Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
204s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe
Resource
win10v2004-20221111-en
General
-
Target
5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe
-
Size
72KB
-
MD5
009526ec342bb66c96f4f8ecbb0f2402
-
SHA1
93cd14633cac26aa84533c91452f8dbd73be4874
-
SHA256
5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3
-
SHA512
ed0034cbd72e06a50df9e70e9d6de65e27f61080d1ca453bd0a6b3fd3cfb0678dcee976d1938fb655d101ae93b1e4468c3e6e4a5879a4a80a302f04ef5a86b6a
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2z:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPH
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 44 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 47 IoCs
pid Process 1516 backup.exe 2440 backup.exe 4636 backup.exe 1932 backup.exe 1528 backup.exe 2196 backup.exe 3768 backup.exe 3452 backup.exe 1952 backup.exe 376 backup.exe 4060 backup.exe 3848 backup.exe 4688 backup.exe 3252 backup.exe 4332 backup.exe 1448 backup.exe 2036 backup.exe 4776 backup.exe 4708 backup.exe 4592 backup.exe 4184 backup.exe 3136 backup.exe 4040 backup.exe 4808 backup.exe 3976 backup.exe 628 backup.exe 3592 backup.exe 3668 backup.exe 4696 data.exe 4292 backup.exe 4576 backup.exe 1436 backup.exe 4864 backup.exe 1668 backup.exe 1196 backup.exe 4920 backup.exe 2252 backup.exe 3680 backup.exe 2180 backup.exe 1772 backup.exe 4688 backup.exe 3848 backup.exe 5084 backup.exe 4972 backup.exe 5024 backup.exe 2636 backup.exe 2536 backup.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 1516 backup.exe 2440 backup.exe 4636 backup.exe 1932 backup.exe 1528 backup.exe 2196 backup.exe 3768 backup.exe 3452 backup.exe 1952 backup.exe 376 backup.exe 4060 backup.exe 3848 backup.exe 4688 backup.exe 3252 backup.exe 4332 backup.exe 2036 backup.exe 1448 backup.exe 4776 backup.exe 4708 backup.exe 4184 backup.exe 4592 backup.exe 3136 backup.exe 4040 backup.exe 4808 backup.exe 628 backup.exe 3976 backup.exe 3592 backup.exe 3668 backup.exe 4696 data.exe 4292 backup.exe 4576 backup.exe 1436 backup.exe 4864 backup.exe 1196 backup.exe 1668 backup.exe 4920 backup.exe 2252 backup.exe 1772 backup.exe 3680 backup.exe 2180 backup.exe 3848 backup.exe 4688 backup.exe 4972 backup.exe 5084 backup.exe 5024 backup.exe 2636 backup.exe 2536 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1516 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 85 PID 1172 wrote to memory of 1516 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 85 PID 1172 wrote to memory of 1516 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 85 PID 1172 wrote to memory of 2440 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 86 PID 1172 wrote to memory of 2440 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 86 PID 1172 wrote to memory of 2440 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 86 PID 1172 wrote to memory of 4636 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 87 PID 1172 wrote to memory of 4636 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 87 PID 1172 wrote to memory of 4636 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 87 PID 1516 wrote to memory of 1932 1516 backup.exe 88 PID 1516 wrote to memory of 1932 1516 backup.exe 88 PID 1516 wrote to memory of 1932 1516 backup.exe 88 PID 1172 wrote to memory of 1528 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 89 PID 1172 wrote to memory of 1528 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 89 PID 1172 wrote to memory of 1528 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 89 PID 1932 wrote to memory of 2196 1932 backup.exe 90 PID 1932 wrote to memory of 2196 1932 backup.exe 90 PID 1932 wrote to memory of 2196 1932 backup.exe 90 PID 1172 wrote to memory of 3768 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 91 PID 1172 wrote to memory of 3768 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 91 PID 1172 wrote to memory of 3768 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 91 PID 1932 wrote to memory of 3452 1932 backup.exe 92 PID 1932 wrote to memory of 3452 1932 backup.exe 92 PID 1932 wrote to memory of 3452 1932 backup.exe 92 PID 1172 wrote to memory of 1952 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 93 PID 1172 wrote to memory of 1952 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 93 PID 1172 wrote to memory of 1952 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 93 PID 1932 wrote to memory of 376 1932 backup.exe 94 PID 1932 wrote to memory of 376 1932 backup.exe 94 PID 1932 wrote to memory of 376 1932 backup.exe 94 PID 1172 wrote to memory of 4060 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 95 PID 1172 wrote to memory of 4060 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 95 PID 1172 wrote to memory of 4060 1172 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe 95 PID 376 wrote to memory of 3848 376 backup.exe 96 PID 376 wrote to memory of 3848 376 backup.exe 96 PID 376 wrote to memory of 3848 376 backup.exe 96 PID 3848 wrote to memory of 4688 3848 backup.exe 97 PID 3848 wrote to memory of 4688 3848 backup.exe 97 PID 3848 wrote to memory of 4688 3848 backup.exe 97 PID 376 wrote to memory of 3252 376 backup.exe 98 PID 376 wrote to memory of 3252 376 backup.exe 98 PID 376 wrote to memory of 3252 376 backup.exe 98 PID 3252 wrote to memory of 4332 3252 backup.exe 99 PID 3252 wrote to memory of 4332 3252 backup.exe 99 PID 3252 wrote to memory of 4332 3252 backup.exe 99 PID 376 wrote to memory of 1448 376 backup.exe 101 PID 376 wrote to memory of 1448 376 backup.exe 101 PID 376 wrote to memory of 1448 376 backup.exe 101 PID 1932 wrote to memory of 2036 1932 backup.exe 100 PID 1932 wrote to memory of 2036 1932 backup.exe 100 PID 1932 wrote to memory of 2036 1932 backup.exe 100 PID 3252 wrote to memory of 4776 3252 backup.exe 102 PID 3252 wrote to memory of 4776 3252 backup.exe 102 PID 3252 wrote to memory of 4776 3252 backup.exe 102 PID 1448 wrote to memory of 4708 1448 backup.exe 104 PID 1448 wrote to memory of 4708 1448 backup.exe 104 PID 1448 wrote to memory of 4708 1448 backup.exe 104 PID 1932 wrote to memory of 4592 1932 backup.exe 105 PID 1932 wrote to memory of 4592 1932 backup.exe 105 PID 1932 wrote to memory of 4592 1932 backup.exe 105 PID 376 wrote to memory of 4184 376 backup.exe 106 PID 376 wrote to memory of 4184 376 backup.exe 106 PID 376 wrote to memory of 4184 376 backup.exe 106 PID 3252 wrote to memory of 3136 3252 backup.exe 107 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe"C:\Users\Admin\AppData\Local\Temp\5b0965fd1095800e9a17bff3f18b2ceb372f616ce7b27b19cadb22a6f14dc4f3.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\1611984630\backup.exeC:\Users\Admin\AppData\Local\Temp\1611984630\backup.exe C:\Users\Admin\AppData\Local\Temp\1611984630\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1516 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1932 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2196
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:376 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4688
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4332
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4776 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4920 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4972
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3136
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:628 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5084
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1448 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4708 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3668 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4864 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3848
-
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4184 -
C:\Program Files\Internet Explorer\de-DE\data.exe"C:\Program Files\Internet Explorer\de-DE\data.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4696
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1196
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5024
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1772 -
C:\Program Files\Java\jdk1.8.0_66\backup.exe"C:\Program Files\Java\jdk1.8.0_66\backup.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2536
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4040 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4808 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4576
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3680 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4592 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3976 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4292
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2252
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4688
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD595d31092a20c8cd4609805fe43d195e9
SHA15cc7c1005d6e36a36503c1dd3e540afc171efa81
SHA25629d63ab999db371a8f0ff0f16ca503cefc4a448c82931231366689da59a62124
SHA512d821488f073298c30bbc4c234201d86b57f63efbb002180c96546ffc6fe57b842afa2f95edfd3cace39adf53b1aa58b7089a952919b7b2faa3a8177bc2ae04b5
-
Filesize
72KB
MD595d31092a20c8cd4609805fe43d195e9
SHA15cc7c1005d6e36a36503c1dd3e540afc171efa81
SHA25629d63ab999db371a8f0ff0f16ca503cefc4a448c82931231366689da59a62124
SHA512d821488f073298c30bbc4c234201d86b57f63efbb002180c96546ffc6fe57b842afa2f95edfd3cace39adf53b1aa58b7089a952919b7b2faa3a8177bc2ae04b5
-
Filesize
72KB
MD51c646a58af060fa4abc52fe660e77525
SHA1f9af408f062023f58d1a633269e22dc9380c065c
SHA256d0a3808e5b3fc89cdda1c509224cb3e956e4fa9326c1fc526c8979d1613f1bbd
SHA5128cae43ffd44a4902a92634ce2825585aebe0b60b66cfe44e6a609b42d3d0a876185db005bb359e723a61255fb0b571b45662447b60b0e74fa3edb4a971c7c536
-
Filesize
72KB
MD51c646a58af060fa4abc52fe660e77525
SHA1f9af408f062023f58d1a633269e22dc9380c065c
SHA256d0a3808e5b3fc89cdda1c509224cb3e956e4fa9326c1fc526c8979d1613f1bbd
SHA5128cae43ffd44a4902a92634ce2825585aebe0b60b66cfe44e6a609b42d3d0a876185db005bb359e723a61255fb0b571b45662447b60b0e74fa3edb4a971c7c536
-
Filesize
72KB
MD574b79fa6b24a9d039a58c9cfeda31556
SHA1e95c715f54bb8481876ba081a9302e2d6b636f07
SHA256f6de41e47c42cad412a4fc2d146bd3cc10a8343697402321ed91ec037396e91c
SHA5129df4b7fed6e145d67eba7cf423925621837a72638e761d7b54ff185209debb050e50a72db3c697ee54c8de54555b8372d3d7b20afb221dafab5c23fca3c24398
-
Filesize
72KB
MD574b79fa6b24a9d039a58c9cfeda31556
SHA1e95c715f54bb8481876ba081a9302e2d6b636f07
SHA256f6de41e47c42cad412a4fc2d146bd3cc10a8343697402321ed91ec037396e91c
SHA5129df4b7fed6e145d67eba7cf423925621837a72638e761d7b54ff185209debb050e50a72db3c697ee54c8de54555b8372d3d7b20afb221dafab5c23fca3c24398
-
Filesize
72KB
MD52ca51114e1fcafc46f2792ba1dacec0e
SHA1a5e1e6843913309df58eb54dc1d0dff63258da02
SHA25672bf24116ebe807de4c3826bfcff6765c59f2f1eb3ef65e61e024ea46a361735
SHA51296ae2f6cf987d1ad90a245ee984cae0f303f0f9e3322ddf1d88509161d9ee33f434e220d09c946278182d50de69f671c7820db95b470d7eb87d4c2d4d9cee32b
-
Filesize
72KB
MD52ca51114e1fcafc46f2792ba1dacec0e
SHA1a5e1e6843913309df58eb54dc1d0dff63258da02
SHA25672bf24116ebe807de4c3826bfcff6765c59f2f1eb3ef65e61e024ea46a361735
SHA51296ae2f6cf987d1ad90a245ee984cae0f303f0f9e3322ddf1d88509161d9ee33f434e220d09c946278182d50de69f671c7820db95b470d7eb87d4c2d4d9cee32b
-
Filesize
72KB
MD528bca3617a69ddda5a1314c7e0be0cb8
SHA1adc09f122dd9afca87791481b1fc53aa23044ba3
SHA256eb0786e2b1dd5ca54d0ca91601ae48fe915f6d65f20e59bef76abf029a33af48
SHA5126ed83adfc6b79c1907a0b7dbd7de59dac2898bca0477e94efc2b87d16c25a1fe2e700f038b745930dbcbc111ca0cd2187aa8e7ff1380831dc7b2b7441461d4bd
-
Filesize
72KB
MD528bca3617a69ddda5a1314c7e0be0cb8
SHA1adc09f122dd9afca87791481b1fc53aa23044ba3
SHA256eb0786e2b1dd5ca54d0ca91601ae48fe915f6d65f20e59bef76abf029a33af48
SHA5126ed83adfc6b79c1907a0b7dbd7de59dac2898bca0477e94efc2b87d16c25a1fe2e700f038b745930dbcbc111ca0cd2187aa8e7ff1380831dc7b2b7441461d4bd
-
Filesize
72KB
MD5242afa070848a3d15af4826076ea738b
SHA106e790cd2e7b46fbc5b3fee97e90e7dd7eadd179
SHA256e59ec28801958074da97d04ee2629fb24ececbe213cd59a90af1b37770f1f4c7
SHA51271b6965ab9f5457d972d4ef0026ea7fa0947e885f8948253668c690678bfe4624a5af7c3a110af173077c62c68b81adf1b8225539d908ccba97a9c03ed63f351
-
Filesize
72KB
MD5242afa070848a3d15af4826076ea738b
SHA106e790cd2e7b46fbc5b3fee97e90e7dd7eadd179
SHA256e59ec28801958074da97d04ee2629fb24ececbe213cd59a90af1b37770f1f4c7
SHA51271b6965ab9f5457d972d4ef0026ea7fa0947e885f8948253668c690678bfe4624a5af7c3a110af173077c62c68b81adf1b8225539d908ccba97a9c03ed63f351
-
Filesize
72KB
MD59d3731f07f2d5315be2941e6c5d7981f
SHA1df8b4c90d4209958a9ca6d280c14b6a59426a692
SHA256aaf0a0ebc63c57357243fb66ecc1ca7a6cfb4adc11a6ff22cdbc8d1e881b5ab8
SHA5122a8a516fe7d964cfa323c0c62f60fa56fc0bf9aa42dfd02783fd5c8c785d8763ccb94f38e7e3d735af3d881eeca923c33b8d5ae2ccb1dd6775539680934c4ec3
-
Filesize
72KB
MD59d3731f07f2d5315be2941e6c5d7981f
SHA1df8b4c90d4209958a9ca6d280c14b6a59426a692
SHA256aaf0a0ebc63c57357243fb66ecc1ca7a6cfb4adc11a6ff22cdbc8d1e881b5ab8
SHA5122a8a516fe7d964cfa323c0c62f60fa56fc0bf9aa42dfd02783fd5c8c785d8763ccb94f38e7e3d735af3d881eeca923c33b8d5ae2ccb1dd6775539680934c4ec3
-
Filesize
72KB
MD51209e7d34f8c3ea91eaac73385f69a43
SHA136096c630018a34ce5dcfa11915ea9bfdb65c0f6
SHA25634aa13794a02277226bb9ce9e5014195330b36336140b45566176d4aad67df35
SHA512f87a0ffd7ce11f30dd8851c8eb1e380aa57e635f74978d147ab4102b89f97dc41894a679aca044d7a5dd881ca1f5f87bd07c04b281ff8352f40c55dfb8b99998
-
Filesize
72KB
MD51209e7d34f8c3ea91eaac73385f69a43
SHA136096c630018a34ce5dcfa11915ea9bfdb65c0f6
SHA25634aa13794a02277226bb9ce9e5014195330b36336140b45566176d4aad67df35
SHA512f87a0ffd7ce11f30dd8851c8eb1e380aa57e635f74978d147ab4102b89f97dc41894a679aca044d7a5dd881ca1f5f87bd07c04b281ff8352f40c55dfb8b99998
-
Filesize
72KB
MD5b616dcb60801bfc79fd2ae78be99011a
SHA1ae64b4cc4f6317e8ee8099cd7eb002bcf89150f5
SHA2567929d5ac05442efd7aecc4cc19e055edb266269001fa5f7aa25ff005043039c2
SHA5121aaa8c675000cebe5a15b9594c092aeb046d1c546fc537ec5878c305aea653c04fe604d6eeabd6ff65efbdfd3a866cece73da087e1d8d539e26c2d064fd6027c
-
Filesize
72KB
MD5b616dcb60801bfc79fd2ae78be99011a
SHA1ae64b4cc4f6317e8ee8099cd7eb002bcf89150f5
SHA2567929d5ac05442efd7aecc4cc19e055edb266269001fa5f7aa25ff005043039c2
SHA5121aaa8c675000cebe5a15b9594c092aeb046d1c546fc537ec5878c305aea653c04fe604d6eeabd6ff65efbdfd3a866cece73da087e1d8d539e26c2d064fd6027c
-
Filesize
72KB
MD5f8c84da8ab7d60db3559eb410ee3e34a
SHA1ffd1a25abb0ce7f9481f110fed8adf97731f1f42
SHA2569aeee02ab12f0aeb7021d636baec2679d2ace69a109100263695c4d3fabb1c5a
SHA51219871c6e0c1da3a460a9276a5df5c8cf9ea89dce2d9f2e16863e0b3412579076089748a62b964c6becd1947309a032f01fb4960cb65230e9aaff4533ced31cc3
-
Filesize
72KB
MD5f8c84da8ab7d60db3559eb410ee3e34a
SHA1ffd1a25abb0ce7f9481f110fed8adf97731f1f42
SHA2569aeee02ab12f0aeb7021d636baec2679d2ace69a109100263695c4d3fabb1c5a
SHA51219871c6e0c1da3a460a9276a5df5c8cf9ea89dce2d9f2e16863e0b3412579076089748a62b964c6becd1947309a032f01fb4960cb65230e9aaff4533ced31cc3
-
Filesize
72KB
MD5c380f7f2990cf557655ca1197304f8f0
SHA1c98acf0e442fe361a1244a10bf9996db996013f0
SHA2563459b696141d8fc1b09cb8a277ef225520d8241f717e51ebffb68b8039dfe2e2
SHA512c10cb828444a526ae311b51a5775a19a2e95da2c34d30f40e57816439a30a2ab290d3f57188dd4a164a54f09efa0fa3fd451f54dbb5dc1223b2d05ba9f593d61
-
Filesize
72KB
MD5c380f7f2990cf557655ca1197304f8f0
SHA1c98acf0e442fe361a1244a10bf9996db996013f0
SHA2563459b696141d8fc1b09cb8a277ef225520d8241f717e51ebffb68b8039dfe2e2
SHA512c10cb828444a526ae311b51a5775a19a2e95da2c34d30f40e57816439a30a2ab290d3f57188dd4a164a54f09efa0fa3fd451f54dbb5dc1223b2d05ba9f593d61
-
Filesize
72KB
MD5b6628fd085d3a68011ce5bd3c11697ac
SHA1b29a4ee9c634f0f93b14ab89e6e41255b4f3f2fb
SHA25607750855ceacd348ae081abb54f9160de22dc460883d3b46094ed8580589ee0e
SHA512b5e221a2cf0c864efb4ea740701a03b4f13144f7d741d15ce47243f7abc6d8c30412b6c5011a27886b71891ca9cec3cd97acf463ff04cabcc7ea1f12630361b5
-
Filesize
72KB
MD5b6628fd085d3a68011ce5bd3c11697ac
SHA1b29a4ee9c634f0f93b14ab89e6e41255b4f3f2fb
SHA25607750855ceacd348ae081abb54f9160de22dc460883d3b46094ed8580589ee0e
SHA512b5e221a2cf0c864efb4ea740701a03b4f13144f7d741d15ce47243f7abc6d8c30412b6c5011a27886b71891ca9cec3cd97acf463ff04cabcc7ea1f12630361b5
-
Filesize
72KB
MD512e8dd5ee3c4de502992fa6faee06c88
SHA11deec8b6540aa8df9e032ca280cf323812b34942
SHA256bd3d5612234f3a8c7e1833b481af01a6d6a05da64319a2d25b8ae35a06543d64
SHA5124425885123c76ae71a977ad3f41897701fa95335beb142cb353eb326b54197c69573e773689a83aab7e76e4afd66aee750591eb4a343e64a81bf75cb50df1edb
-
Filesize
72KB
MD512e8dd5ee3c4de502992fa6faee06c88
SHA11deec8b6540aa8df9e032ca280cf323812b34942
SHA256bd3d5612234f3a8c7e1833b481af01a6d6a05da64319a2d25b8ae35a06543d64
SHA5124425885123c76ae71a977ad3f41897701fa95335beb142cb353eb326b54197c69573e773689a83aab7e76e4afd66aee750591eb4a343e64a81bf75cb50df1edb
-
Filesize
72KB
MD54cbe7bff850466d7e17995554f38c534
SHA1144a1529519b48e2b1f69f50e209b2ecee30b32d
SHA256b1845dd50b29fba2cb0250f524547a5969428410e18aeac37c75db6fe40d0ab9
SHA512e62dea34b729bafadab986345c4a6b8c635935490f8331a8d80237c0107f0579299203c540e54fe2639dfe05d6c04d3b5d938c350a940598c93a4ed58ac9485b
-
Filesize
72KB
MD54cbe7bff850466d7e17995554f38c534
SHA1144a1529519b48e2b1f69f50e209b2ecee30b32d
SHA256b1845dd50b29fba2cb0250f524547a5969428410e18aeac37c75db6fe40d0ab9
SHA512e62dea34b729bafadab986345c4a6b8c635935490f8331a8d80237c0107f0579299203c540e54fe2639dfe05d6c04d3b5d938c350a940598c93a4ed58ac9485b
-
Filesize
72KB
MD54443dfd95876534a641f438812d05f62
SHA165c186b3a113d8e01baad23f9526a2a7c0ac1349
SHA256dc58247b66a0f72c450013c5f7fed6c030a498719fc41fa2f9e447a620ac2bd6
SHA512f47b9376cc2ee88cea662605d3b06f9ca9aa8aa317ed18ea9f8ffed0ebe044cb9f44938bd1ebc29e775fd1e44ee37dfef50526f5dced3453a4d5667db809d2f3
-
Filesize
72KB
MD54443dfd95876534a641f438812d05f62
SHA165c186b3a113d8e01baad23f9526a2a7c0ac1349
SHA256dc58247b66a0f72c450013c5f7fed6c030a498719fc41fa2f9e447a620ac2bd6
SHA512f47b9376cc2ee88cea662605d3b06f9ca9aa8aa317ed18ea9f8ffed0ebe044cb9f44938bd1ebc29e775fd1e44ee37dfef50526f5dced3453a4d5667db809d2f3
-
Filesize
72KB
MD5c955dd5818fb2c4f8e563d5f01763784
SHA18031b59fe0b7f1fe089b458448019c65454d60e6
SHA256c448a3ed78eaf37b3f91af2ad4040df1797af60f97cda1c8eede5d259117e061
SHA5129c67a093db461b448f528e5ba93b5025a1525b784088f7c887e610daf366a1a3566ef0babbc9e6f430a99816690fcd4f575cafde6767726f394be019fe17dee9
-
Filesize
72KB
MD5c955dd5818fb2c4f8e563d5f01763784
SHA18031b59fe0b7f1fe089b458448019c65454d60e6
SHA256c448a3ed78eaf37b3f91af2ad4040df1797af60f97cda1c8eede5d259117e061
SHA5129c67a093db461b448f528e5ba93b5025a1525b784088f7c887e610daf366a1a3566ef0babbc9e6f430a99816690fcd4f575cafde6767726f394be019fe17dee9
-
Filesize
72KB
MD5a8ee65ea5aa526daa601f753902743a5
SHA179f4623b235874d25f584e33d6d93d40b96e54df
SHA256b41bac90f097a69ad23fbf14b93da72863141bd6f29b3e01e7f89f26f4ffd4aa
SHA512084d412ea88cdbadc97fb0f24f71df2fed574afc059a5420bbcf1bb196b3b4f87b7cb4de02548c014f5e96bf3fad81486543d6c129f4389848109fa73fa9c890
-
Filesize
72KB
MD5a8ee65ea5aa526daa601f753902743a5
SHA179f4623b235874d25f584e33d6d93d40b96e54df
SHA256b41bac90f097a69ad23fbf14b93da72863141bd6f29b3e01e7f89f26f4ffd4aa
SHA512084d412ea88cdbadc97fb0f24f71df2fed574afc059a5420bbcf1bb196b3b4f87b7cb4de02548c014f5e96bf3fad81486543d6c129f4389848109fa73fa9c890
-
Filesize
72KB
MD5de6b279e60321edba537dcd0ce9181eb
SHA131add94d787d48dec9cc3d4396e060b7d3d8c504
SHA2563618aa513c0b321948f8178bbbc8fbe18ffb861a0e107c42644c24cac6e1038e
SHA5127069cf303dd08149507b70552be228042d981b5843e1c7b4abe2b3bb80380f249680c19553682b2540227e9ae397de5397d25f46518f4a21d29173c0b328097c
-
Filesize
72KB
MD5de6b279e60321edba537dcd0ce9181eb
SHA131add94d787d48dec9cc3d4396e060b7d3d8c504
SHA2563618aa513c0b321948f8178bbbc8fbe18ffb861a0e107c42644c24cac6e1038e
SHA5127069cf303dd08149507b70552be228042d981b5843e1c7b4abe2b3bb80380f249680c19553682b2540227e9ae397de5397d25f46518f4a21d29173c0b328097c
-
Filesize
72KB
MD595d31092a20c8cd4609805fe43d195e9
SHA15cc7c1005d6e36a36503c1dd3e540afc171efa81
SHA25629d63ab999db371a8f0ff0f16ca503cefc4a448c82931231366689da59a62124
SHA512d821488f073298c30bbc4c234201d86b57f63efbb002180c96546ffc6fe57b842afa2f95edfd3cace39adf53b1aa58b7089a952919b7b2faa3a8177bc2ae04b5
-
Filesize
72KB
MD595d31092a20c8cd4609805fe43d195e9
SHA15cc7c1005d6e36a36503c1dd3e540afc171efa81
SHA25629d63ab999db371a8f0ff0f16ca503cefc4a448c82931231366689da59a62124
SHA512d821488f073298c30bbc4c234201d86b57f63efbb002180c96546ffc6fe57b842afa2f95edfd3cace39adf53b1aa58b7089a952919b7b2faa3a8177bc2ae04b5
-
Filesize
72KB
MD5bf8dbde186d58ef45b241d741a3809a9
SHA183a06963498c6a4519dbf6341b7233cfc8a0ec6d
SHA256d1181525b90f5287f2816d0c379d6410a20ed5d1b487068303ad931f8b98025d
SHA512f6a3a06ec1bab36e6386f0dc779b7cfcc65fa436d626959e6df5cffb580e8509db6d036f3705c787819e27eee0a5de5deab2e3039aaebf5b524e810124df66ba
-
Filesize
72KB
MD5bf8dbde186d58ef45b241d741a3809a9
SHA183a06963498c6a4519dbf6341b7233cfc8a0ec6d
SHA256d1181525b90f5287f2816d0c379d6410a20ed5d1b487068303ad931f8b98025d
SHA512f6a3a06ec1bab36e6386f0dc779b7cfcc65fa436d626959e6df5cffb580e8509db6d036f3705c787819e27eee0a5de5deab2e3039aaebf5b524e810124df66ba
-
Filesize
72KB
MD58d75ea3db6dc4244a32b0cf2951f5437
SHA19b5334289300081643d281f9c404228e3945450c
SHA256390e0c2381eeec19d857228d2d22ff178978c14761f05a47b1a4615d455f3572
SHA5121ce947843b25fecbedc280ee29885783ca49dddfd1b5b68ba2995b63d904e7894bafc5ded0c3ccf90869f416bff068da7b5eaa422410d68b027c1babb8e6b916
-
Filesize
72KB
MD58d75ea3db6dc4244a32b0cf2951f5437
SHA19b5334289300081643d281f9c404228e3945450c
SHA256390e0c2381eeec19d857228d2d22ff178978c14761f05a47b1a4615d455f3572
SHA5121ce947843b25fecbedc280ee29885783ca49dddfd1b5b68ba2995b63d904e7894bafc5ded0c3ccf90869f416bff068da7b5eaa422410d68b027c1babb8e6b916
-
Filesize
72KB
MD5842d321d4cb6fecf5dfbc334800f1795
SHA143b60942aa358468773db559d2299151ae1a7276
SHA25611cce863399543f06fc737f81a48a58b51b039d7513ad0f14f0c960db86e45de
SHA5129cfa6b034686c9ff0038e0b06bbf988a14952a149324e5e57e26357844f1ed25808b3c71eec337ec6ed6f3fdcd06fb9521f9c2b1b27591ede6a472b8e864094c
-
Filesize
72KB
MD5842d321d4cb6fecf5dfbc334800f1795
SHA143b60942aa358468773db559d2299151ae1a7276
SHA25611cce863399543f06fc737f81a48a58b51b039d7513ad0f14f0c960db86e45de
SHA5129cfa6b034686c9ff0038e0b06bbf988a14952a149324e5e57e26357844f1ed25808b3c71eec337ec6ed6f3fdcd06fb9521f9c2b1b27591ede6a472b8e864094c
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eef7561ec2391f1b273f8b43f322759e
SHA10abe733569a5e6dee92e3d6ccf3a4ac02bc1f4e7
SHA2563a0c668212ae7e84e801ceffa7b1249cfd1a5e9e362dad0b9b98863290fb6129
SHA5122a53a20119a1599fbae0ec647b37dc990dc7b0600765de6ab2b73a5c1538cd56c5ca8579460effcececd772312bed085b6806810761a249a5a894f094da633e9
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eef7561ec2391f1b273f8b43f322759e
SHA10abe733569a5e6dee92e3d6ccf3a4ac02bc1f4e7
SHA2563a0c668212ae7e84e801ceffa7b1249cfd1a5e9e362dad0b9b98863290fb6129
SHA5122a53a20119a1599fbae0ec647b37dc990dc7b0600765de6ab2b73a5c1538cd56c5ca8579460effcececd772312bed085b6806810761a249a5a894f094da633e9
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eef7561ec2391f1b273f8b43f322759e
SHA10abe733569a5e6dee92e3d6ccf3a4ac02bc1f4e7
SHA2563a0c668212ae7e84e801ceffa7b1249cfd1a5e9e362dad0b9b98863290fb6129
SHA5122a53a20119a1599fbae0ec647b37dc990dc7b0600765de6ab2b73a5c1538cd56c5ca8579460effcececd772312bed085b6806810761a249a5a894f094da633e9
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5eef7561ec2391f1b273f8b43f322759e
SHA10abe733569a5e6dee92e3d6ccf3a4ac02bc1f4e7
SHA2563a0c668212ae7e84e801ceffa7b1249cfd1a5e9e362dad0b9b98863290fb6129
SHA5122a53a20119a1599fbae0ec647b37dc990dc7b0600765de6ab2b73a5c1538cd56c5ca8579460effcececd772312bed085b6806810761a249a5a894f094da633e9
-
Filesize
72KB
MD58d75ea3db6dc4244a32b0cf2951f5437
SHA19b5334289300081643d281f9c404228e3945450c
SHA256390e0c2381eeec19d857228d2d22ff178978c14761f05a47b1a4615d455f3572
SHA5121ce947843b25fecbedc280ee29885783ca49dddfd1b5b68ba2995b63d904e7894bafc5ded0c3ccf90869f416bff068da7b5eaa422410d68b027c1babb8e6b916
-
Filesize
72KB
MD58d75ea3db6dc4244a32b0cf2951f5437
SHA19b5334289300081643d281f9c404228e3945450c
SHA256390e0c2381eeec19d857228d2d22ff178978c14761f05a47b1a4615d455f3572
SHA5121ce947843b25fecbedc280ee29885783ca49dddfd1b5b68ba2995b63d904e7894bafc5ded0c3ccf90869f416bff068da7b5eaa422410d68b027c1babb8e6b916
-
Filesize
72KB
MD5842d321d4cb6fecf5dfbc334800f1795
SHA143b60942aa358468773db559d2299151ae1a7276
SHA25611cce863399543f06fc737f81a48a58b51b039d7513ad0f14f0c960db86e45de
SHA5129cfa6b034686c9ff0038e0b06bbf988a14952a149324e5e57e26357844f1ed25808b3c71eec337ec6ed6f3fdcd06fb9521f9c2b1b27591ede6a472b8e864094c
-
Filesize
72KB
MD5842d321d4cb6fecf5dfbc334800f1795
SHA143b60942aa358468773db559d2299151ae1a7276
SHA25611cce863399543f06fc737f81a48a58b51b039d7513ad0f14f0c960db86e45de
SHA5129cfa6b034686c9ff0038e0b06bbf988a14952a149324e5e57e26357844f1ed25808b3c71eec337ec6ed6f3fdcd06fb9521f9c2b1b27591ede6a472b8e864094c
-
Filesize
72KB
MD528511eb303baf19ba1392fb94f392f1c
SHA1e57691676e7528929346b6f03414ed32be34f85d
SHA25697cd152ad755bd3e99839af83b228fde960c826a6050dd0314ea742a5f04cbc6
SHA5120cc3ce955fc61c028c50f2a5ea5a322d2120100b3f51309431dfac28ec6ec9e8219751e4af28fdafd54ca64f6edf9ce6ebab52266fef28741a6fc638d0ca19f7
-
Filesize
72KB
MD528511eb303baf19ba1392fb94f392f1c
SHA1e57691676e7528929346b6f03414ed32be34f85d
SHA25697cd152ad755bd3e99839af83b228fde960c826a6050dd0314ea742a5f04cbc6
SHA5120cc3ce955fc61c028c50f2a5ea5a322d2120100b3f51309431dfac28ec6ec9e8219751e4af28fdafd54ca64f6edf9ce6ebab52266fef28741a6fc638d0ca19f7
-
Filesize
72KB
MD5bf8dbde186d58ef45b241d741a3809a9
SHA183a06963498c6a4519dbf6341b7233cfc8a0ec6d
SHA256d1181525b90f5287f2816d0c379d6410a20ed5d1b487068303ad931f8b98025d
SHA512f6a3a06ec1bab36e6386f0dc779b7cfcc65fa436d626959e6df5cffb580e8509db6d036f3705c787819e27eee0a5de5deab2e3039aaebf5b524e810124df66ba
-
Filesize
72KB
MD5bf8dbde186d58ef45b241d741a3809a9
SHA183a06963498c6a4519dbf6341b7233cfc8a0ec6d
SHA256d1181525b90f5287f2816d0c379d6410a20ed5d1b487068303ad931f8b98025d
SHA512f6a3a06ec1bab36e6386f0dc779b7cfcc65fa436d626959e6df5cffb580e8509db6d036f3705c787819e27eee0a5de5deab2e3039aaebf5b524e810124df66ba
-
Filesize
72KB
MD5b06b6aaa18ea08d5d9090627905f5a11
SHA11dab49b64bb0bd628f12053a05beb46c95610cb1
SHA25653d7f8151dc14d41cc3f73eaa8cc0ea4603f13cc08f5521d74a432ec259c8745
SHA51258cd482378b2bbb6f41af364d9c32888f3e8b89d6f38558c17ecf8645eadb66c75edabc5f2647a9ad9232acb3ea203e86b7d8c45062e8b2c58c8551f6fa7a8cc
-
Filesize
72KB
MD5b06b6aaa18ea08d5d9090627905f5a11
SHA11dab49b64bb0bd628f12053a05beb46c95610cb1
SHA25653d7f8151dc14d41cc3f73eaa8cc0ea4603f13cc08f5521d74a432ec259c8745
SHA51258cd482378b2bbb6f41af364d9c32888f3e8b89d6f38558c17ecf8645eadb66c75edabc5f2647a9ad9232acb3ea203e86b7d8c45062e8b2c58c8551f6fa7a8cc
-
Filesize
72KB
MD51fda6e60005b15a43b2378beab85050c
SHA17fb21215601141562145fd8721897751f6b87b42
SHA256a30bb33819cafe9484033efbc4ed8b0beabff98438e47359a5459846c96a31df
SHA5125ddc87da68dd6029d76f57e19142dd16fc67be0242235b36576ed66c6669f5584fff23c4b5c753d22d53d19d37e3d26817e1d958675b1b0372477cd5ea8618d7
-
Filesize
72KB
MD51fda6e60005b15a43b2378beab85050c
SHA17fb21215601141562145fd8721897751f6b87b42
SHA256a30bb33819cafe9484033efbc4ed8b0beabff98438e47359a5459846c96a31df
SHA5125ddc87da68dd6029d76f57e19142dd16fc67be0242235b36576ed66c6669f5584fff23c4b5c753d22d53d19d37e3d26817e1d958675b1b0372477cd5ea8618d7
-
Filesize
72KB
MD5e57d34ae034f05d3e20240a8e93c2655
SHA179da95bcabb8601bda9f91bd9f5b008dc80a29cb
SHA2569dacce72f5be614fc6693dd39a0974eac88dfc6e99545531024bb6a8247c38fa
SHA512a5e277f134c2e0f238df435fb33606b8ef77ad416e40689bdc283df87ea92815e6e6216c8e56705f80ae26833448db37d4be6b2eafdf079cbe3e14cfd0ee16e5
-
Filesize
72KB
MD5e57d34ae034f05d3e20240a8e93c2655
SHA179da95bcabb8601bda9f91bd9f5b008dc80a29cb
SHA2569dacce72f5be614fc6693dd39a0974eac88dfc6e99545531024bb6a8247c38fa
SHA512a5e277f134c2e0f238df435fb33606b8ef77ad416e40689bdc283df87ea92815e6e6216c8e56705f80ae26833448db37d4be6b2eafdf079cbe3e14cfd0ee16e5
-
Filesize
72KB
MD595d31092a20c8cd4609805fe43d195e9
SHA15cc7c1005d6e36a36503c1dd3e540afc171efa81
SHA25629d63ab999db371a8f0ff0f16ca503cefc4a448c82931231366689da59a62124
SHA512d821488f073298c30bbc4c234201d86b57f63efbb002180c96546ffc6fe57b842afa2f95edfd3cace39adf53b1aa58b7089a952919b7b2faa3a8177bc2ae04b5
-
Filesize
72KB
MD595d31092a20c8cd4609805fe43d195e9
SHA15cc7c1005d6e36a36503c1dd3e540afc171efa81
SHA25629d63ab999db371a8f0ff0f16ca503cefc4a448c82931231366689da59a62124
SHA512d821488f073298c30bbc4c234201d86b57f63efbb002180c96546ffc6fe57b842afa2f95edfd3cace39adf53b1aa58b7089a952919b7b2faa3a8177bc2ae04b5