976e
SHA512192c59053c145be4f5fe651bf21eaebaeec5a2c1f6b1aab1b1bfd5d6e1b6554040aa7ac64583b85d3caf97b100cea94521dcac49bf169636ffba7107d08fb516
-
Filesize
72KB
MD537238f36dab40d874de3c3274b6f05d2
SHA10d3b3e071f84fbf7513958bf558b647c57cb4051
SHA2565899c083522c0a2f17794294bdac28b48bd09ee18db3324e6b4fdf2855d8976e
SHA512192c59053c145be4f5fe651bf21eaebaeec5a2c1f6b1aab1b1bfd5d6e1b6554040aa7ac64583b85d3caf97b100cea94521dcac49bf169636ffba7107d08fb516