Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe
Resource
win10v2004-20220901-en
General
-
Target
f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe
-
Size
72KB
-
MD5
08f54ad89bab12f9b4622764b98e0055
-
SHA1
40c58ce1e168fd384f06666644a22d1708d50978
-
SHA256
f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec
-
SHA512
c910847e194599cd8fd755f8b7f4a4ed53aa54d4dd32d5024b3cbbd92826b822f76377a72db8ed3ea6f1f43fda95ca24b8dfa792bd69442241bc632415d56ce0
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2r:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPf
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 50 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 54 IoCs
pid Process 1112 backup.exe 2016 backup.exe 1716 backup.exe 956 backup.exe 1776 backup.exe 800 backup.exe 900 update.exe 1248 backup.exe 1640 backup.exe 568 data.exe 1532 backup.exe 316 backup.exe 1504 System Restore.exe 1512 backup.exe 1808 backup.exe 1932 backup.exe 1436 backup.exe 1596 backup.exe 2016 backup.exe 1912 data.exe 1944 backup.exe 1120 backup.exe 268 backup.exe 584 backup.exe 1552 backup.exe 1204 backup.exe 1280 backup.exe 1028 backup.exe 1972 backup.exe 1992 backup.exe 1888 backup.exe 1916 backup.exe 1260 backup.exe 1496 backup.exe 824 backup.exe 892 update.exe 1332 System Restore.exe 924 backup.exe 1328 update.exe 1736 backup.exe 968 System Restore.exe 1624 backup.exe 1724 backup.exe 1980 backup.exe 1592 backup.exe 308 backup.exe 1080 backup.exe 1180 backup.exe 864 backup.exe 300 backup.exe 1216 backup.exe 1756 backup.exe 1972 backup.exe 1204 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 900 update.exe 900 update.exe 900 update.exe 1248 backup.exe 1248 backup.exe 1640 backup.exe 1640 backup.exe 1248 backup.exe 1248 backup.exe 1532 backup.exe 1532 backup.exe 316 backup.exe 316 backup.exe 1532 backup.exe 1532 backup.exe 1512 backup.exe 1512 backup.exe 1808 backup.exe 1808 backup.exe 1808 backup.exe 1808 backup.exe 1436 backup.exe 1436 backup.exe 1436 backup.exe 1436 backup.exe 1248 backup.exe 1512 backup.exe 1512 backup.exe 1248 backup.exe 1436 backup.exe 1436 backup.exe 1808 backup.exe 1532 backup.exe 1808 backup.exe 1532 backup.exe 1512 backup.exe 1512 backup.exe 1436 backup.exe 1436 backup.exe 1944 backup.exe 1944 backup.exe 584 backup.exe 584 backup.exe 268 backup.exe 268 backup.exe 584 backup.exe 584 backup.exe 1552 backup.exe 1552 backup.exe 268 backup.exe 268 backup.exe -
Drops file in Program Files directory 47 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\update.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\System Restore.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 1112 backup.exe 2016 backup.exe 1716 backup.exe 956 backup.exe 1776 backup.exe 800 backup.exe 900 update.exe 1248 backup.exe 1640 backup.exe 568 data.exe 1532 backup.exe 316 backup.exe 1504 System Restore.exe 1512 backup.exe 1808 backup.exe 1932 backup.exe 1436 backup.exe 1596 backup.exe 2016 backup.exe 1912 data.exe 1944 backup.exe 1120 backup.exe 268 backup.exe 584 backup.exe 1552 backup.exe 1204 backup.exe 1280 backup.exe 1028 backup.exe 1972 backup.exe 1992 backup.exe 1888 backup.exe 1916 backup.exe 1260 backup.exe 824 backup.exe 1496 backup.exe 924 backup.exe 1332 System Restore.exe 892 update.exe 1328 update.exe 1624 backup.exe 1736 backup.exe 968 System Restore.exe 1724 backup.exe 1980 backup.exe 1592 backup.exe 1080 backup.exe 308 backup.exe 1180 backup.exe 300 backup.exe 1756 backup.exe 864 backup.exe 1204 backup.exe 1972 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1112 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 28 PID 1880 wrote to memory of 1112 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 28 PID 1880 wrote to memory of 1112 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 28 PID 1880 wrote to memory of 1112 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 28 PID 1880 wrote to memory of 2016 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 29 PID 1880 wrote to memory of 2016 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 29 PID 1880 wrote to memory of 2016 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 29 PID 1880 wrote to memory of 2016 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 29 PID 1880 wrote to memory of 1716 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 30 PID 1880 wrote to memory of 1716 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 30 PID 1880 wrote to memory of 1716 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 30 PID 1880 wrote to memory of 1716 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 30 PID 1880 wrote to memory of 956 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 31 PID 1880 wrote to memory of 956 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 31 PID 1880 wrote to memory of 956 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 31 PID 1880 wrote to memory of 956 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 31 PID 1880 wrote to memory of 1776 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 32 PID 1880 wrote to memory of 1776 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 32 PID 1880 wrote to memory of 1776 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 32 PID 1880 wrote to memory of 1776 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 32 PID 1880 wrote to memory of 800 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 33 PID 1880 wrote to memory of 800 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 33 PID 1880 wrote to memory of 800 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 33 PID 1880 wrote to memory of 800 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 33 PID 1880 wrote to memory of 900 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 34 PID 1880 wrote to memory of 900 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 34 PID 1880 wrote to memory of 900 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 34 PID 1880 wrote to memory of 900 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 34 PID 1880 wrote to memory of 900 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 34 PID 1880 wrote to memory of 900 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 34 PID 1880 wrote to memory of 900 1880 f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe 34 PID 1112 wrote to memory of 1248 1112 backup.exe 35 PID 1112 wrote to memory of 1248 1112 backup.exe 35 PID 1112 wrote to memory of 1248 1112 backup.exe 35 PID 1112 wrote to memory of 1248 1112 backup.exe 35 PID 1248 wrote to memory of 1640 1248 backup.exe 36 PID 1248 wrote to memory of 1640 1248 backup.exe 36 PID 1248 wrote to memory of 1640 1248 backup.exe 36 PID 1248 wrote to memory of 1640 1248 backup.exe 36 PID 1640 wrote to memory of 568 1640 backup.exe 37 PID 1640 wrote to memory of 568 1640 backup.exe 37 PID 1640 wrote to memory of 568 1640 backup.exe 37 PID 1640 wrote to memory of 568 1640 backup.exe 37 PID 1248 wrote to memory of 1532 1248 backup.exe 38 PID 1248 wrote to memory of 1532 1248 backup.exe 38 PID 1248 wrote to memory of 1532 1248 backup.exe 38 PID 1248 wrote to memory of 1532 1248 backup.exe 38 PID 1532 wrote to memory of 316 1532 backup.exe 39 PID 1532 wrote to memory of 316 1532 backup.exe 39 PID 1532 wrote to memory of 316 1532 backup.exe 39 PID 1532 wrote to memory of 316 1532 backup.exe 39 PID 316 wrote to memory of 1504 316 backup.exe 40 PID 316 wrote to memory of 1504 316 backup.exe 40 PID 316 wrote to memory of 1504 316 backup.exe 40 PID 316 wrote to memory of 1504 316 backup.exe 40 PID 1532 wrote to memory of 1512 1532 backup.exe 41 PID 1532 wrote to memory of 1512 1532 backup.exe 41 PID 1532 wrote to memory of 1512 1532 backup.exe 41 PID 1532 wrote to memory of 1512 1532 backup.exe 41 PID 1512 wrote to memory of 1808 1512 backup.exe 42 PID 1512 wrote to memory of 1808 1512 backup.exe 42 PID 1512 wrote to memory of 1808 1512 backup.exe 42 PID 1512 wrote to memory of 1808 1512 backup.exe 42 PID 1808 wrote to memory of 1932 1808 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe"C:\Users\Admin\AppData\Local\Temp\f32e321a6e263f6cfd3feff43452a6fee98c819d9cde47f6cfb193d087d136ec.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\1987071021\backup.exeC:\Users\Admin\AppData\Local\Temp\1987071021\backup.exe C:\Users\Admin\AppData\Local\Temp\1987071021\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1112 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1248 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\PerfLogs\Admin\data.exeC:\PerfLogs\Admin\data.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1532 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\7-Zip\Lang\System Restore.exe"C:\Program Files\7-Zip\Lang\System Restore.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1808 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1436 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1332
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:308
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:300
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:1888
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:1640
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵PID:1248
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:484
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1888
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\update.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Executes dropped EXE
PID:1216
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1828
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:856
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:2040
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1688
-
-
-
C:\Program Files\Common Files\Services\data.exe"C:\Program Files\Common Files\Services\data.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1912
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1916
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:924 -
C:\Program Files\Common Files\System\ado\System Restore.exe"C:\Program Files\Common Files\System\ado\System Restore.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:2028
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:860
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1704
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1916
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:892
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1592
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1968
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:1664
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1552
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:584 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1028
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:824
-
-
C:\Program Files\DVD Maker\fr-FR\update.exe"C:\Program Files\DVD Maker\fr-FR\update.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1328
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1980
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵PID:1760
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:1596
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:1672
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1144
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1576
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:1644
-
-
C:\Program Files\Internet Explorer\es-ES\System Restore.exe"C:\Program Files\Internet Explorer\es-ES\System Restore.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1888
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1324
-
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵PID:1884
-
C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe"C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe" C:\Program Files\Java\jdk1.7.0_80\bin\7⤵PID:1668
-
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:1128
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1636
-
C:\Program Files\Microsoft Games\Chess\backup.exe"C:\Program Files\Microsoft Games\Chess\backup.exe" C:\Program Files\Microsoft Games\Chess\6⤵PID:1068
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:772
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1280 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1736
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵PID:1552
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:1736
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:1260
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:908
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:2036
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:900
-
-
-
-
C:\Program Files (x86)\Common Files\System Restore.exe"C:\Program Files (x86)\Common Files\System Restore.exe" C:\Program Files (x86)\Common Files\5⤵PID:996
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1912
-
-
C:\Program Files (x86)\Internet Explorer\data.exe"C:\Program Files (x86)\Internet Explorer\data.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1820
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:972
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:300
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:1832
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1680
-
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:1184
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5684c7bc9a465b371a9589400d8bb2ac7
SHA14d14fa6affc8151fac826f82858ab1e22d7cff1e
SHA2567d025346d6418b65354841ae0a5df7383e95d49936b46a4314998f3a2e96ea1a
SHA5126a5bdbf3ffdcb63697fb3ca25ea7926072f838666954f8de78073d0d75678af31d5fca395f6e0cbde74c62f946adc93be81d7f6d99de9f23a3b8b4da5f9c723d
-
Filesize
72KB
MD521afaa9990c4131fc927d273c60b10a3
SHA18002ae7e4351034671aadcd4722fa6f2468f60e5
SHA2564026ffbea574b1b87396e100967060586e6913b09f8eb066bb126f96a99d1b28
SHA51268f2b341b59b832e201a07a5508aa5216cafee5d58eb5e8ae7315420b73a64b2187dd578fc9adef1d906deff99ef827efbb98f4cae1410272c38ef5086390673
-
Filesize
72KB
MD521afaa9990c4131fc927d273c60b10a3
SHA18002ae7e4351034671aadcd4722fa6f2468f60e5
SHA2564026ffbea574b1b87396e100967060586e6913b09f8eb066bb126f96a99d1b28
SHA51268f2b341b59b832e201a07a5508aa5216cafee5d58eb5e8ae7315420b73a64b2187dd578fc9adef1d906deff99ef827efbb98f4cae1410272c38ef5086390673
-
Filesize
72KB
MD50559a8309116bd9cea5859c7cfe92e33
SHA191ffda31e15fe312c26590c8d23273ce77215730
SHA2560814f8a0dee1797a4fc554b63dd2f0a5ba53a59caad6ad68ad6dde24641d6645
SHA51282365bb01273da85b73125014576d96a58b8e5c765639e6226cca3f8457f63720b8b45a518192d2124630618f5db96079390eb3b8b03c3a1519adbb769aaa862
-
Filesize
72KB
MD580d5671952b656436105e36a9abfb2dd
SHA179b4fbe6ab3e4f6b747b06a0eaf441b32352a042
SHA25687de79f40d684095dd4cb13dee94b9e4e2f74529cae0dca3da79e1a8d7a4c07c
SHA5125a9581c5fb2b1d88dba2d44f86b6570228cfd775ca0ea6ea3da62ed6c902b87734bb7af700cc318a2ded37ecd72ffbbc0a153a686040d9ec5fca19011333cfae
-
Filesize
72KB
MD580d5671952b656436105e36a9abfb2dd
SHA179b4fbe6ab3e4f6b747b06a0eaf441b32352a042
SHA25687de79f40d684095dd4cb13dee94b9e4e2f74529cae0dca3da79e1a8d7a4c07c
SHA5125a9581c5fb2b1d88dba2d44f86b6570228cfd775ca0ea6ea3da62ed6c902b87734bb7af700cc318a2ded37ecd72ffbbc0a153a686040d9ec5fca19011333cfae
-
Filesize
72KB
MD57ca9d3bae51ee217ba5946b03fff9943
SHA1347f84c4c6beb6d9ca3f51a20e6fc1f92b5376bf
SHA256f6721e69f77f1b0c6f1c2c4dfe449fef13fe9e9f5652ad6466866d2f87b89a3f
SHA512e035f889f3a29325761da6e5efe666f8bf798fe990d4fcf23fa9a2a1e254bf2d5ed3641da91afc7323c7ec9522928ac3d19fede12798d95220da1af2ce5b4300
-
Filesize
72KB
MD59d4c6c833e179f23f7ac5999a0955699
SHA10922ef1f0a1275c3bea47e6ba8b662c1b97c4465
SHA25641c01f3e8dc6645f0d41fdf403780a955394b23060678ebe4d9fafa009bb5eb9
SHA512c46cc09fff01a501e0624e634b10cb475d0afbf728e8bd4d91aeeacc1f44c86b75bff9faa15f57cf8972c39e609d910b3e5d8d47f2cd836f0cf65ba2c7d1c678
-
Filesize
72KB
MD59d4c6c833e179f23f7ac5999a0955699
SHA10922ef1f0a1275c3bea47e6ba8b662c1b97c4465
SHA25641c01f3e8dc6645f0d41fdf403780a955394b23060678ebe4d9fafa009bb5eb9
SHA512c46cc09fff01a501e0624e634b10cb475d0afbf728e8bd4d91aeeacc1f44c86b75bff9faa15f57cf8972c39e609d910b3e5d8d47f2cd836f0cf65ba2c7d1c678
-
Filesize
72KB
MD572f1204de9d1fee4db5db9174ea999f5
SHA1754b2efe688ad0e7f9df6dfff59569ab39d5e2ce
SHA256148847b5b47a16903e01fd095892965c7ae5750879564f0c15d805d0c3f37fed
SHA512700f33ad0a98f0cf7349d7cf6abbec03630db9525280ca1220ade906afe4f303ae9473a74c12436999770a945bec35b944668352bf88f078bd08b31c9004ca10
-
Filesize
72KB
MD57ca9d3bae51ee217ba5946b03fff9943
SHA1347f84c4c6beb6d9ca3f51a20e6fc1f92b5376bf
SHA256f6721e69f77f1b0c6f1c2c4dfe449fef13fe9e9f5652ad6466866d2f87b89a3f
SHA512e035f889f3a29325761da6e5efe666f8bf798fe990d4fcf23fa9a2a1e254bf2d5ed3641da91afc7323c7ec9522928ac3d19fede12798d95220da1af2ce5b4300
-
Filesize
72KB
MD57ca9d3bae51ee217ba5946b03fff9943
SHA1347f84c4c6beb6d9ca3f51a20e6fc1f92b5376bf
SHA256f6721e69f77f1b0c6f1c2c4dfe449fef13fe9e9f5652ad6466866d2f87b89a3f
SHA512e035f889f3a29325761da6e5efe666f8bf798fe990d4fcf23fa9a2a1e254bf2d5ed3641da91afc7323c7ec9522928ac3d19fede12798d95220da1af2ce5b4300
-
Filesize
72KB
MD5e27209d8edb110a8bfd0108bcbb0e627
SHA1557eabada627582ee7a39f222f87d0631fdc63a9
SHA256078ca73fe305f651fc0b04b01d0b91bf48817ffad3b5465dedcdb82c5568e9db
SHA5124af746b9f726d10dc25383728947b2214728a2d25b698e82bc71a4103f66632f482488df1e2f70b2d0ad5a6ada7c93c623ee211811ac41099dfd19430fe4af5f
-
Filesize
72KB
MD5e27209d8edb110a8bfd0108bcbb0e627
SHA1557eabada627582ee7a39f222f87d0631fdc63a9
SHA256078ca73fe305f651fc0b04b01d0b91bf48817ffad3b5465dedcdb82c5568e9db
SHA5124af746b9f726d10dc25383728947b2214728a2d25b698e82bc71a4103f66632f482488df1e2f70b2d0ad5a6ada7c93c623ee211811ac41099dfd19430fe4af5f
-
Filesize
72KB
MD535af207261d3f807864e6f73ea1e603c
SHA17234f443b966c111584a9c9926bfa864e900ccbd
SHA2562ab8c6837150cd6dea9ed7ea0e0da96442d8ee4c588269243c37ba4043f76e8f
SHA512a2a81e2ae383b480553874b367a756ac8ccfd3280ec8ce4ea604b3f8a4f6f34616bdcdd14b8395dfe85a700926e61be83114940b83827bf499cebee38fab5845
-
Filesize
72KB
MD535af207261d3f807864e6f73ea1e603c
SHA17234f443b966c111584a9c9926bfa864e900ccbd
SHA2562ab8c6837150cd6dea9ed7ea0e0da96442d8ee4c588269243c37ba4043f76e8f
SHA512a2a81e2ae383b480553874b367a756ac8ccfd3280ec8ce4ea604b3f8a4f6f34616bdcdd14b8395dfe85a700926e61be83114940b83827bf499cebee38fab5845
-
Filesize
72KB
MD55c1b453e8d1240808c7f436ea769182d
SHA161018b1dc07b5d9e8b7c7e094ca7da64717d7187
SHA256a563d0b8164074dc6b78b3e79f202ec6ab10589174e6d26fcae1168a916a5fd5
SHA51202b45c6c169f12a651f5965399f224b33cfc9fcb321b05934f83e47d40d7d1cef3171c66dc935323c7c3ab1ba06386040ed755191a1d001a0654c92cb3c90964
-
Filesize
72KB
MD55c1b453e8d1240808c7f436ea769182d
SHA161018b1dc07b5d9e8b7c7e094ca7da64717d7187
SHA256a563d0b8164074dc6b78b3e79f202ec6ab10589174e6d26fcae1168a916a5fd5
SHA51202b45c6c169f12a651f5965399f224b33cfc9fcb321b05934f83e47d40d7d1cef3171c66dc935323c7c3ab1ba06386040ed755191a1d001a0654c92cb3c90964
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD570a3c9f389a0a404caa0fe78ae598e95
SHA150ca8e115753947eac5e892fc66c48393f4811d3
SHA256c7b558e0a42fb24faad67a94da88535372a42e4b1cde89461933e5388469c4ea
SHA5121f2adc61160eb925abe4efaf8a774a34452e0c863c893cff57e66f0a82a95c786322a3b3c2bbe9d660c754868d63499c5b722edda802248938d811948a097c80
-
Filesize
72KB
MD570a3c9f389a0a404caa0fe78ae598e95
SHA150ca8e115753947eac5e892fc66c48393f4811d3
SHA256c7b558e0a42fb24faad67a94da88535372a42e4b1cde89461933e5388469c4ea
SHA5121f2adc61160eb925abe4efaf8a774a34452e0c863c893cff57e66f0a82a95c786322a3b3c2bbe9d660c754868d63499c5b722edda802248938d811948a097c80
-
Filesize
72KB
MD5684c7bc9a465b371a9589400d8bb2ac7
SHA14d14fa6affc8151fac826f82858ab1e22d7cff1e
SHA2567d025346d6418b65354841ae0a5df7383e95d49936b46a4314998f3a2e96ea1a
SHA5126a5bdbf3ffdcb63697fb3ca25ea7926072f838666954f8de78073d0d75678af31d5fca395f6e0cbde74c62f946adc93be81d7f6d99de9f23a3b8b4da5f9c723d
-
Filesize
72KB
MD5684c7bc9a465b371a9589400d8bb2ac7
SHA14d14fa6affc8151fac826f82858ab1e22d7cff1e
SHA2567d025346d6418b65354841ae0a5df7383e95d49936b46a4314998f3a2e96ea1a
SHA5126a5bdbf3ffdcb63697fb3ca25ea7926072f838666954f8de78073d0d75678af31d5fca395f6e0cbde74c62f946adc93be81d7f6d99de9f23a3b8b4da5f9c723d
-
Filesize
72KB
MD521afaa9990c4131fc927d273c60b10a3
SHA18002ae7e4351034671aadcd4722fa6f2468f60e5
SHA2564026ffbea574b1b87396e100967060586e6913b09f8eb066bb126f96a99d1b28
SHA51268f2b341b59b832e201a07a5508aa5216cafee5d58eb5e8ae7315420b73a64b2187dd578fc9adef1d906deff99ef827efbb98f4cae1410272c38ef5086390673
-
Filesize
72KB
MD521afaa9990c4131fc927d273c60b10a3
SHA18002ae7e4351034671aadcd4722fa6f2468f60e5
SHA2564026ffbea574b1b87396e100967060586e6913b09f8eb066bb126f96a99d1b28
SHA51268f2b341b59b832e201a07a5508aa5216cafee5d58eb5e8ae7315420b73a64b2187dd578fc9adef1d906deff99ef827efbb98f4cae1410272c38ef5086390673
-
Filesize
72KB
MD50559a8309116bd9cea5859c7cfe92e33
SHA191ffda31e15fe312c26590c8d23273ce77215730
SHA2560814f8a0dee1797a4fc554b63dd2f0a5ba53a59caad6ad68ad6dde24641d6645
SHA51282365bb01273da85b73125014576d96a58b8e5c765639e6226cca3f8457f63720b8b45a518192d2124630618f5db96079390eb3b8b03c3a1519adbb769aaa862
-
Filesize
72KB
MD50559a8309116bd9cea5859c7cfe92e33
SHA191ffda31e15fe312c26590c8d23273ce77215730
SHA2560814f8a0dee1797a4fc554b63dd2f0a5ba53a59caad6ad68ad6dde24641d6645
SHA51282365bb01273da85b73125014576d96a58b8e5c765639e6226cca3f8457f63720b8b45a518192d2124630618f5db96079390eb3b8b03c3a1519adbb769aaa862
-
Filesize
72KB
MD580d5671952b656436105e36a9abfb2dd
SHA179b4fbe6ab3e4f6b747b06a0eaf441b32352a042
SHA25687de79f40d684095dd4cb13dee94b9e4e2f74529cae0dca3da79e1a8d7a4c07c
SHA5125a9581c5fb2b1d88dba2d44f86b6570228cfd775ca0ea6ea3da62ed6c902b87734bb7af700cc318a2ded37ecd72ffbbc0a153a686040d9ec5fca19011333cfae
-
Filesize
72KB
MD580d5671952b656436105e36a9abfb2dd
SHA179b4fbe6ab3e4f6b747b06a0eaf441b32352a042
SHA25687de79f40d684095dd4cb13dee94b9e4e2f74529cae0dca3da79e1a8d7a4c07c
SHA5125a9581c5fb2b1d88dba2d44f86b6570228cfd775ca0ea6ea3da62ed6c902b87734bb7af700cc318a2ded37ecd72ffbbc0a153a686040d9ec5fca19011333cfae
-
Filesize
72KB
MD57ca9d3bae51ee217ba5946b03fff9943
SHA1347f84c4c6beb6d9ca3f51a20e6fc1f92b5376bf
SHA256f6721e69f77f1b0c6f1c2c4dfe449fef13fe9e9f5652ad6466866d2f87b89a3f
SHA512e035f889f3a29325761da6e5efe666f8bf798fe990d4fcf23fa9a2a1e254bf2d5ed3641da91afc7323c7ec9522928ac3d19fede12798d95220da1af2ce5b4300
-
Filesize
72KB
MD57ca9d3bae51ee217ba5946b03fff9943
SHA1347f84c4c6beb6d9ca3f51a20e6fc1f92b5376bf
SHA256f6721e69f77f1b0c6f1c2c4dfe449fef13fe9e9f5652ad6466866d2f87b89a3f
SHA512e035f889f3a29325761da6e5efe666f8bf798fe990d4fcf23fa9a2a1e254bf2d5ed3641da91afc7323c7ec9522928ac3d19fede12798d95220da1af2ce5b4300
-
Filesize
72KB
MD59d4c6c833e179f23f7ac5999a0955699
SHA10922ef1f0a1275c3bea47e6ba8b662c1b97c4465
SHA25641c01f3e8dc6645f0d41fdf403780a955394b23060678ebe4d9fafa009bb5eb9
SHA512c46cc09fff01a501e0624e634b10cb475d0afbf728e8bd4d91aeeacc1f44c86b75bff9faa15f57cf8972c39e609d910b3e5d8d47f2cd836f0cf65ba2c7d1c678
-
Filesize
72KB
MD59d4c6c833e179f23f7ac5999a0955699
SHA10922ef1f0a1275c3bea47e6ba8b662c1b97c4465
SHA25641c01f3e8dc6645f0d41fdf403780a955394b23060678ebe4d9fafa009bb5eb9
SHA512c46cc09fff01a501e0624e634b10cb475d0afbf728e8bd4d91aeeacc1f44c86b75bff9faa15f57cf8972c39e609d910b3e5d8d47f2cd836f0cf65ba2c7d1c678
-
Filesize
72KB
MD572f1204de9d1fee4db5db9174ea999f5
SHA1754b2efe688ad0e7f9df6dfff59569ab39d5e2ce
SHA256148847b5b47a16903e01fd095892965c7ae5750879564f0c15d805d0c3f37fed
SHA512700f33ad0a98f0cf7349d7cf6abbec03630db9525280ca1220ade906afe4f303ae9473a74c12436999770a945bec35b944668352bf88f078bd08b31c9004ca10
-
Filesize
72KB
MD572f1204de9d1fee4db5db9174ea999f5
SHA1754b2efe688ad0e7f9df6dfff59569ab39d5e2ce
SHA256148847b5b47a16903e01fd095892965c7ae5750879564f0c15d805d0c3f37fed
SHA512700f33ad0a98f0cf7349d7cf6abbec03630db9525280ca1220ade906afe4f303ae9473a74c12436999770a945bec35b944668352bf88f078bd08b31c9004ca10
-
Filesize
72KB
MD57ca9d3bae51ee217ba5946b03fff9943
SHA1347f84c4c6beb6d9ca3f51a20e6fc1f92b5376bf
SHA256f6721e69f77f1b0c6f1c2c4dfe449fef13fe9e9f5652ad6466866d2f87b89a3f
SHA512e035f889f3a29325761da6e5efe666f8bf798fe990d4fcf23fa9a2a1e254bf2d5ed3641da91afc7323c7ec9522928ac3d19fede12798d95220da1af2ce5b4300
-
Filesize
72KB
MD57ca9d3bae51ee217ba5946b03fff9943
SHA1347f84c4c6beb6d9ca3f51a20e6fc1f92b5376bf
SHA256f6721e69f77f1b0c6f1c2c4dfe449fef13fe9e9f5652ad6466866d2f87b89a3f
SHA512e035f889f3a29325761da6e5efe666f8bf798fe990d4fcf23fa9a2a1e254bf2d5ed3641da91afc7323c7ec9522928ac3d19fede12798d95220da1af2ce5b4300
-
Filesize
72KB
MD572f1204de9d1fee4db5db9174ea999f5
SHA1754b2efe688ad0e7f9df6dfff59569ab39d5e2ce
SHA256148847b5b47a16903e01fd095892965c7ae5750879564f0c15d805d0c3f37fed
SHA512700f33ad0a98f0cf7349d7cf6abbec03630db9525280ca1220ade906afe4f303ae9473a74c12436999770a945bec35b944668352bf88f078bd08b31c9004ca10
-
Filesize
72KB
MD5e27209d8edb110a8bfd0108bcbb0e627
SHA1557eabada627582ee7a39f222f87d0631fdc63a9
SHA256078ca73fe305f651fc0b04b01d0b91bf48817ffad3b5465dedcdb82c5568e9db
SHA5124af746b9f726d10dc25383728947b2214728a2d25b698e82bc71a4103f66632f482488df1e2f70b2d0ad5a6ada7c93c623ee211811ac41099dfd19430fe4af5f
-
Filesize
72KB
MD5e27209d8edb110a8bfd0108bcbb0e627
SHA1557eabada627582ee7a39f222f87d0631fdc63a9
SHA256078ca73fe305f651fc0b04b01d0b91bf48817ffad3b5465dedcdb82c5568e9db
SHA5124af746b9f726d10dc25383728947b2214728a2d25b698e82bc71a4103f66632f482488df1e2f70b2d0ad5a6ada7c93c623ee211811ac41099dfd19430fe4af5f
-
Filesize
72KB
MD535af207261d3f807864e6f73ea1e603c
SHA17234f443b966c111584a9c9926bfa864e900ccbd
SHA2562ab8c6837150cd6dea9ed7ea0e0da96442d8ee4c588269243c37ba4043f76e8f
SHA512a2a81e2ae383b480553874b367a756ac8ccfd3280ec8ce4ea604b3f8a4f6f34616bdcdd14b8395dfe85a700926e61be83114940b83827bf499cebee38fab5845
-
Filesize
72KB
MD535af207261d3f807864e6f73ea1e603c
SHA17234f443b966c111584a9c9926bfa864e900ccbd
SHA2562ab8c6837150cd6dea9ed7ea0e0da96442d8ee4c588269243c37ba4043f76e8f
SHA512a2a81e2ae383b480553874b367a756ac8ccfd3280ec8ce4ea604b3f8a4f6f34616bdcdd14b8395dfe85a700926e61be83114940b83827bf499cebee38fab5845
-
Filesize
72KB
MD55c1b453e8d1240808c7f436ea769182d
SHA161018b1dc07b5d9e8b7c7e094ca7da64717d7187
SHA256a563d0b8164074dc6b78b3e79f202ec6ab10589174e6d26fcae1168a916a5fd5
SHA51202b45c6c169f12a651f5965399f224b33cfc9fcb321b05934f83e47d40d7d1cef3171c66dc935323c7c3ab1ba06386040ed755191a1d001a0654c92cb3c90964
-
Filesize
72KB
MD55c1b453e8d1240808c7f436ea769182d
SHA161018b1dc07b5d9e8b7c7e094ca7da64717d7187
SHA256a563d0b8164074dc6b78b3e79f202ec6ab10589174e6d26fcae1168a916a5fd5
SHA51202b45c6c169f12a651f5965399f224b33cfc9fcb321b05934f83e47d40d7d1cef3171c66dc935323c7c3ab1ba06386040ed755191a1d001a0654c92cb3c90964
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0
-
Filesize
72KB
MD5cf5dfdde3af603c95b596f62425bc78a
SHA19ee5af0a97267356565a91c51915ea19c2349ee6
SHA2562355cbcdd12eff7d21156eda1502241529b03324f17c10fa73e7f77ab0f43ea7
SHA51208c5c942dfb879de8fa3ff79bc39e2f41a8b379acfa2205d3d972540d0f93b22828b4257c70061c96c0f47f75c8811db27b8396e1f8287acbf8c01a564e172e0