Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe
Resource
win10v2004-20220812-en
General
-
Target
3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe
-
Size
72KB
-
MD5
9170bed7d39e64db241cb23210764766
-
SHA1
7c9cadb9bebbc0c8b2918df7f4055b697596d5b3
-
SHA256
3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624
-
SHA512
1559535ab4e4fabd5859739b4baf01c0036fabc6fe132fd40012d280e08e3cd6b75cb3cf71de356216b32bb3b6a487c39b3b3389305e9a7a19f4c84b84b54110
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2g:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP0
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 48 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 53 IoCs
pid Process 1380 backup.exe 1740 backup.exe 1708 backup.exe 2012 backup.exe 936 backup.exe 1876 backup.exe 796 data.exe 1064 backup.exe 1620 backup.exe 364 backup.exe 1572 backup.exe 864 backup.exe 1192 data.exe 980 backup.exe 1308 backup.exe 544 backup.exe 1976 backup.exe 1996 data.exe 1316 System Restore.exe 1368 backup.exe 896 backup.exe 1624 backup.exe 1204 backup.exe 948 backup.exe 2004 backup.exe 2016 backup.exe 1876 backup.exe 432 backup.exe 1880 backup.exe 524 System Restore.exe 1736 backup.exe 920 backup.exe 1896 backup.exe 364 backup.exe 1748 backup.exe 1964 backup.exe 1164 backup.exe 1028 backup.exe 1192 backup.exe 1472 backup.exe 1500 backup.exe 1612 backup.exe 1084 System Restore.exe 1596 backup.exe 2044 backup.exe 544 backup.exe 616 backup.exe 1148 backup.exe 892 backup.exe 1316 System Restore.exe 1692 backup.exe 1624 backup.exe 1204 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 936 backup.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 936 backup.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1064 backup.exe 1064 backup.exe 936 backup.exe 936 backup.exe 1572 backup.exe 1572 backup.exe 864 backup.exe 864 backup.exe 1572 backup.exe 1572 backup.exe 980 backup.exe 980 backup.exe 1308 backup.exe 1308 backup.exe 1308 backup.exe 1308 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1976 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe 1880 backup.exe -
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe -
Suspicious use of SetWindowsHookEx 51 IoCs
pid Process 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 1380 backup.exe 1740 backup.exe 1708 backup.exe 2012 backup.exe 936 backup.exe 1876 backup.exe 796 data.exe 1064 backup.exe 1620 backup.exe 364 backup.exe 1572 backup.exe 864 backup.exe 1192 data.exe 980 backup.exe 1308 backup.exe 544 backup.exe 1976 backup.exe 1996 data.exe 1316 System Restore.exe 1368 backup.exe 896 backup.exe 1624 backup.exe 1204 backup.exe 948 backup.exe 2004 backup.exe 2016 backup.exe 1876 backup.exe 432 backup.exe 1880 backup.exe 524 System Restore.exe 1736 backup.exe 920 backup.exe 1896 backup.exe 364 backup.exe 1748 backup.exe 1964 backup.exe 1164 backup.exe 1028 backup.exe 1192 backup.exe 1472 backup.exe 1500 backup.exe 1612 backup.exe 1596 backup.exe 1084 System Restore.exe 616 backup.exe 1148 backup.exe 892 backup.exe 1316 System Restore.exe 1692 backup.exe 1624 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1380 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 27 PID 1536 wrote to memory of 1380 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 27 PID 1536 wrote to memory of 1380 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 27 PID 1536 wrote to memory of 1380 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 27 PID 1536 wrote to memory of 1740 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 28 PID 1536 wrote to memory of 1740 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 28 PID 1536 wrote to memory of 1740 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 28 PID 1536 wrote to memory of 1740 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 28 PID 1536 wrote to memory of 1708 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 29 PID 1536 wrote to memory of 1708 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 29 PID 1536 wrote to memory of 1708 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 29 PID 1536 wrote to memory of 1708 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 29 PID 1536 wrote to memory of 2012 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 30 PID 1536 wrote to memory of 2012 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 30 PID 1536 wrote to memory of 2012 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 30 PID 1536 wrote to memory of 2012 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 30 PID 1380 wrote to memory of 936 1380 backup.exe 31 PID 1380 wrote to memory of 936 1380 backup.exe 31 PID 1380 wrote to memory of 936 1380 backup.exe 31 PID 1380 wrote to memory of 936 1380 backup.exe 31 PID 1536 wrote to memory of 1876 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 32 PID 1536 wrote to memory of 1876 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 32 PID 1536 wrote to memory of 1876 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 32 PID 1536 wrote to memory of 1876 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 32 PID 1536 wrote to memory of 796 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 33 PID 1536 wrote to memory of 796 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 33 PID 1536 wrote to memory of 796 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 33 PID 1536 wrote to memory of 796 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 33 PID 936 wrote to memory of 1064 936 backup.exe 34 PID 936 wrote to memory of 1064 936 backup.exe 34 PID 936 wrote to memory of 1064 936 backup.exe 34 PID 936 wrote to memory of 1064 936 backup.exe 34 PID 1536 wrote to memory of 1620 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 35 PID 1536 wrote to memory of 1620 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 35 PID 1536 wrote to memory of 1620 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 35 PID 1536 wrote to memory of 1620 1536 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe 35 PID 1064 wrote to memory of 364 1064 backup.exe 36 PID 1064 wrote to memory of 364 1064 backup.exe 36 PID 1064 wrote to memory of 364 1064 backup.exe 36 PID 1064 wrote to memory of 364 1064 backup.exe 36 PID 936 wrote to memory of 1572 936 backup.exe 37 PID 936 wrote to memory of 1572 936 backup.exe 37 PID 936 wrote to memory of 1572 936 backup.exe 37 PID 936 wrote to memory of 1572 936 backup.exe 37 PID 1572 wrote to memory of 864 1572 backup.exe 38 PID 1572 wrote to memory of 864 1572 backup.exe 38 PID 1572 wrote to memory of 864 1572 backup.exe 38 PID 1572 wrote to memory of 864 1572 backup.exe 38 PID 864 wrote to memory of 1192 864 backup.exe 39 PID 864 wrote to memory of 1192 864 backup.exe 39 PID 864 wrote to memory of 1192 864 backup.exe 39 PID 864 wrote to memory of 1192 864 backup.exe 39 PID 1572 wrote to memory of 980 1572 backup.exe 40 PID 1572 wrote to memory of 980 1572 backup.exe 40 PID 1572 wrote to memory of 980 1572 backup.exe 40 PID 1572 wrote to memory of 980 1572 backup.exe 40 PID 980 wrote to memory of 1308 980 backup.exe 41 PID 980 wrote to memory of 1308 980 backup.exe 41 PID 980 wrote to memory of 1308 980 backup.exe 41 PID 980 wrote to memory of 1308 980 backup.exe 41 PID 1308 wrote to memory of 544 1308 backup.exe 42 PID 1308 wrote to memory of 544 1308 backup.exe 42 PID 1308 wrote to memory of 544 1308 backup.exe 42 PID 1308 wrote to memory of 544 1308 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe"C:\Users\Admin\AppData\Local\Temp\3b72b764bb68af5fb40068a5e6aa2e2bfd07a103f1d9c5593e7dfadbe409d624.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\1735284850\backup.exeC:\Users\Admin\AppData\Local\Temp\1735284850\backup.exe C:\Users\Admin\AppData\Local\Temp\1735284850\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1380 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:936 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1064 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:364
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1572 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:864 -
C:\Program Files\7-Zip\Lang\data.exe"C:\Program Files\7-Zip\Lang\data.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:980 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1308 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1976 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1368
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2004
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:432
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1880 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:920
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:364
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1964
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1028
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Executes dropped EXE
PID:544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1452
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:1896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:1904
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1148
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:920
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:660
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:796
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:972
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:1648
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1144
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1296
-
-
-
C:\Program Files\Common Files\Services\System Restore.exe"C:\Program Files\Common Files\Services\System Restore.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:1628
-
C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\update.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵PID:864
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:520
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Executes dropped EXE
PID:2044
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:2004
-
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1688
-
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:1484
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:364
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1756
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:624
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:560
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:788
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:616 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:892 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1692
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
PID:1204 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵PID:996
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:1772
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:1736
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1616
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:2020
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:976
-
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1472
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1160
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1092
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:960
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:968
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:1352
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1544
-
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:1960
-
-
C:\Windows\AppCompat\update.exeC:\Windows\AppCompat\update.exe C:\Windows\AppCompat\5⤵PID:1496
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\data.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\data.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b41cacddb348a3b9fa2ce4b5abe688ab
SHA19bc8db89250efb0b6ee6b4986400db26b8953946
SHA256655c22be64fa8bfeedc6e19725849c19f0927afaf4b168bc139c565f944e4174
SHA51215c0d8dcec25a35741e1e8c5f5b4b58d7365f284b77d78fe9d99f25e2e155c2434d9aebf41c4e4ef456d7150b95629ab2affa74aa1c58e64b33161d4ca1a4964
-
Filesize
72KB
MD54d8c8c33a4a891370fc91ca4a2d596e0
SHA104ccf8913f59792519ae7ef5aab5d7be7c2faa41
SHA256892d9459aed4c00389c32b33b41a4e020c7fb3a55159d21cf618a86a48dbbc8e
SHA512792fa9d72e12263dea9c6fa2b481f558edd069685d2b0556e01ac7f1934c46d4e110d240736d2680f56135d9647ec4f8b8523eea20cdf63bd96e94b535694c65
-
Filesize
72KB
MD54d8c8c33a4a891370fc91ca4a2d596e0
SHA104ccf8913f59792519ae7ef5aab5d7be7c2faa41
SHA256892d9459aed4c00389c32b33b41a4e020c7fb3a55159d21cf618a86a48dbbc8e
SHA512792fa9d72e12263dea9c6fa2b481f558edd069685d2b0556e01ac7f1934c46d4e110d240736d2680f56135d9647ec4f8b8523eea20cdf63bd96e94b535694c65
-
Filesize
72KB
MD531c67c2c4b0df8f167bd2a6f75fcf928
SHA171f67b8d361bc85811237c9e8b6ad2e79fd94c6a
SHA2567765ed16f4eaa4f79fb0fd1cb8d215db3fe8090a5c3a996e5fdc3f62f391fac0
SHA512191f92eb00eacfbcfb3a6164e256df332467082788be0f0fec228f129ad68add729d9be2fdadc16d8b0fdf5c87cc964c3488c283a0390f9549258c6578cc3d17
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD50642312ad31e4bbbb068556c5f3d80e3
SHA10993bf3032f294825d7748b76dc80cbe98088c5b
SHA2569bb0a544bd46f883ab989ed3f7e70b9ce08400c1449f797e615e2c80bea277c5
SHA51220157bf8371ec43185ba21c36729de55342aa4a3e675b34da42576c7c08c355af55242761096465eeec17cfa97f2fbf3c488ef8a23699e53e7b2c3cd1d83d1d5
-
Filesize
72KB
MD55ac9f20ccc992de606cf83e1da08cf79
SHA193678f1435229365b9017b18dce0187f51439b58
SHA256741b2f02f842cf3cb42078bca7e7c94d7b50801f8df7c40669038d3f7965d807
SHA5126bd96f12762853ddba27bda0493fc7fdabdf464eacb82eae86f8f4f3c5088a55cf119d56d86c4b78356b143e23e6b2137f1e4d8f26166b6ac33181458e172d95
-
Filesize
72KB
MD55ac9f20ccc992de606cf83e1da08cf79
SHA193678f1435229365b9017b18dce0187f51439b58
SHA256741b2f02f842cf3cb42078bca7e7c94d7b50801f8df7c40669038d3f7965d807
SHA5126bd96f12762853ddba27bda0493fc7fdabdf464eacb82eae86f8f4f3c5088a55cf119d56d86c4b78356b143e23e6b2137f1e4d8f26166b6ac33181458e172d95
-
Filesize
72KB
MD51a81a5464f4b8ccbcf9b2bf99a1254f9
SHA12c1c83f7515a25b9a6220b6ab40577ecbba4b6ca
SHA256fc7202ca96e6649ad3a8bc532da71e6306550670a1d8163098501075e9c182ca
SHA512f9be72256dcdc72254706c553d1d30db722bdda6611d9359e7ce0f89fcfcc8eea6045f1fcf9962d0db44465836dc2e7c91d83dade406fe81cf690f8f0615f1ab
-
Filesize
72KB
MD50642312ad31e4bbbb068556c5f3d80e3
SHA10993bf3032f294825d7748b76dc80cbe98088c5b
SHA2569bb0a544bd46f883ab989ed3f7e70b9ce08400c1449f797e615e2c80bea277c5
SHA51220157bf8371ec43185ba21c36729de55342aa4a3e675b34da42576c7c08c355af55242761096465eeec17cfa97f2fbf3c488ef8a23699e53e7b2c3cd1d83d1d5
-
Filesize
72KB
MD50642312ad31e4bbbb068556c5f3d80e3
SHA10993bf3032f294825d7748b76dc80cbe98088c5b
SHA2569bb0a544bd46f883ab989ed3f7e70b9ce08400c1449f797e615e2c80bea277c5
SHA51220157bf8371ec43185ba21c36729de55342aa4a3e675b34da42576c7c08c355af55242761096465eeec17cfa97f2fbf3c488ef8a23699e53e7b2c3cd1d83d1d5
-
Filesize
72KB
MD51a81a5464f4b8ccbcf9b2bf99a1254f9
SHA12c1c83f7515a25b9a6220b6ab40577ecbba4b6ca
SHA256fc7202ca96e6649ad3a8bc532da71e6306550670a1d8163098501075e9c182ca
SHA512f9be72256dcdc72254706c553d1d30db722bdda6611d9359e7ce0f89fcfcc8eea6045f1fcf9962d0db44465836dc2e7c91d83dade406fe81cf690f8f0615f1ab
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD5e0d6c0ff41a8b29bc14262881d8ba389
SHA10f1f7e1bb52b63dfcea09dc3aa93190eefde13a9
SHA256a24609d4ed0db2418ae58736d9288c7248a79c5acaa55a363eb8855f3c64e498
SHA5125b38c08a3c1e6a9d90b2ab1e536197979cd88e21041c263d8384183fdc003d526010972b57aa1092617cf52c6b330e4d9d51d6580f7be4c884436cfdb11259b9
-
Filesize
72KB
MD5e0d6c0ff41a8b29bc14262881d8ba389
SHA10f1f7e1bb52b63dfcea09dc3aa93190eefde13a9
SHA256a24609d4ed0db2418ae58736d9288c7248a79c5acaa55a363eb8855f3c64e498
SHA5125b38c08a3c1e6a9d90b2ab1e536197979cd88e21041c263d8384183fdc003d526010972b57aa1092617cf52c6b330e4d9d51d6580f7be4c884436cfdb11259b9
-
Filesize
72KB
MD57e4d818a8b70f816001452542bcfff03
SHA19e538a9136d9378c38be9025d354b8535c166079
SHA256342c77a61a6fb1d0d89d8fbbca2ae03bd64e3cec32a04290a2b7ac988781f8a5
SHA512358a51591d8472a35b9ff00586fa632664417843b0a1cbc985f5e29bc74b2b4b37cf28d2159bd742874e70fab041b4faecccb260ab42eef0e4a62a1bca747aeb
-
Filesize
72KB
MD57e4d818a8b70f816001452542bcfff03
SHA19e538a9136d9378c38be9025d354b8535c166079
SHA256342c77a61a6fb1d0d89d8fbbca2ae03bd64e3cec32a04290a2b7ac988781f8a5
SHA512358a51591d8472a35b9ff00586fa632664417843b0a1cbc985f5e29bc74b2b4b37cf28d2159bd742874e70fab041b4faecccb260ab42eef0e4a62a1bca747aeb
-
Filesize
72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a62956de1e9531f5628240b59d71ebd0
SHA1f95416d21f7f7097a4615cdb74abdda9fa7211c1
SHA256df203c562870d6d39b8ddcf36de8cae7c69ad4faca761fe10341c8746171bf7e
SHA512bac974aeb2c6688ab1acd60f355c68a193df9a2a4f3d19775b1dda895990101d0aacf5ce2494db40c43b347159559b9e67a5c1440066e5d4a6c4434f20423d75
-
Filesize
72KB
MD57691283eae22e2b5bbb82974eca3feb3
SHA11d046503b17321aaf17bd46988c86e152da65ed3
SHA2567add5fe9a18590876bc88e1439a97916d339358f2893dbe047add50f8f9da096
SHA512733d5b067c0ef97a6f7396f2865c5a7b415db2fdee5ed5beb3f486c2ae3c37b9a78c6048c70a025caa645540beadec5627b4fb66e888ff5b82f7b0cd75f6074b
-
Filesize
72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
Filesize
72KB
MD5733e7fdcffb031cd5efbb453bd9df22b
SHA1a2a18e70a862bdd8f1680775f970211dacb51cb9
SHA256ff5f9bf3ca8c01e676c974a1f6ae99dcda28bcf2e06cef72dba97912fc99ef1c
SHA512db991ee1861b52feb57529dcec411c4c337a2e2c6845881fd16befd0ce8dae7811741f8d6ffd2e91ed405ddeffab0e014bcc2ddb48fa839219f5a74940a8ec81
-
Filesize
72KB
MD5f3d4a595763daf3d40e1482ff530bea6
SHA12408c985ccae264b954d3a840c1d5cbf82fb1f51
SHA2563918c306f666b4ec1c8c5eb5932ee65a88616c0593b5b3fde4db8eeec9d6040d
SHA51230c5cd8f567c1f48c20025a7a4764f718116209a970ea44a5eed0d6a7960a71012f0e56cfb9c9933a2b197d302e723049f899102254b7ca9ac16a2305b0dd8a4
-
Filesize
72KB
MD5f3d4a595763daf3d40e1482ff530bea6
SHA12408c985ccae264b954d3a840c1d5cbf82fb1f51
SHA2563918c306f666b4ec1c8c5eb5932ee65a88616c0593b5b3fde4db8eeec9d6040d
SHA51230c5cd8f567c1f48c20025a7a4764f718116209a970ea44a5eed0d6a7960a71012f0e56cfb9c9933a2b197d302e723049f899102254b7ca9ac16a2305b0dd8a4
-
Filesize
72KB
MD5b41cacddb348a3b9fa2ce4b5abe688ab
SHA19bc8db89250efb0b6ee6b4986400db26b8953946
SHA256655c22be64fa8bfeedc6e19725849c19f0927afaf4b168bc139c565f944e4174
SHA51215c0d8dcec25a35741e1e8c5f5b4b58d7365f284b77d78fe9d99f25e2e155c2434d9aebf41c4e4ef456d7150b95629ab2affa74aa1c58e64b33161d4ca1a4964
-
Filesize
72KB
MD5b41cacddb348a3b9fa2ce4b5abe688ab
SHA19bc8db89250efb0b6ee6b4986400db26b8953946
SHA256655c22be64fa8bfeedc6e19725849c19f0927afaf4b168bc139c565f944e4174
SHA51215c0d8dcec25a35741e1e8c5f5b4b58d7365f284b77d78fe9d99f25e2e155c2434d9aebf41c4e4ef456d7150b95629ab2affa74aa1c58e64b33161d4ca1a4964
-
Filesize
72KB
MD54d8c8c33a4a891370fc91ca4a2d596e0
SHA104ccf8913f59792519ae7ef5aab5d7be7c2faa41
SHA256892d9459aed4c00389c32b33b41a4e020c7fb3a55159d21cf618a86a48dbbc8e
SHA512792fa9d72e12263dea9c6fa2b481f558edd069685d2b0556e01ac7f1934c46d4e110d240736d2680f56135d9647ec4f8b8523eea20cdf63bd96e94b535694c65
-
Filesize
72KB
MD54d8c8c33a4a891370fc91ca4a2d596e0
SHA104ccf8913f59792519ae7ef5aab5d7be7c2faa41
SHA256892d9459aed4c00389c32b33b41a4e020c7fb3a55159d21cf618a86a48dbbc8e
SHA512792fa9d72e12263dea9c6fa2b481f558edd069685d2b0556e01ac7f1934c46d4e110d240736d2680f56135d9647ec4f8b8523eea20cdf63bd96e94b535694c65
-
Filesize
72KB
MD531c67c2c4b0df8f167bd2a6f75fcf928
SHA171f67b8d361bc85811237c9e8b6ad2e79fd94c6a
SHA2567765ed16f4eaa4f79fb0fd1cb8d215db3fe8090a5c3a996e5fdc3f62f391fac0
SHA512191f92eb00eacfbcfb3a6164e256df332467082788be0f0fec228f129ad68add729d9be2fdadc16d8b0fdf5c87cc964c3488c283a0390f9549258c6578cc3d17
-
Filesize
72KB
MD531c67c2c4b0df8f167bd2a6f75fcf928
SHA171f67b8d361bc85811237c9e8b6ad2e79fd94c6a
SHA2567765ed16f4eaa4f79fb0fd1cb8d215db3fe8090a5c3a996e5fdc3f62f391fac0
SHA512191f92eb00eacfbcfb3a6164e256df332467082788be0f0fec228f129ad68add729d9be2fdadc16d8b0fdf5c87cc964c3488c283a0390f9549258c6578cc3d17
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD50642312ad31e4bbbb068556c5f3d80e3
SHA10993bf3032f294825d7748b76dc80cbe98088c5b
SHA2569bb0a544bd46f883ab989ed3f7e70b9ce08400c1449f797e615e2c80bea277c5
SHA51220157bf8371ec43185ba21c36729de55342aa4a3e675b34da42576c7c08c355af55242761096465eeec17cfa97f2fbf3c488ef8a23699e53e7b2c3cd1d83d1d5
-
Filesize
72KB
MD50642312ad31e4bbbb068556c5f3d80e3
SHA10993bf3032f294825d7748b76dc80cbe98088c5b
SHA2569bb0a544bd46f883ab989ed3f7e70b9ce08400c1449f797e615e2c80bea277c5
SHA51220157bf8371ec43185ba21c36729de55342aa4a3e675b34da42576c7c08c355af55242761096465eeec17cfa97f2fbf3c488ef8a23699e53e7b2c3cd1d83d1d5
-
Filesize
72KB
MD55ac9f20ccc992de606cf83e1da08cf79
SHA193678f1435229365b9017b18dce0187f51439b58
SHA256741b2f02f842cf3cb42078bca7e7c94d7b50801f8df7c40669038d3f7965d807
SHA5126bd96f12762853ddba27bda0493fc7fdabdf464eacb82eae86f8f4f3c5088a55cf119d56d86c4b78356b143e23e6b2137f1e4d8f26166b6ac33181458e172d95
-
Filesize
72KB
MD55ac9f20ccc992de606cf83e1da08cf79
SHA193678f1435229365b9017b18dce0187f51439b58
SHA256741b2f02f842cf3cb42078bca7e7c94d7b50801f8df7c40669038d3f7965d807
SHA5126bd96f12762853ddba27bda0493fc7fdabdf464eacb82eae86f8f4f3c5088a55cf119d56d86c4b78356b143e23e6b2137f1e4d8f26166b6ac33181458e172d95
-
Filesize
72KB
MD51a81a5464f4b8ccbcf9b2bf99a1254f9
SHA12c1c83f7515a25b9a6220b6ab40577ecbba4b6ca
SHA256fc7202ca96e6649ad3a8bc532da71e6306550670a1d8163098501075e9c182ca
SHA512f9be72256dcdc72254706c553d1d30db722bdda6611d9359e7ce0f89fcfcc8eea6045f1fcf9962d0db44465836dc2e7c91d83dade406fe81cf690f8f0615f1ab
-
Filesize
72KB
MD51a81a5464f4b8ccbcf9b2bf99a1254f9
SHA12c1c83f7515a25b9a6220b6ab40577ecbba4b6ca
SHA256fc7202ca96e6649ad3a8bc532da71e6306550670a1d8163098501075e9c182ca
SHA512f9be72256dcdc72254706c553d1d30db722bdda6611d9359e7ce0f89fcfcc8eea6045f1fcf9962d0db44465836dc2e7c91d83dade406fe81cf690f8f0615f1ab
-
Filesize
72KB
MD50642312ad31e4bbbb068556c5f3d80e3
SHA10993bf3032f294825d7748b76dc80cbe98088c5b
SHA2569bb0a544bd46f883ab989ed3f7e70b9ce08400c1449f797e615e2c80bea277c5
SHA51220157bf8371ec43185ba21c36729de55342aa4a3e675b34da42576c7c08c355af55242761096465eeec17cfa97f2fbf3c488ef8a23699e53e7b2c3cd1d83d1d5
-
Filesize
72KB
MD50642312ad31e4bbbb068556c5f3d80e3
SHA10993bf3032f294825d7748b76dc80cbe98088c5b
SHA2569bb0a544bd46f883ab989ed3f7e70b9ce08400c1449f797e615e2c80bea277c5
SHA51220157bf8371ec43185ba21c36729de55342aa4a3e675b34da42576c7c08c355af55242761096465eeec17cfa97f2fbf3c488ef8a23699e53e7b2c3cd1d83d1d5
-
Filesize
72KB
MD51a81a5464f4b8ccbcf9b2bf99a1254f9
SHA12c1c83f7515a25b9a6220b6ab40577ecbba4b6ca
SHA256fc7202ca96e6649ad3a8bc532da71e6306550670a1d8163098501075e9c182ca
SHA512f9be72256dcdc72254706c553d1d30db722bdda6611d9359e7ce0f89fcfcc8eea6045f1fcf9962d0db44465836dc2e7c91d83dade406fe81cf690f8f0615f1ab
-
Filesize
72KB
MD51a81a5464f4b8ccbcf9b2bf99a1254f9
SHA12c1c83f7515a25b9a6220b6ab40577ecbba4b6ca
SHA256fc7202ca96e6649ad3a8bc532da71e6306550670a1d8163098501075e9c182ca
SHA512f9be72256dcdc72254706c553d1d30db722bdda6611d9359e7ce0f89fcfcc8eea6045f1fcf9962d0db44465836dc2e7c91d83dade406fe81cf690f8f0615f1ab
-
Filesize
72KB
MD5599e99fd0078927b484bbf2c1c9f15fd
SHA1f514f3412418c1c80c2a9bfab3b5457f7a29baf7
SHA2561fd9a75729b49801d601b6d148798d19ee6f7a5a70e631561c3f389fb677af4a
SHA512a7d67576ae83ed5d3d197af43fd40577f3b2596a7ce419d61f72992daceb162cd595b3611a0272f004eb211883e6db2ac60d0f89024a6f4d9b33b2f6fd2c58b4
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD581913ab72b09283934e464da79b44959
SHA1287543fc0f6beb0a51b1419c054b8dfa4eb5eb66
SHA256a623b41270cc0bf0aff41943be486dd30297ed1422e4218dc664cf4afaf19a2c
SHA5123139ebebd3a6da99681138181a226b55d7554f8b4a06871b1bcd4c3cf64992d41ec17c60b17b29f4123f8c678bf775c5c3c7f33a9506b0f3d23f754e7c4dfeab
-
Filesize
72KB
MD5e0d6c0ff41a8b29bc14262881d8ba389
SHA10f1f7e1bb52b63dfcea09dc3aa93190eefde13a9
SHA256a24609d4ed0db2418ae58736d9288c7248a79c5acaa55a363eb8855f3c64e498
SHA5125b38c08a3c1e6a9d90b2ab1e536197979cd88e21041c263d8384183fdc003d526010972b57aa1092617cf52c6b330e4d9d51d6580f7be4c884436cfdb11259b9
-
Filesize
72KB
MD5e0d6c0ff41a8b29bc14262881d8ba389
SHA10f1f7e1bb52b63dfcea09dc3aa93190eefde13a9
SHA256a24609d4ed0db2418ae58736d9288c7248a79c5acaa55a363eb8855f3c64e498
SHA5125b38c08a3c1e6a9d90b2ab1e536197979cd88e21041c263d8384183fdc003d526010972b57aa1092617cf52c6b330e4d9d51d6580f7be4c884436cfdb11259b9
-
Filesize
72KB
MD57e4d818a8b70f816001452542bcfff03
SHA19e538a9136d9378c38be9025d354b8535c166079
SHA256342c77a61a6fb1d0d89d8fbbca2ae03bd64e3cec32a04290a2b7ac988781f8a5
SHA512358a51591d8472a35b9ff00586fa632664417843b0a1cbc985f5e29bc74b2b4b37cf28d2159bd742874e70fab041b4faecccb260ab42eef0e4a62a1bca747aeb
-
Filesize
72KB
MD57e4d818a8b70f816001452542bcfff03
SHA19e538a9136d9378c38be9025d354b8535c166079
SHA256342c77a61a6fb1d0d89d8fbbca2ae03bd64e3cec32a04290a2b7ac988781f8a5
SHA512358a51591d8472a35b9ff00586fa632664417843b0a1cbc985f5e29bc74b2b4b37cf28d2159bd742874e70fab041b4faecccb260ab42eef0e4a62a1bca747aeb
-
Filesize
72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
Filesize
72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a62956de1e9531f5628240b59d71ebd0
SHA1f95416d21f7f7097a4615cdb74abdda9fa7211c1
SHA256df203c562870d6d39b8ddcf36de8cae7c69ad4faca761fe10341c8746171bf7e
SHA512bac974aeb2c6688ab1acd60f355c68a193df9a2a4f3d19775b1dda895990101d0aacf5ce2494db40c43b347159559b9e67a5c1440066e5d4a6c4434f20423d75
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a62956de1e9531f5628240b59d71ebd0
SHA1f95416d21f7f7097a4615cdb74abdda9fa7211c1
SHA256df203c562870d6d39b8ddcf36de8cae7c69ad4faca761fe10341c8746171bf7e
SHA512bac974aeb2c6688ab1acd60f355c68a193df9a2a4f3d19775b1dda895990101d0aacf5ce2494db40c43b347159559b9e67a5c1440066e5d4a6c4434f20423d75
-
Filesize
72KB
MD57691283eae22e2b5bbb82974eca3feb3
SHA11d046503b17321aaf17bd46988c86e152da65ed3
SHA2567add5fe9a18590876bc88e1439a97916d339358f2893dbe047add50f8f9da096
SHA512733d5b067c0ef97a6f7396f2865c5a7b415db2fdee5ed5beb3f486c2ae3c37b9a78c6048c70a025caa645540beadec5627b4fb66e888ff5b82f7b0cd75f6074b
-
Filesize
72KB
MD57691283eae22e2b5bbb82974eca3feb3
SHA11d046503b17321aaf17bd46988c86e152da65ed3
SHA2567add5fe9a18590876bc88e1439a97916d339358f2893dbe047add50f8f9da096
SHA512733d5b067c0ef97a6f7396f2865c5a7b415db2fdee5ed5beb3f486c2ae3c37b9a78c6048c70a025caa645540beadec5627b4fb66e888ff5b82f7b0cd75f6074b
-
Filesize
72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
Filesize
72KB
MD5380534a5681ae5250ef4ed96dfa9321d
SHA11b747137019baadd843565b3f1230a2266dc979b
SHA256cd7849dbc12a960e3b6f3194b1e05e19a6436395e8958de8f0bfc7a7b03861bf
SHA512c1f014ff0f6857c11b4269d8b669a78f76986426cd99c4b9c131813314a76c5d81f223a7e9ae1e4564833fd217e28e91d60c29e06833931b163bd2f09b2693ac
-
Filesize
72KB
MD5733e7fdcffb031cd5efbb453bd9df22b
SHA1a2a18e70a862bdd8f1680775f970211dacb51cb9
SHA256ff5f9bf3ca8c01e676c974a1f6ae99dcda28bcf2e06cef72dba97912fc99ef1c
SHA512db991ee1861b52feb57529dcec411c4c337a2e2c6845881fd16befd0ce8dae7811741f8d6ffd2e91ed405ddeffab0e014bcc2ddb48fa839219f5a74940a8ec81
-
Filesize
72KB
MD5733e7fdcffb031cd5efbb453bd9df22b
SHA1a2a18e70a862bdd8f1680775f970211dacb51cb9
SHA256ff5f9bf3ca8c01e676c974a1f6ae99dcda28bcf2e06cef72dba97912fc99ef1c
SHA512db991ee1861b52feb57529dcec411c4c337a2e2c6845881fd16befd0ce8dae7811741f8d6ffd2e91ed405ddeffab0e014bcc2ddb48fa839219f5a74940a8ec81