Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe
Resource
win10v2004-20221111-en
General
-
Target
b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe
-
Size
72KB
-
MD5
09a8a2ab21853be9ae1cd074a5134a62
-
SHA1
b402fe5821c76be606355e70b6fa73b8b1cba3e6
-
SHA256
b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753
-
SHA512
bb9820339abb4ec95176515754a40cbf21321e69f44fd85fcac793bcdd4ed713ee732949381bffac92ed760cc7a941ce787d8d94a8c9c85d02069f4e02a3d518
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2n:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPz
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1588 backup.exe 2000 backup.exe 768 backup.exe 1676 backup.exe 1860 backup.exe 268 backup.exe 1864 backup.exe 960 backup.exe 1872 backup.exe 2028 System Restore.exe 1740 backup.exe 980 backup.exe 1816 update.exe 1800 backup.exe 1828 backup.exe 1944 backup.exe 1160 backup.exe 540 backup.exe 1752 backup.exe 744 backup.exe 1900 backup.exe 1672 backup.exe 1636 backup.exe 892 backup.exe 612 backup.exe 1904 backup.exe 1912 backup.exe 1948 backup.exe 1484 backup.exe 1040 backup.exe 1488 backup.exe 1864 backup.exe 984 backup.exe 1736 backup.exe 1564 backup.exe 896 backup.exe 1916 backup.exe 1532 backup.exe 956 backup.exe 988 backup.exe 1876 backup.exe 1716 backup.exe 1288 backup.exe 748 backup.exe 1352 backup.exe 1016 System Restore.exe 1652 backup.exe 772 backup.exe 972 backup.exe 1896 backup.exe 1312 backup.exe 652 backup.exe 756 backup.exe 804 backup.exe 1184 backup.exe 816 backup.exe 2028 data.exe 1124 backup.exe 1140 backup.exe 568 backup.exe 896 System Restore.exe 1804 backup.exe 1956 update.exe 1884 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1860 backup.exe 1860 backup.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1864 backup.exe 1864 backup.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1860 backup.exe 1860 backup.exe 1740 backup.exe 1740 backup.exe 980 backup.exe 1860 backup.exe 1860 backup.exe 1800 backup.exe 1800 backup.exe 1828 backup.exe 1828 backup.exe 1944 backup.exe 1944 backup.exe 1740 backup.exe 1740 backup.exe 1944 backup.exe 1944 backup.exe 1752 backup.exe 1752 backup.exe 1752 backup.exe 1752 backup.exe 1752 backup.exe 1752 backup.exe 1772 backup.exe 1772 backup.exe 1752 backup.exe 1752 backup.exe 1772 backup.exe 892 backup.exe 892 backup.exe 1772 backup.exe 1752 backup.exe 1752 backup.exe 1904 backup.exe 1904 backup.exe 1752 backup.exe 1752 backup.exe 1904 backup.exe 1904 backup.exe 1484 backup.exe 1484 backup.exe 1904 backup.exe 1904 backup.exe 1752 backup.exe 1752 backup.exe 1904 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\data.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\data.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\addins\backup.exe update.exe File opened for modification C:\Windows\update.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 1588 backup.exe 2000 backup.exe 768 backup.exe 1676 backup.exe 1860 backup.exe 268 backup.exe 1864 backup.exe 960 backup.exe 1872 backup.exe 2028 System Restore.exe 1740 backup.exe 980 backup.exe 1800 backup.exe 1828 backup.exe 1944 backup.exe 1160 backup.exe 1752 backup.exe 744 backup.exe 1772 backup.exe 1900 backup.exe 1672 backup.exe 1636 backup.exe 892 backup.exe 612 backup.exe 1904 backup.exe 1912 backup.exe 1948 backup.exe 1484 backup.exe 1040 backup.exe 1488 backup.exe 1864 backup.exe 984 backup.exe 1736 backup.exe 1564 backup.exe 1816 update.exe 896 backup.exe 1916 backup.exe 1532 backup.exe 956 backup.exe 988 backup.exe 1876 backup.exe 1716 backup.exe 1288 backup.exe 748 backup.exe 1352 backup.exe 1016 System Restore.exe 1652 backup.exe 772 backup.exe 972 backup.exe 1896 backup.exe 1312 backup.exe 652 backup.exe 756 backup.exe 804 backup.exe 1184 backup.exe 816 backup.exe 1124 backup.exe 2028 data.exe 1140 backup.exe 1408 backup.exe 568 backup.exe 896 System Restore.exe 1804 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1588 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 26 PID 1472 wrote to memory of 1588 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 26 PID 1472 wrote to memory of 1588 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 26 PID 1472 wrote to memory of 1588 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 26 PID 1472 wrote to memory of 2000 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 27 PID 1472 wrote to memory of 2000 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 27 PID 1472 wrote to memory of 2000 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 27 PID 1472 wrote to memory of 2000 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 27 PID 1472 wrote to memory of 768 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 28 PID 1472 wrote to memory of 768 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 28 PID 1472 wrote to memory of 768 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 28 PID 1472 wrote to memory of 768 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 28 PID 1472 wrote to memory of 1676 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 29 PID 1472 wrote to memory of 1676 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 29 PID 1472 wrote to memory of 1676 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 29 PID 1472 wrote to memory of 1676 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 29 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1588 wrote to memory of 1860 1588 backup.exe 30 PID 1472 wrote to memory of 268 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 31 PID 1472 wrote to memory of 268 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 31 PID 1472 wrote to memory of 268 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 31 PID 1472 wrote to memory of 268 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 31 PID 1860 wrote to memory of 1864 1860 backup.exe 32 PID 1860 wrote to memory of 1864 1860 backup.exe 32 PID 1860 wrote to memory of 1864 1860 backup.exe 32 PID 1860 wrote to memory of 1864 1860 backup.exe 32 PID 1472 wrote to memory of 960 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 33 PID 1472 wrote to memory of 960 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 33 PID 1472 wrote to memory of 960 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 33 PID 1472 wrote to memory of 960 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 33 PID 1864 wrote to memory of 1872 1864 backup.exe 34 PID 1864 wrote to memory of 1872 1864 backup.exe 34 PID 1864 wrote to memory of 1872 1864 backup.exe 34 PID 1864 wrote to memory of 1872 1864 backup.exe 34 PID 1472 wrote to memory of 2028 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 35 PID 1472 wrote to memory of 2028 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 35 PID 1472 wrote to memory of 2028 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 35 PID 1472 wrote to memory of 2028 1472 b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe 35 PID 1860 wrote to memory of 1740 1860 backup.exe 36 PID 1860 wrote to memory of 1740 1860 backup.exe 36 PID 1860 wrote to memory of 1740 1860 backup.exe 36 PID 1860 wrote to memory of 1740 1860 backup.exe 36 PID 1740 wrote to memory of 980 1740 backup.exe 37 PID 1740 wrote to memory of 980 1740 backup.exe 37 PID 1740 wrote to memory of 980 1740 backup.exe 37 PID 1740 wrote to memory of 980 1740 backup.exe 37 PID 980 wrote to memory of 1816 980 backup.exe 38 PID 980 wrote to memory of 1816 980 backup.exe 38 PID 980 wrote to memory of 1816 980 backup.exe 38 PID 980 wrote to memory of 1816 980 backup.exe 38 PID 980 wrote to memory of 1816 980 backup.exe 38 PID 980 wrote to memory of 1816 980 backup.exe 38 PID 980 wrote to memory of 1816 980 backup.exe 38 PID 1860 wrote to memory of 1800 1860 backup.exe 39 PID 1860 wrote to memory of 1800 1860 backup.exe 39 PID 1860 wrote to memory of 1800 1860 backup.exe 39 PID 1860 wrote to memory of 1800 1860 backup.exe 39 PID 1800 wrote to memory of 1828 1800 backup.exe 40 PID 1800 wrote to memory of 1828 1800 backup.exe 40 PID 1800 wrote to memory of 1828 1800 backup.exe 40 PID 1800 wrote to memory of 1828 1800 backup.exe 40 PID 1828 wrote to memory of 1944 1828 backup.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe"C:\Users\Admin\AppData\Local\Temp\b7e884402cf92d4ef063c4a05dfa4dd5e969f8fe7b94540fe187335f1ae6d753.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3001885777\backup.exeC:\Users\Admin\AppData\Local\Temp\3001885777\backup.exe C:\Users\Admin\AppData\Local\Temp\3001885777\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1860 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1864 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:980 -
C:\Program Files\7-Zip\Lang\update.exe"C:\Program Files\7-Zip\Lang\update.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:540 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1904 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1040
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:804
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:1548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:280
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1152
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1088
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1780 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:552
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:880
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:392
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1316
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:2012
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1160
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1444
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:676
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\update.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\update.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1184
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
C:\Program Files\Common Files\SpeechEngines\System Restore.exe"C:\Program Files\Common Files\SpeechEngines\System Restore.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:988 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:744
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:2028
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1124 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1884
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1900
-
-
C:\Program Files\DVD Maker\es-ES\data.exe"C:\Program Files\DVD Maker\es-ES\data.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:560
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1200
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1828
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1692
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:852
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:652
-
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1488
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1632
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1388
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:584
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1220
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1944
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:744
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1900
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:612
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:984
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1564 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:896 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1916
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1876
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1352 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:772
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:652 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵PID:2000
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:944
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:1732
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1140 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1732
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:592
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:1696
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:1540
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵PID:1672
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1816
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵PID:936
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\update.exe"C:\Program Files (x86)\Common Files\Adobe\Help\update.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:1956 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\8⤵PID:1680
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:1808
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1836
-
-
C:\Program Files (x86)\Common Files\DESIGNER\update.exe"C:\Program Files (x86)\Common Files\DESIGNER\update.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1716
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:932
-
-
C:\Program Files (x86)\Common Files\Services\data.exe"C:\Program Files (x86)\Common Files\Services\data.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:1652
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:1892
-
-
C:\Program Files (x86)\Common Files\System\backup.exe"C:\Program Files (x86)\Common Files\System\backup.exe" C:\Program Files (x86)\Common Files\System\6⤵PID:1480
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:628
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:928
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:2076
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:748 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1652
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:972
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1608
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1832
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:1560
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:1076
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵PID:328
-
-
C:\Users\Admin\Videos\backup.exeC:\Users\Admin\Videos\backup.exe C:\Users\Admin\Videos\6⤵PID:808
-
-
-
C:\Users\Public\update.exeC:\Users\Public\update.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:892 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:1016
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:612
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:1068
-
-
-
-
C:\Windows\update.exeC:\Windows\update.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Windows directory
- System policy modification
PID:1312 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:1872
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:2016
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1660
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:568
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:824
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5943336fa752f2aaa329a2383547ab228
SHA1eafc6d37cdb74622516f641560d6d5d38983fd75
SHA25658226b393f49b1b82d84617bca6830f9ab658153986065b2801484c6ec52bf6a
SHA512fb4666b149045aa570175f721c69ac68c584d38cb23b9a5db871c4f0f5429f42e2cf01af34dfcfec92d237c607dcc24b0c1a520e2a64d0ae9d5ef42297f318b4
-
Filesize
72KB
MD56db7387278188fd165536dac6486d15c
SHA17b37546303c0395edfa41703a3692e52539c0b3e
SHA256318bf3a8b350f57fe5e39d29b6a4a347409244b55b7ec3e5f5f8eb882faa93cc
SHA512c3950d8b6a8022ebef87a5979b3783a5e3e210dae35a67e7deb56f98d8eeae939084c29ecfe7914a352119373b6a6213544fc836a99c95968c8a3aae692a80aa
-
Filesize
72KB
MD56db7387278188fd165536dac6486d15c
SHA17b37546303c0395edfa41703a3692e52539c0b3e
SHA256318bf3a8b350f57fe5e39d29b6a4a347409244b55b7ec3e5f5f8eb882faa93cc
SHA512c3950d8b6a8022ebef87a5979b3783a5e3e210dae35a67e7deb56f98d8eeae939084c29ecfe7914a352119373b6a6213544fc836a99c95968c8a3aae692a80aa
-
Filesize
72KB
MD5dd917a18185fa79145bc39462c1d6563
SHA137424667e87420eda425c924734d5e65427b3ef8
SHA256fe94fc91917843bc4e9e7eae9744c1249f355d2b7a0bbf9c10680f36f7a8292f
SHA512c5e101ab549b2d85aff177603edf429c76efc6d6bee77eebf7e2c2a78e6ebb78f4749185ee7b8f54516bbaf4f2931f5d1e1d97aecd1c08e010ab1a020e1c27e3
-
Filesize
72KB
MD5f6b6d8ebffe8769468215cb1353761f5
SHA1b9a32158380a8ea59010b507fbb4e48768b40ca2
SHA25629ceaec5378dd4fc6d86e5938203f3b4e2464019075282e27f93b8d98b177fb7
SHA512f0195b2d1203c131da7d119ad1b91ddb68c8bcbd058e4de4b492f9428cf47eb3b87a5dcb61d6adca8e1954ce45e8f9335b3624deed808825a7a36d42e54bcf4e
-
Filesize
72KB
MD5f6b6d8ebffe8769468215cb1353761f5
SHA1b9a32158380a8ea59010b507fbb4e48768b40ca2
SHA25629ceaec5378dd4fc6d86e5938203f3b4e2464019075282e27f93b8d98b177fb7
SHA512f0195b2d1203c131da7d119ad1b91ddb68c8bcbd058e4de4b492f9428cf47eb3b87a5dcb61d6adca8e1954ce45e8f9335b3624deed808825a7a36d42e54bcf4e
-
Filesize
72KB
MD5e0f2816eb06d09c713c4331d8620dad8
SHA12bdce56341f654af9b4bc3499dde1835c9e4ca3e
SHA256ca3e13f4ea36552436373471daf5154f83dee5beabee7a9ee2d109a1f55c1650
SHA5128f59e8c6fbc50bbe9ad88a743a880cdb7743eec180ab9ff607e83bb35bf646f87eb919a3784b06fd9a5971ae45ecbf477df67106b965e714849713e78b515ed0
-
Filesize
72KB
MD5e0f2816eb06d09c713c4331d8620dad8
SHA12bdce56341f654af9b4bc3499dde1835c9e4ca3e
SHA256ca3e13f4ea36552436373471daf5154f83dee5beabee7a9ee2d109a1f55c1650
SHA5128f59e8c6fbc50bbe9ad88a743a880cdb7743eec180ab9ff607e83bb35bf646f87eb919a3784b06fd9a5971ae45ecbf477df67106b965e714849713e78b515ed0
-
Filesize
72KB
MD5fd9c13fd8a11c6d3bd5d0de8c7a2bc1a
SHA1efa42fa8e9b76240af1e74dbb546cadf3d01166c
SHA256f45e17d304dd911d52ce54d0899531f106e64b50706df3993a070942cef2f614
SHA5120c5f053ed2f70ab2205f4526b0b4de28bbfd77e41e904c888252db928633b6b0e7cd879e579f2a0879713dc499a64d5f18f81862fad6aa1bd28265c4b0ec2aaf
-
Filesize
72KB
MD5fd9c13fd8a11c6d3bd5d0de8c7a2bc1a
SHA1efa42fa8e9b76240af1e74dbb546cadf3d01166c
SHA256f45e17d304dd911d52ce54d0899531f106e64b50706df3993a070942cef2f614
SHA5120c5f053ed2f70ab2205f4526b0b4de28bbfd77e41e904c888252db928633b6b0e7cd879e579f2a0879713dc499a64d5f18f81862fad6aa1bd28265c4b0ec2aaf
-
Filesize
72KB
MD50745da40e2d72f0ed8974dd7965243dd
SHA1a07d920a34389d4ca7b6460d627d09e17e62a330
SHA256d71749523c836710f2f9fd303389caa5f5c3d9ceb69f00702c78d25d0a567726
SHA512ea97d2c60b670df4a46a449eba1e1177c86d3687f187c893d924aa04457b341e4801a485ffd6a24682d6a3f2bffac76ebf12f75e823564c57c70a219d611be7e
-
Filesize
72KB
MD50745da40e2d72f0ed8974dd7965243dd
SHA1a07d920a34389d4ca7b6460d627d09e17e62a330
SHA256d71749523c836710f2f9fd303389caa5f5c3d9ceb69f00702c78d25d0a567726
SHA512ea97d2c60b670df4a46a449eba1e1177c86d3687f187c893d924aa04457b341e4801a485ffd6a24682d6a3f2bffac76ebf12f75e823564c57c70a219d611be7e
-
Filesize
72KB
MD5c27c6e9745e05ab60fddeda860bda58f
SHA1c3aac8be072ebf762d2a1849e0970d252b21d4ae
SHA25606b67ba1512f83aadf0d23800ae46be1449c2600d0ca84e216a456228051cf61
SHA512de53469a5b040d754ede492d485f34fbeb7b63564f9f1cdb515790a2a10790d5ff48ae3640e3c060de1eae13c15952e6dae6f019a378be30d8cc02c3a0428cb3
-
Filesize
72KB
MD5c27c6e9745e05ab60fddeda860bda58f
SHA1c3aac8be072ebf762d2a1849e0970d252b21d4ae
SHA25606b67ba1512f83aadf0d23800ae46be1449c2600d0ca84e216a456228051cf61
SHA512de53469a5b040d754ede492d485f34fbeb7b63564f9f1cdb515790a2a10790d5ff48ae3640e3c060de1eae13c15952e6dae6f019a378be30d8cc02c3a0428cb3
-
Filesize
72KB
MD5ca730d2209cf67400a433ed52b88dd82
SHA1d2b3e286b787d74f7ac013eed208c149982f270b
SHA256f202b92e740e8d2b4d08df5c407bbf77f727a91e294b65397b30425c92c98066
SHA5124aefc19c65960cabb9736b0f3de98aa43cbbb9c798385a6993ec3ac600c98e23ab48b09ed32a2075c5f9d7b965bbde46b231d46dabcb0172024d9c209363b9fa
-
Filesize
72KB
MD5ca730d2209cf67400a433ed52b88dd82
SHA1d2b3e286b787d74f7ac013eed208c149982f270b
SHA256f202b92e740e8d2b4d08df5c407bbf77f727a91e294b65397b30425c92c98066
SHA5124aefc19c65960cabb9736b0f3de98aa43cbbb9c798385a6993ec3ac600c98e23ab48b09ed32a2075c5f9d7b965bbde46b231d46dabcb0172024d9c209363b9fa
-
Filesize
72KB
MD5ad49a1b5b134362568c6dfc4c499d5b0
SHA195d6cf7d0a3b85cf7dbddbb80855226fb4e94be2
SHA256d1e34f46298446af27c401aea940123cd28c93f83c806caf3d9854e4306dd5fd
SHA5120beed06f51442c59b65cc74ce865a9a987d43acbc65094733f6376be210371abe04858c6f4409341e707b6a99bdda8de83421d6298b8438936a4a256af8b73c3
-
Filesize
72KB
MD54e3a4f7c92d00e8cc7e5d1e57066ec33
SHA1fd8a96738899f6af2d5ed522047ab0ab74e82adc
SHA256b03f0a0d6307ae2ec5954dbab96d4cf2243b4daaf0f63d191301b665755ca9bb
SHA5128da0d3f01f1e2a12866083a39fbcc8e9947400b350d1573706dde88e04465c9b3e8e84067043d3b0e181c620d916d93d48f1e0c5d30bc42850c73f34b234fcc7
-
Filesize
72KB
MD54e3a4f7c92d00e8cc7e5d1e57066ec33
SHA1fd8a96738899f6af2d5ed522047ab0ab74e82adc
SHA256b03f0a0d6307ae2ec5954dbab96d4cf2243b4daaf0f63d191301b665755ca9bb
SHA5128da0d3f01f1e2a12866083a39fbcc8e9947400b350d1573706dde88e04465c9b3e8e84067043d3b0e181c620d916d93d48f1e0c5d30bc42850c73f34b234fcc7
-
Filesize
72KB
MD5110448a5c68430376925779a34305c06
SHA193d0c09e4c2e11eb5094aae37dd7b736c9199dc6
SHA256956cea8b02dddff6be0a3b931aec9043dd0f1b09e21e898af139990263c35a06
SHA5125e4f3fa69d0d6634b199f543a9c4dee02efcaad426d2d1658fb5ce25acd5b9b9f8c79400badb88bcecbb5b63dfeb0dc9443ab593ee7e171607c3632cce8f841f
-
Filesize
72KB
MD5110448a5c68430376925779a34305c06
SHA193d0c09e4c2e11eb5094aae37dd7b736c9199dc6
SHA256956cea8b02dddff6be0a3b931aec9043dd0f1b09e21e898af139990263c35a06
SHA5125e4f3fa69d0d6634b199f543a9c4dee02efcaad426d2d1658fb5ce25acd5b9b9f8c79400badb88bcecbb5b63dfeb0dc9443ab593ee7e171607c3632cce8f841f
-
Filesize
72KB
MD51dc3e16bda336155658ea90ac5757bf1
SHA1660951ac976e129bf1f5d93059bd2629447ee919
SHA256057a65a2927101d8d78efcb8904bcfcf975061dee8804e4cba566d62d380031b
SHA512254d7c25a8f7e51ce7056f6309c48444909fbc85d1ad843f32fc3fb8130e01ee0c853c426642e8ac986bd8c897e9f77c18e86663ae246037da0dc6b56ec73eda
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD54aaba8db461275c768f6ec0ebd5c6ef4
SHA1a7e08404ccab919d148320f7252440b8d4dea7f6
SHA256b2f5bdec1d93113990cbb22d6d0064ebd8affc51cb06f5eb47cdaecc6661f5b8
SHA5129782c2cae70b87f850cc289cd27436088f15bf0811210573a1257497c5fbc8d2fe727651981fb664495499c0c313f3f3dd4fbac5664452d06292c34cccd28b55
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56ec99e7a2a4a432185f9dac4b8d0b0e3
SHA14ee52c210a6c79b0d6680d79c48da296f55c7050
SHA256f6ca72cc4cd2cf2284134f215009144f903e241b63d382d279c81bc524494960
SHA5121cce2803e0a446c19adbfbdc6449c55cabd15066673ae23d47fbfc6b1010cf79b2556ab679688bb4889ff345f3f75927978746a0d995d05171cce533744aed05
-
Filesize
72KB
MD57d041ccbf67a9abd13e644b80e6da8e8
SHA1d566acce378b0242f1304489e0510c159ac96b33
SHA256b4c871a8db334a24e67877372d3d857a1c0800dffc0ef506be2c759d0da9a22e
SHA5128e0f698401606f29c935aee83f41f4c9e21f687b8f45155538f59c1464329f1d00b6a50db67c6dd5ddd9de85997864c5dfb601cc3b84ec8bea6218a7e39e3313
-
Filesize
72KB
MD51dc3e16bda336155658ea90ac5757bf1
SHA1660951ac976e129bf1f5d93059bd2629447ee919
SHA256057a65a2927101d8d78efcb8904bcfcf975061dee8804e4cba566d62d380031b
SHA512254d7c25a8f7e51ce7056f6309c48444909fbc85d1ad843f32fc3fb8130e01ee0c853c426642e8ac986bd8c897e9f77c18e86663ae246037da0dc6b56ec73eda
-
Filesize
72KB
MD56ec99e7a2a4a432185f9dac4b8d0b0e3
SHA14ee52c210a6c79b0d6680d79c48da296f55c7050
SHA256f6ca72cc4cd2cf2284134f215009144f903e241b63d382d279c81bc524494960
SHA5121cce2803e0a446c19adbfbdc6449c55cabd15066673ae23d47fbfc6b1010cf79b2556ab679688bb4889ff345f3f75927978746a0d995d05171cce533744aed05
-
Filesize
72KB
MD504ddd2a05855424425f1e643c7043f89
SHA1de3395d229560b7d0d623f1adba3dbffc765aa20
SHA25629eb30631bd73a89e70bc02db8e5c16c0fa0c8ef809f7ee3ca336708cdcbfa33
SHA512de7eeb41dcf42082610b07ab89a05c34e2ba33f00da09b6789fe8639ab78ac1bb5fbb00bafc138a8ebcacd09e9bd449fa3d9bb5ab80d95b1cc9dafbce552fdc7
-
Filesize
72KB
MD504ddd2a05855424425f1e643c7043f89
SHA1de3395d229560b7d0d623f1adba3dbffc765aa20
SHA25629eb30631bd73a89e70bc02db8e5c16c0fa0c8ef809f7ee3ca336708cdcbfa33
SHA512de7eeb41dcf42082610b07ab89a05c34e2ba33f00da09b6789fe8639ab78ac1bb5fbb00bafc138a8ebcacd09e9bd449fa3d9bb5ab80d95b1cc9dafbce552fdc7
-
Filesize
72KB
MD5943336fa752f2aaa329a2383547ab228
SHA1eafc6d37cdb74622516f641560d6d5d38983fd75
SHA25658226b393f49b1b82d84617bca6830f9ab658153986065b2801484c6ec52bf6a
SHA512fb4666b149045aa570175f721c69ac68c584d38cb23b9a5db871c4f0f5429f42e2cf01af34dfcfec92d237c607dcc24b0c1a520e2a64d0ae9d5ef42297f318b4
-
Filesize
72KB
MD5943336fa752f2aaa329a2383547ab228
SHA1eafc6d37cdb74622516f641560d6d5d38983fd75
SHA25658226b393f49b1b82d84617bca6830f9ab658153986065b2801484c6ec52bf6a
SHA512fb4666b149045aa570175f721c69ac68c584d38cb23b9a5db871c4f0f5429f42e2cf01af34dfcfec92d237c607dcc24b0c1a520e2a64d0ae9d5ef42297f318b4
-
Filesize
72KB
MD56db7387278188fd165536dac6486d15c
SHA17b37546303c0395edfa41703a3692e52539c0b3e
SHA256318bf3a8b350f57fe5e39d29b6a4a347409244b55b7ec3e5f5f8eb882faa93cc
SHA512c3950d8b6a8022ebef87a5979b3783a5e3e210dae35a67e7deb56f98d8eeae939084c29ecfe7914a352119373b6a6213544fc836a99c95968c8a3aae692a80aa
-
Filesize
72KB
MD56db7387278188fd165536dac6486d15c
SHA17b37546303c0395edfa41703a3692e52539c0b3e
SHA256318bf3a8b350f57fe5e39d29b6a4a347409244b55b7ec3e5f5f8eb882faa93cc
SHA512c3950d8b6a8022ebef87a5979b3783a5e3e210dae35a67e7deb56f98d8eeae939084c29ecfe7914a352119373b6a6213544fc836a99c95968c8a3aae692a80aa
-
Filesize
72KB
MD5dd917a18185fa79145bc39462c1d6563
SHA137424667e87420eda425c924734d5e65427b3ef8
SHA256fe94fc91917843bc4e9e7eae9744c1249f355d2b7a0bbf9c10680f36f7a8292f
SHA512c5e101ab549b2d85aff177603edf429c76efc6d6bee77eebf7e2c2a78e6ebb78f4749185ee7b8f54516bbaf4f2931f5d1e1d97aecd1c08e010ab1a020e1c27e3
-
Filesize
72KB
MD5dd917a18185fa79145bc39462c1d6563
SHA137424667e87420eda425c924734d5e65427b3ef8
SHA256fe94fc91917843bc4e9e7eae9744c1249f355d2b7a0bbf9c10680f36f7a8292f
SHA512c5e101ab549b2d85aff177603edf429c76efc6d6bee77eebf7e2c2a78e6ebb78f4749185ee7b8f54516bbaf4f2931f5d1e1d97aecd1c08e010ab1a020e1c27e3
-
Filesize
72KB
MD5f6b6d8ebffe8769468215cb1353761f5
SHA1b9a32158380a8ea59010b507fbb4e48768b40ca2
SHA25629ceaec5378dd4fc6d86e5938203f3b4e2464019075282e27f93b8d98b177fb7
SHA512f0195b2d1203c131da7d119ad1b91ddb68c8bcbd058e4de4b492f9428cf47eb3b87a5dcb61d6adca8e1954ce45e8f9335b3624deed808825a7a36d42e54bcf4e
-
Filesize
72KB
MD5f6b6d8ebffe8769468215cb1353761f5
SHA1b9a32158380a8ea59010b507fbb4e48768b40ca2
SHA25629ceaec5378dd4fc6d86e5938203f3b4e2464019075282e27f93b8d98b177fb7
SHA512f0195b2d1203c131da7d119ad1b91ddb68c8bcbd058e4de4b492f9428cf47eb3b87a5dcb61d6adca8e1954ce45e8f9335b3624deed808825a7a36d42e54bcf4e
-
Filesize
72KB
MD5e0f2816eb06d09c713c4331d8620dad8
SHA12bdce56341f654af9b4bc3499dde1835c9e4ca3e
SHA256ca3e13f4ea36552436373471daf5154f83dee5beabee7a9ee2d109a1f55c1650
SHA5128f59e8c6fbc50bbe9ad88a743a880cdb7743eec180ab9ff607e83bb35bf646f87eb919a3784b06fd9a5971ae45ecbf477df67106b965e714849713e78b515ed0
-
Filesize
72KB
MD5e0f2816eb06d09c713c4331d8620dad8
SHA12bdce56341f654af9b4bc3499dde1835c9e4ca3e
SHA256ca3e13f4ea36552436373471daf5154f83dee5beabee7a9ee2d109a1f55c1650
SHA5128f59e8c6fbc50bbe9ad88a743a880cdb7743eec180ab9ff607e83bb35bf646f87eb919a3784b06fd9a5971ae45ecbf477df67106b965e714849713e78b515ed0
-
Filesize
72KB
MD5fd9c13fd8a11c6d3bd5d0de8c7a2bc1a
SHA1efa42fa8e9b76240af1e74dbb546cadf3d01166c
SHA256f45e17d304dd911d52ce54d0899531f106e64b50706df3993a070942cef2f614
SHA5120c5f053ed2f70ab2205f4526b0b4de28bbfd77e41e904c888252db928633b6b0e7cd879e579f2a0879713dc499a64d5f18f81862fad6aa1bd28265c4b0ec2aaf
-
Filesize
72KB
MD5fd9c13fd8a11c6d3bd5d0de8c7a2bc1a
SHA1efa42fa8e9b76240af1e74dbb546cadf3d01166c
SHA256f45e17d304dd911d52ce54d0899531f106e64b50706df3993a070942cef2f614
SHA5120c5f053ed2f70ab2205f4526b0b4de28bbfd77e41e904c888252db928633b6b0e7cd879e579f2a0879713dc499a64d5f18f81862fad6aa1bd28265c4b0ec2aaf
-
Filesize
72KB
MD50745da40e2d72f0ed8974dd7965243dd
SHA1a07d920a34389d4ca7b6460d627d09e17e62a330
SHA256d71749523c836710f2f9fd303389caa5f5c3d9ceb69f00702c78d25d0a567726
SHA512ea97d2c60b670df4a46a449eba1e1177c86d3687f187c893d924aa04457b341e4801a485ffd6a24682d6a3f2bffac76ebf12f75e823564c57c70a219d611be7e
-
Filesize
72KB
MD50745da40e2d72f0ed8974dd7965243dd
SHA1a07d920a34389d4ca7b6460d627d09e17e62a330
SHA256d71749523c836710f2f9fd303389caa5f5c3d9ceb69f00702c78d25d0a567726
SHA512ea97d2c60b670df4a46a449eba1e1177c86d3687f187c893d924aa04457b341e4801a485ffd6a24682d6a3f2bffac76ebf12f75e823564c57c70a219d611be7e
-
Filesize
72KB
MD5c27c6e9745e05ab60fddeda860bda58f
SHA1c3aac8be072ebf762d2a1849e0970d252b21d4ae
SHA25606b67ba1512f83aadf0d23800ae46be1449c2600d0ca84e216a456228051cf61
SHA512de53469a5b040d754ede492d485f34fbeb7b63564f9f1cdb515790a2a10790d5ff48ae3640e3c060de1eae13c15952e6dae6f019a378be30d8cc02c3a0428cb3
-
Filesize
72KB
MD5ca730d2209cf67400a433ed52b88dd82
SHA1d2b3e286b787d74f7ac013eed208c149982f270b
SHA256f202b92e740e8d2b4d08df5c407bbf77f727a91e294b65397b30425c92c98066
SHA5124aefc19c65960cabb9736b0f3de98aa43cbbb9c798385a6993ec3ac600c98e23ab48b09ed32a2075c5f9d7b965bbde46b231d46dabcb0172024d9c209363b9fa
-
Filesize
72KB
MD5ca730d2209cf67400a433ed52b88dd82
SHA1d2b3e286b787d74f7ac013eed208c149982f270b
SHA256f202b92e740e8d2b4d08df5c407bbf77f727a91e294b65397b30425c92c98066
SHA5124aefc19c65960cabb9736b0f3de98aa43cbbb9c798385a6993ec3ac600c98e23ab48b09ed32a2075c5f9d7b965bbde46b231d46dabcb0172024d9c209363b9fa
-
Filesize
72KB
MD5ad49a1b5b134362568c6dfc4c499d5b0
SHA195d6cf7d0a3b85cf7dbddbb80855226fb4e94be2
SHA256d1e34f46298446af27c401aea940123cd28c93f83c806caf3d9854e4306dd5fd
SHA5120beed06f51442c59b65cc74ce865a9a987d43acbc65094733f6376be210371abe04858c6f4409341e707b6a99bdda8de83421d6298b8438936a4a256af8b73c3
-
Filesize
72KB
MD5ad49a1b5b134362568c6dfc4c499d5b0
SHA195d6cf7d0a3b85cf7dbddbb80855226fb4e94be2
SHA256d1e34f46298446af27c401aea940123cd28c93f83c806caf3d9854e4306dd5fd
SHA5120beed06f51442c59b65cc74ce865a9a987d43acbc65094733f6376be210371abe04858c6f4409341e707b6a99bdda8de83421d6298b8438936a4a256af8b73c3
-
Filesize
72KB
MD54e3a4f7c92d00e8cc7e5d1e57066ec33
SHA1fd8a96738899f6af2d5ed522047ab0ab74e82adc
SHA256b03f0a0d6307ae2ec5954dbab96d4cf2243b4daaf0f63d191301b665755ca9bb
SHA5128da0d3f01f1e2a12866083a39fbcc8e9947400b350d1573706dde88e04465c9b3e8e84067043d3b0e181c620d916d93d48f1e0c5d30bc42850c73f34b234fcc7
-
Filesize
72KB
MD54e3a4f7c92d00e8cc7e5d1e57066ec33
SHA1fd8a96738899f6af2d5ed522047ab0ab74e82adc
SHA256b03f0a0d6307ae2ec5954dbab96d4cf2243b4daaf0f63d191301b665755ca9bb
SHA5128da0d3f01f1e2a12866083a39fbcc8e9947400b350d1573706dde88e04465c9b3e8e84067043d3b0e181c620d916d93d48f1e0c5d30bc42850c73f34b234fcc7
-
Filesize
72KB
MD5110448a5c68430376925779a34305c06
SHA193d0c09e4c2e11eb5094aae37dd7b736c9199dc6
SHA256956cea8b02dddff6be0a3b931aec9043dd0f1b09e21e898af139990263c35a06
SHA5125e4f3fa69d0d6634b199f543a9c4dee02efcaad426d2d1658fb5ce25acd5b9b9f8c79400badb88bcecbb5b63dfeb0dc9443ab593ee7e171607c3632cce8f841f
-
Filesize
72KB
MD5110448a5c68430376925779a34305c06
SHA193d0c09e4c2e11eb5094aae37dd7b736c9199dc6
SHA256956cea8b02dddff6be0a3b931aec9043dd0f1b09e21e898af139990263c35a06
SHA5125e4f3fa69d0d6634b199f543a9c4dee02efcaad426d2d1658fb5ce25acd5b9b9f8c79400badb88bcecbb5b63dfeb0dc9443ab593ee7e171607c3632cce8f841f
-
Filesize
72KB
MD51dc3e16bda336155658ea90ac5757bf1
SHA1660951ac976e129bf1f5d93059bd2629447ee919
SHA256057a65a2927101d8d78efcb8904bcfcf975061dee8804e4cba566d62d380031b
SHA512254d7c25a8f7e51ce7056f6309c48444909fbc85d1ad843f32fc3fb8130e01ee0c853c426642e8ac986bd8c897e9f77c18e86663ae246037da0dc6b56ec73eda
-
Filesize
72KB
MD51dc3e16bda336155658ea90ac5757bf1
SHA1660951ac976e129bf1f5d93059bd2629447ee919
SHA256057a65a2927101d8d78efcb8904bcfcf975061dee8804e4cba566d62d380031b
SHA512254d7c25a8f7e51ce7056f6309c48444909fbc85d1ad843f32fc3fb8130e01ee0c853c426642e8ac986bd8c897e9f77c18e86663ae246037da0dc6b56ec73eda
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD54aaba8db461275c768f6ec0ebd5c6ef4
SHA1a7e08404ccab919d148320f7252440b8d4dea7f6
SHA256b2f5bdec1d93113990cbb22d6d0064ebd8affc51cb06f5eb47cdaecc6661f5b8
SHA5129782c2cae70b87f850cc289cd27436088f15bf0811210573a1257497c5fbc8d2fe727651981fb664495499c0c313f3f3dd4fbac5664452d06292c34cccd28b55
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD54aaba8db461275c768f6ec0ebd5c6ef4
SHA1a7e08404ccab919d148320f7252440b8d4dea7f6
SHA256b2f5bdec1d93113990cbb22d6d0064ebd8affc51cb06f5eb47cdaecc6661f5b8
SHA5129782c2cae70b87f850cc289cd27436088f15bf0811210573a1257497c5fbc8d2fe727651981fb664495499c0c313f3f3dd4fbac5664452d06292c34cccd28b55
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56ec99e7a2a4a432185f9dac4b8d0b0e3
SHA14ee52c210a6c79b0d6680d79c48da296f55c7050
SHA256f6ca72cc4cd2cf2284134f215009144f903e241b63d382d279c81bc524494960
SHA5121cce2803e0a446c19adbfbdc6449c55cabd15066673ae23d47fbfc6b1010cf79b2556ab679688bb4889ff345f3f75927978746a0d995d05171cce533744aed05
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56ec99e7a2a4a432185f9dac4b8d0b0e3
SHA14ee52c210a6c79b0d6680d79c48da296f55c7050
SHA256f6ca72cc4cd2cf2284134f215009144f903e241b63d382d279c81bc524494960
SHA5121cce2803e0a446c19adbfbdc6449c55cabd15066673ae23d47fbfc6b1010cf79b2556ab679688bb4889ff345f3f75927978746a0d995d05171cce533744aed05
-
Filesize
72KB
MD57d041ccbf67a9abd13e644b80e6da8e8
SHA1d566acce378b0242f1304489e0510c159ac96b33
SHA256b4c871a8db334a24e67877372d3d857a1c0800dffc0ef506be2c759d0da9a22e
SHA5128e0f698401606f29c935aee83f41f4c9e21f687b8f45155538f59c1464329f1d00b6a50db67c6dd5ddd9de85997864c5dfb601cc3b84ec8bea6218a7e39e3313
-
Filesize
72KB
MD57d041ccbf67a9abd13e644b80e6da8e8
SHA1d566acce378b0242f1304489e0510c159ac96b33
SHA256b4c871a8db334a24e67877372d3d857a1c0800dffc0ef506be2c759d0da9a22e
SHA5128e0f698401606f29c935aee83f41f4c9e21f687b8f45155538f59c1464329f1d00b6a50db67c6dd5ddd9de85997864c5dfb601cc3b84ec8bea6218a7e39e3313
-
Filesize
72KB
MD51dc3e16bda336155658ea90ac5757bf1
SHA1660951ac976e129bf1f5d93059bd2629447ee919
SHA256057a65a2927101d8d78efcb8904bcfcf975061dee8804e4cba566d62d380031b
SHA512254d7c25a8f7e51ce7056f6309c48444909fbc85d1ad843f32fc3fb8130e01ee0c853c426642e8ac986bd8c897e9f77c18e86663ae246037da0dc6b56ec73eda
-
Filesize
72KB
MD51dc3e16bda336155658ea90ac5757bf1
SHA1660951ac976e129bf1f5d93059bd2629447ee919
SHA256057a65a2927101d8d78efcb8904bcfcf975061dee8804e4cba566d62d380031b
SHA512254d7c25a8f7e51ce7056f6309c48444909fbc85d1ad843f32fc3fb8130e01ee0c853c426642e8ac986bd8c897e9f77c18e86663ae246037da0dc6b56ec73eda
-
Filesize
72KB
MD56ec99e7a2a4a432185f9dac4b8d0b0e3
SHA14ee52c210a6c79b0d6680d79c48da296f55c7050
SHA256f6ca72cc4cd2cf2284134f215009144f903e241b63d382d279c81bc524494960
SHA5121cce2803e0a446c19adbfbdc6449c55cabd15066673ae23d47fbfc6b1010cf79b2556ab679688bb4889ff345f3f75927978746a0d995d05171cce533744aed05
-
Filesize
72KB
MD56ec99e7a2a4a432185f9dac4b8d0b0e3
SHA14ee52c210a6c79b0d6680d79c48da296f55c7050
SHA256f6ca72cc4cd2cf2284134f215009144f903e241b63d382d279c81bc524494960
SHA5121cce2803e0a446c19adbfbdc6449c55cabd15066673ae23d47fbfc6b1010cf79b2556ab679688bb4889ff345f3f75927978746a0d995d05171cce533744aed05