Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe
Resource
win10v2004-20220901-en
General
-
Target
315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe
-
Size
72KB
-
MD5
092c3d26d6445a2b51ee2da9803a4627
-
SHA1
752b60fee2258a6e83ed2c17f7118e08315bf2d5
-
SHA256
315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21
-
SHA512
7ad8a0e2fd69f67ffe327feeb9a36c746f2f9101331d62a681a8057fead231ca00af7ff205507b2293533bbdc54ecc98a1b6e2a32548c00a9a15276d38108dde
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2Z:ipQNwC3BEddsEqOt/hyJF+x3BEJwRr1
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 368 backup.exe 1328 backup.exe 1252 backup.exe 1344 backup.exe 964 backup.exe 1776 backup.exe 1712 backup.exe 1700 backup.exe 1040 update.exe 1688 backup.exe 1764 backup.exe 976 data.exe 708 backup.exe 472 data.exe 1536 backup.exe 1292 backup.exe 1936 backup.exe 1820 backup.exe 1940 backup.exe 848 backup.exe 1224 backup.exe 1168 backup.exe 1640 backup.exe 904 backup.exe 1776 System Restore.exe 1748 backup.exe 1136 backup.exe 1864 backup.exe 1600 backup.exe 1768 backup.exe 1696 backup.exe 240 backup.exe 2020 backup.exe 572 System Restore.exe 1944 backup.exe 2032 backup.exe 524 backup.exe 692 backup.exe 832 backup.exe 1868 backup.exe 320 backup.exe 1152 backup.exe 332 backup.exe 1988 backup.exe 584 backup.exe 1940 backup.exe 980 backup.exe 1328 backup.exe 1204 backup.exe 848 data.exe 1304 System Restore.exe 1392 backup.exe 1708 backup.exe 1476 backup.exe 1880 backup.exe 1816 backup.exe 288 backup.exe 552 backup.exe 1492 backup.exe 2040 backup.exe 548 backup.exe 1812 backup.exe 976 backup.exe 1244 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 1700 backup.exe 1040 update.exe 1040 update.exe 1040 update.exe 1040 update.exe 1040 update.exe 1688 backup.exe 1688 backup.exe 1688 backup.exe 1700 backup.exe 1700 backup.exe 1764 backup.exe 1764 backup.exe 976 data.exe 976 data.exe 1764 backup.exe 1764 backup.exe 472 data.exe 472 data.exe 1536 backup.exe 1536 backup.exe 1536 backup.exe 1536 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1936 backup.exe 1700 backup.exe 472 data.exe 472 data.exe 1764 backup.exe 1764 backup.exe 1536 backup.exe 1536 backup.exe 1700 backup.exe 1936 backup.exe 1936 backup.exe 1700 backup.exe -
Drops file in Program Files directory 60 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe data.exe File opened for modification C:\Program Files\Common Files\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\System Restore.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\System Restore.exe data.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\data.exe backup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 368 backup.exe 1328 backup.exe 1252 backup.exe 1344 backup.exe 964 backup.exe 1776 backup.exe 1712 backup.exe 1700 backup.exe 1040 update.exe 1688 backup.exe 1764 backup.exe 976 data.exe 708 backup.exe 472 data.exe 1536 backup.exe 1292 backup.exe 1936 backup.exe 1820 backup.exe 1940 backup.exe 848 backup.exe 1224 backup.exe 1168 backup.exe 1640 backup.exe 904 backup.exe 1776 System Restore.exe 1136 backup.exe 1864 backup.exe 1748 backup.exe 1768 backup.exe 1600 backup.exe 2020 backup.exe 1696 backup.exe 240 backup.exe 572 System Restore.exe 1944 backup.exe 2032 backup.exe 524 backup.exe 692 backup.exe 832 backup.exe 1868 backup.exe 320 backup.exe 332 backup.exe 1152 backup.exe 584 backup.exe 1988 backup.exe 1940 backup.exe 1204 backup.exe 980 backup.exe 1328 backup.exe 1392 backup.exe 848 data.exe 1476 backup.exe 1708 backup.exe 552 backup.exe 1304 System Restore.exe 1492 backup.exe 288 backup.exe 1880 backup.exe 548 backup.exe 1920 backup.exe 1600 backup.exe 1540 backup.exe 976 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 368 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 27 PID 1724 wrote to memory of 368 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 27 PID 1724 wrote to memory of 368 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 27 PID 1724 wrote to memory of 368 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 27 PID 1724 wrote to memory of 1328 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 28 PID 1724 wrote to memory of 1328 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 28 PID 1724 wrote to memory of 1328 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 28 PID 1724 wrote to memory of 1328 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 28 PID 1724 wrote to memory of 1252 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 29 PID 1724 wrote to memory of 1252 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 29 PID 1724 wrote to memory of 1252 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 29 PID 1724 wrote to memory of 1252 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 29 PID 1724 wrote to memory of 1344 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 30 PID 1724 wrote to memory of 1344 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 30 PID 1724 wrote to memory of 1344 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 30 PID 1724 wrote to memory of 1344 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 30 PID 1724 wrote to memory of 964 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 31 PID 1724 wrote to memory of 964 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 31 PID 1724 wrote to memory of 964 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 31 PID 1724 wrote to memory of 964 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 31 PID 1724 wrote to memory of 1776 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 32 PID 1724 wrote to memory of 1776 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 32 PID 1724 wrote to memory of 1776 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 32 PID 1724 wrote to memory of 1776 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 32 PID 1724 wrote to memory of 1712 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 33 PID 1724 wrote to memory of 1712 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 33 PID 1724 wrote to memory of 1712 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 33 PID 1724 wrote to memory of 1712 1724 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe 33 PID 368 wrote to memory of 1700 368 backup.exe 34 PID 368 wrote to memory of 1700 368 backup.exe 34 PID 368 wrote to memory of 1700 368 backup.exe 34 PID 368 wrote to memory of 1700 368 backup.exe 34 PID 1700 wrote to memory of 1040 1700 backup.exe 35 PID 1700 wrote to memory of 1040 1700 backup.exe 35 PID 1700 wrote to memory of 1040 1700 backup.exe 35 PID 1700 wrote to memory of 1040 1700 backup.exe 35 PID 1700 wrote to memory of 1040 1700 backup.exe 35 PID 1700 wrote to memory of 1040 1700 backup.exe 35 PID 1700 wrote to memory of 1040 1700 backup.exe 35 PID 1040 wrote to memory of 1688 1040 update.exe 36 PID 1040 wrote to memory of 1688 1040 update.exe 36 PID 1040 wrote to memory of 1688 1040 update.exe 36 PID 1040 wrote to memory of 1688 1040 update.exe 36 PID 1040 wrote to memory of 1688 1040 update.exe 36 PID 1040 wrote to memory of 1688 1040 update.exe 36 PID 1040 wrote to memory of 1688 1040 update.exe 36 PID 1700 wrote to memory of 1764 1700 backup.exe 37 PID 1700 wrote to memory of 1764 1700 backup.exe 37 PID 1700 wrote to memory of 1764 1700 backup.exe 37 PID 1700 wrote to memory of 1764 1700 backup.exe 37 PID 1764 wrote to memory of 976 1764 backup.exe 38 PID 1764 wrote to memory of 976 1764 backup.exe 38 PID 1764 wrote to memory of 976 1764 backup.exe 38 PID 1764 wrote to memory of 976 1764 backup.exe 38 PID 976 wrote to memory of 708 976 data.exe 39 PID 976 wrote to memory of 708 976 data.exe 39 PID 976 wrote to memory of 708 976 data.exe 39 PID 976 wrote to memory of 708 976 data.exe 39 PID 1764 wrote to memory of 472 1764 backup.exe 40 PID 1764 wrote to memory of 472 1764 backup.exe 40 PID 1764 wrote to memory of 472 1764 backup.exe 40 PID 1764 wrote to memory of 472 1764 backup.exe 40 PID 472 wrote to memory of 1536 472 data.exe 41 PID 472 wrote to memory of 1536 472 data.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe"C:\Users\Admin\AppData\Local\Temp\315efd92381ed213f3a983e80e42f78ff16a72742086d4328f8b0d4ce0a48e21.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\1890555354\backup.exeC:\Users\Admin\AppData\Local\Temp\1890555354\backup.exe C:\Users\Admin\AppData\Local\Temp\1890555354\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:368 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1700 -
C:\PerfLogs\update.exeC:\PerfLogs\update.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files\7-Zip\data.exe"C:\Program Files\7-Zip\data.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:708
-
-
-
C:\Program Files\Common Files\data.exe"C:\Program Files\Common Files\data.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:472 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1820
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:848
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1224
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1168
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:904
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1776
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Executes dropped EXE
PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1480
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1864 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1392
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1068
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
PID:2040
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1632
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1948
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1136
-
-
C:\Program Files\Common Files\SpeechEngines\System Restore.exe"C:\Program Files\Common Files\SpeechEngines\System Restore.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:524
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:332 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1512
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1952
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1988
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1616
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1868 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:1268
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:320 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1580
-
-
-
C:\Program Files\Java\data.exe"C:\Program Files\Java\data.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵
- Executes dropped EXE
PID:1816
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Executes dropped EXE
PID:1244
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:328
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:288
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Program Files (x86)\Internet Explorer\System Restore.exe"C:\Program Files (x86)\Internet Explorer\System Restore.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1484
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:240 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:692 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:1700
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:1604
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:1960
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1152 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5bc77da5b020a4f3ade082a17c99d8155
SHA1fc6dc6a05a8394e1a0bef1469b1105078bb7dbb0
SHA25616da42abc17522fce7230e59b89829a1fa99241375050d51d640f917e7e5d4db
SHA512b3e826d078a6f3dbe34255bde9e9a27abae99d2cd2cff33545d9f95a06e938ac3cbea5f6bf1af4836ded1999f00eea5d6d8e83fa1b2c8015be33d8b5c874edd6
-
Filesize
72KB
MD5bc77da5b020a4f3ade082a17c99d8155
SHA1fc6dc6a05a8394e1a0bef1469b1105078bb7dbb0
SHA25616da42abc17522fce7230e59b89829a1fa99241375050d51d640f917e7e5d4db
SHA512b3e826d078a6f3dbe34255bde9e9a27abae99d2cd2cff33545d9f95a06e938ac3cbea5f6bf1af4836ded1999f00eea5d6d8e83fa1b2c8015be33d8b5c874edd6
-
Filesize
72KB
MD59c56f79f4e810cb421a92a52370ff740
SHA1ea185d1bfc03715436b283edffeb8761d160d403
SHA256d9a5f3ce9c9647e48674edd81eabe6531502c61698bb6cca78cb3a6fbc321e39
SHA5126de663a535f21e733e5a36d3585b51edc5480b724260067045aa5f04ae8b60aa786c7850670b3a9b64a1d2a195b5a1270b4c9d06028cd5f2071069fc5a7604d3
-
Filesize
72KB
MD59c56f79f4e810cb421a92a52370ff740
SHA1ea185d1bfc03715436b283edffeb8761d160d403
SHA256d9a5f3ce9c9647e48674edd81eabe6531502c61698bb6cca78cb3a6fbc321e39
SHA5126de663a535f21e733e5a36d3585b51edc5480b724260067045aa5f04ae8b60aa786c7850670b3a9b64a1d2a195b5a1270b4c9d06028cd5f2071069fc5a7604d3
-
Filesize
72KB
MD5bed5b81cb9df7b9cf84c889672b8a4dc
SHA1531e9dc94609cda2163d50f0722e8afd311ace8e
SHA2569d73e28ac72f6446ccbc73af379935209344f7924f59b07006e81b76bba5250e
SHA512ddce6deb0e28781b39a6611ae0fcd6c0a46bf40959f1c2809046a2cbb661f6fbe94c169538098c1f1ff0854670484cb7868bac428d3ee6bc330bf808be0bca1b
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD5e0280bc4c3d36e81bc4be57043c2bdbc
SHA140a429974b2cc2c34f6dc11319ff77f698fa70d3
SHA2564f804e47f29a0a15d2ab9e7a31aefbe975bcf3676644f561a7fe1b699ff8a5e0
SHA5120f9ced961f7a1d523c2b6a5e0e471eaf32f3262baf7955ea068d498e3012671a3dcfd8f4fd2d4b6c6a8b5d27b346c1e4fe51b69febeb63c2ef8cbf7cf740a6a0
-
Filesize
72KB
MD5bed5b81cb9df7b9cf84c889672b8a4dc
SHA1531e9dc94609cda2163d50f0722e8afd311ace8e
SHA2569d73e28ac72f6446ccbc73af379935209344f7924f59b07006e81b76bba5250e
SHA512ddce6deb0e28781b39a6611ae0fcd6c0a46bf40959f1c2809046a2cbb661f6fbe94c169538098c1f1ff0854670484cb7868bac428d3ee6bc330bf808be0bca1b
-
Filesize
72KB
MD5bed5b81cb9df7b9cf84c889672b8a4dc
SHA1531e9dc94609cda2163d50f0722e8afd311ace8e
SHA2569d73e28ac72f6446ccbc73af379935209344f7924f59b07006e81b76bba5250e
SHA512ddce6deb0e28781b39a6611ae0fcd6c0a46bf40959f1c2809046a2cbb661f6fbe94c169538098c1f1ff0854670484cb7868bac428d3ee6bc330bf808be0bca1b
-
Filesize
72KB
MD5e0280bc4c3d36e81bc4be57043c2bdbc
SHA140a429974b2cc2c34f6dc11319ff77f698fa70d3
SHA2564f804e47f29a0a15d2ab9e7a31aefbe975bcf3676644f561a7fe1b699ff8a5e0
SHA5120f9ced961f7a1d523c2b6a5e0e471eaf32f3262baf7955ea068d498e3012671a3dcfd8f4fd2d4b6c6a8b5d27b346c1e4fe51b69febeb63c2ef8cbf7cf740a6a0
-
Filesize
72KB
MD5e0280bc4c3d36e81bc4be57043c2bdbc
SHA140a429974b2cc2c34f6dc11319ff77f698fa70d3
SHA2564f804e47f29a0a15d2ab9e7a31aefbe975bcf3676644f561a7fe1b699ff8a5e0
SHA5120f9ced961f7a1d523c2b6a5e0e471eaf32f3262baf7955ea068d498e3012671a3dcfd8f4fd2d4b6c6a8b5d27b346c1e4fe51b69febeb63c2ef8cbf7cf740a6a0
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD5123b70335bafc88544c1258999b11bac
SHA140c81cd0566e247090e38d4b1b7fc2dafb9617b3
SHA2561e88698da0998af0957ab89d8efe673b3a05523e64861120e925a7cd220d6fd0
SHA5124658341a5b4bf09d477b8590cf0131f829c76c5adc6372a92dc8cc0d16b77645127c1d6289302e51627c903ad22f229e0d3adf67c1212e8d331c2cde60da977e
-
Filesize
72KB
MD5123b70335bafc88544c1258999b11bac
SHA140c81cd0566e247090e38d4b1b7fc2dafb9617b3
SHA2561e88698da0998af0957ab89d8efe673b3a05523e64861120e925a7cd220d6fd0
SHA5124658341a5b4bf09d477b8590cf0131f829c76c5adc6372a92dc8cc0d16b77645127c1d6289302e51627c903ad22f229e0d3adf67c1212e8d331c2cde60da977e
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5850547c07360523d93eec791f031b79e
SHA15e987315428e59fae6d3ec4a33061e81e7d29a63
SHA256e2530c22ef3ab7108382e69872e133fd3aa5e008187f16aa83b9b61144e6e5f3
SHA512121a8a0dfaf8c60e5140858b876a4ef50355e880da0e5e51361dba313d96708047fce3d4b7f4bc2962d45b6c54158bc0da35fe6c49c75b97249845ef57928206
-
Filesize
72KB
MD5850547c07360523d93eec791f031b79e
SHA15e987315428e59fae6d3ec4a33061e81e7d29a63
SHA256e2530c22ef3ab7108382e69872e133fd3aa5e008187f16aa83b9b61144e6e5f3
SHA512121a8a0dfaf8c60e5140858b876a4ef50355e880da0e5e51361dba313d96708047fce3d4b7f4bc2962d45b6c54158bc0da35fe6c49c75b97249845ef57928206
-
Filesize
72KB
MD5bc77da5b020a4f3ade082a17c99d8155
SHA1fc6dc6a05a8394e1a0bef1469b1105078bb7dbb0
SHA25616da42abc17522fce7230e59b89829a1fa99241375050d51d640f917e7e5d4db
SHA512b3e826d078a6f3dbe34255bde9e9a27abae99d2cd2cff33545d9f95a06e938ac3cbea5f6bf1af4836ded1999f00eea5d6d8e83fa1b2c8015be33d8b5c874edd6
-
Filesize
72KB
MD5bc77da5b020a4f3ade082a17c99d8155
SHA1fc6dc6a05a8394e1a0bef1469b1105078bb7dbb0
SHA25616da42abc17522fce7230e59b89829a1fa99241375050d51d640f917e7e5d4db
SHA512b3e826d078a6f3dbe34255bde9e9a27abae99d2cd2cff33545d9f95a06e938ac3cbea5f6bf1af4836ded1999f00eea5d6d8e83fa1b2c8015be33d8b5c874edd6
-
Filesize
72KB
MD5bc77da5b020a4f3ade082a17c99d8155
SHA1fc6dc6a05a8394e1a0bef1469b1105078bb7dbb0
SHA25616da42abc17522fce7230e59b89829a1fa99241375050d51d640f917e7e5d4db
SHA512b3e826d078a6f3dbe34255bde9e9a27abae99d2cd2cff33545d9f95a06e938ac3cbea5f6bf1af4836ded1999f00eea5d6d8e83fa1b2c8015be33d8b5c874edd6
-
Filesize
72KB
MD5bc77da5b020a4f3ade082a17c99d8155
SHA1fc6dc6a05a8394e1a0bef1469b1105078bb7dbb0
SHA25616da42abc17522fce7230e59b89829a1fa99241375050d51d640f917e7e5d4db
SHA512b3e826d078a6f3dbe34255bde9e9a27abae99d2cd2cff33545d9f95a06e938ac3cbea5f6bf1af4836ded1999f00eea5d6d8e83fa1b2c8015be33d8b5c874edd6
-
Filesize
72KB
MD5bc77da5b020a4f3ade082a17c99d8155
SHA1fc6dc6a05a8394e1a0bef1469b1105078bb7dbb0
SHA25616da42abc17522fce7230e59b89829a1fa99241375050d51d640f917e7e5d4db
SHA512b3e826d078a6f3dbe34255bde9e9a27abae99d2cd2cff33545d9f95a06e938ac3cbea5f6bf1af4836ded1999f00eea5d6d8e83fa1b2c8015be33d8b5c874edd6
-
Filesize
72KB
MD59c56f79f4e810cb421a92a52370ff740
SHA1ea185d1bfc03715436b283edffeb8761d160d403
SHA256d9a5f3ce9c9647e48674edd81eabe6531502c61698bb6cca78cb3a6fbc321e39
SHA5126de663a535f21e733e5a36d3585b51edc5480b724260067045aa5f04ae8b60aa786c7850670b3a9b64a1d2a195b5a1270b4c9d06028cd5f2071069fc5a7604d3
-
Filesize
72KB
MD59c56f79f4e810cb421a92a52370ff740
SHA1ea185d1bfc03715436b283edffeb8761d160d403
SHA256d9a5f3ce9c9647e48674edd81eabe6531502c61698bb6cca78cb3a6fbc321e39
SHA5126de663a535f21e733e5a36d3585b51edc5480b724260067045aa5f04ae8b60aa786c7850670b3a9b64a1d2a195b5a1270b4c9d06028cd5f2071069fc5a7604d3
-
Filesize
72KB
MD59c56f79f4e810cb421a92a52370ff740
SHA1ea185d1bfc03715436b283edffeb8761d160d403
SHA256d9a5f3ce9c9647e48674edd81eabe6531502c61698bb6cca78cb3a6fbc321e39
SHA5126de663a535f21e733e5a36d3585b51edc5480b724260067045aa5f04ae8b60aa786c7850670b3a9b64a1d2a195b5a1270b4c9d06028cd5f2071069fc5a7604d3
-
Filesize
72KB
MD59c56f79f4e810cb421a92a52370ff740
SHA1ea185d1bfc03715436b283edffeb8761d160d403
SHA256d9a5f3ce9c9647e48674edd81eabe6531502c61698bb6cca78cb3a6fbc321e39
SHA5126de663a535f21e733e5a36d3585b51edc5480b724260067045aa5f04ae8b60aa786c7850670b3a9b64a1d2a195b5a1270b4c9d06028cd5f2071069fc5a7604d3
-
Filesize
72KB
MD5bed5b81cb9df7b9cf84c889672b8a4dc
SHA1531e9dc94609cda2163d50f0722e8afd311ace8e
SHA2569d73e28ac72f6446ccbc73af379935209344f7924f59b07006e81b76bba5250e
SHA512ddce6deb0e28781b39a6611ae0fcd6c0a46bf40959f1c2809046a2cbb661f6fbe94c169538098c1f1ff0854670484cb7868bac428d3ee6bc330bf808be0bca1b
-
Filesize
72KB
MD5bed5b81cb9df7b9cf84c889672b8a4dc
SHA1531e9dc94609cda2163d50f0722e8afd311ace8e
SHA2569d73e28ac72f6446ccbc73af379935209344f7924f59b07006e81b76bba5250e
SHA512ddce6deb0e28781b39a6611ae0fcd6c0a46bf40959f1c2809046a2cbb661f6fbe94c169538098c1f1ff0854670484cb7868bac428d3ee6bc330bf808be0bca1b
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD5e0280bc4c3d36e81bc4be57043c2bdbc
SHA140a429974b2cc2c34f6dc11319ff77f698fa70d3
SHA2564f804e47f29a0a15d2ab9e7a31aefbe975bcf3676644f561a7fe1b699ff8a5e0
SHA5120f9ced961f7a1d523c2b6a5e0e471eaf32f3262baf7955ea068d498e3012671a3dcfd8f4fd2d4b6c6a8b5d27b346c1e4fe51b69febeb63c2ef8cbf7cf740a6a0
-
Filesize
72KB
MD5e0280bc4c3d36e81bc4be57043c2bdbc
SHA140a429974b2cc2c34f6dc11319ff77f698fa70d3
SHA2564f804e47f29a0a15d2ab9e7a31aefbe975bcf3676644f561a7fe1b699ff8a5e0
SHA5120f9ced961f7a1d523c2b6a5e0e471eaf32f3262baf7955ea068d498e3012671a3dcfd8f4fd2d4b6c6a8b5d27b346c1e4fe51b69febeb63c2ef8cbf7cf740a6a0
-
Filesize
72KB
MD5bed5b81cb9df7b9cf84c889672b8a4dc
SHA1531e9dc94609cda2163d50f0722e8afd311ace8e
SHA2569d73e28ac72f6446ccbc73af379935209344f7924f59b07006e81b76bba5250e
SHA512ddce6deb0e28781b39a6611ae0fcd6c0a46bf40959f1c2809046a2cbb661f6fbe94c169538098c1f1ff0854670484cb7868bac428d3ee6bc330bf808be0bca1b
-
Filesize
72KB
MD5bed5b81cb9df7b9cf84c889672b8a4dc
SHA1531e9dc94609cda2163d50f0722e8afd311ace8e
SHA2569d73e28ac72f6446ccbc73af379935209344f7924f59b07006e81b76bba5250e
SHA512ddce6deb0e28781b39a6611ae0fcd6c0a46bf40959f1c2809046a2cbb661f6fbe94c169538098c1f1ff0854670484cb7868bac428d3ee6bc330bf808be0bca1b
-
Filesize
72KB
MD58195da477bbb190068b6d124562e8dab
SHA1bb134352452b1a1d06fca290394b5899ba3bb1ea
SHA256f04f036949a0e2d342b0f48e9d9541d418d77f6a0eb3a6b706fb5a9b83f58450
SHA512c85f354dcd3f4a7c0dc0e30758ae71e0c4f2e18a03d905909e2331981f0aaf36ac7064e7527c189a2bfef44cbaa8ecde35d9ce2209058d899803fd69826ff55c
-
Filesize
72KB
MD5e0280bc4c3d36e81bc4be57043c2bdbc
SHA140a429974b2cc2c34f6dc11319ff77f698fa70d3
SHA2564f804e47f29a0a15d2ab9e7a31aefbe975bcf3676644f561a7fe1b699ff8a5e0
SHA5120f9ced961f7a1d523c2b6a5e0e471eaf32f3262baf7955ea068d498e3012671a3dcfd8f4fd2d4b6c6a8b5d27b346c1e4fe51b69febeb63c2ef8cbf7cf740a6a0
-
Filesize
72KB
MD5e0280bc4c3d36e81bc4be57043c2bdbc
SHA140a429974b2cc2c34f6dc11319ff77f698fa70d3
SHA2564f804e47f29a0a15d2ab9e7a31aefbe975bcf3676644f561a7fe1b699ff8a5e0
SHA5120f9ced961f7a1d523c2b6a5e0e471eaf32f3262baf7955ea068d498e3012671a3dcfd8f4fd2d4b6c6a8b5d27b346c1e4fe51b69febeb63c2ef8cbf7cf740a6a0
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD59cdcb9de3aedd11e6ca9f9d2462726e3
SHA13ddb6b658495ff63e45d4bb3297de7055079a33f
SHA25606ee98bb4d14f6fbeee060be0b5ee836ad65d2af59e5c7325e89300f43afca45
SHA5120771cf17ce3a972cfb760fd50a8810588a0a71657e6066930b2eb85903fbf43ab92d6bd6d6d29030b86067e8c99fdb7857b8acf853cb7b38939e2db7ff5917cd
-
Filesize
72KB
MD5123b70335bafc88544c1258999b11bac
SHA140c81cd0566e247090e38d4b1b7fc2dafb9617b3
SHA2561e88698da0998af0957ab89d8efe673b3a05523e64861120e925a7cd220d6fd0
SHA5124658341a5b4bf09d477b8590cf0131f829c76c5adc6372a92dc8cc0d16b77645127c1d6289302e51627c903ad22f229e0d3adf67c1212e8d331c2cde60da977e
-
Filesize
72KB
MD5123b70335bafc88544c1258999b11bac
SHA140c81cd0566e247090e38d4b1b7fc2dafb9617b3
SHA2561e88698da0998af0957ab89d8efe673b3a05523e64861120e925a7cd220d6fd0
SHA5124658341a5b4bf09d477b8590cf0131f829c76c5adc6372a92dc8cc0d16b77645127c1d6289302e51627c903ad22f229e0d3adf67c1212e8d331c2cde60da977e
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1
-
Filesize
72KB
MD5d4b6689b1ddd929f9ce122a0a1c0ec91
SHA1547690c43cefa3f477facf907f3831ac6da93d2c
SHA25606880c2f0bdca5e8967ee6577df7d52fd3f3ee069c8856ab01e52da571e81228
SHA512a80b842089a8a31bbf886486706447785fc8952f9bb7dd7350808f557667da78442e5e8b066b4fc61c1eb6307fce5b0505b25b968537fe95b03053112b3077a1